Verified Document

Controls Reduce Security Threats Technology Is Only Essay

Controls Reduce Security Threats Technology is only a part of the measures it takes to produce a strong, secure information system. Well written security policies can lay the ground work and tell employees what is mandated and required to protect the information system. Remote access should be a part of the security policy to control who does what and what they are allowed to access in the system. Setting standards for the types of devices that are allowed to access the system is equally important.

"Without an effective security policy that addresses procedures, mitigation strategies, and periodic training, all other security programs will be less successful." (Welander, 2007) Technology alone will not protect the information system of the business. Employees need to be trained on the security standards that are set for the company. No matter how secure the system is, employees can let intruders in just by checking personal email or exploring the internet on breaks.

"Controlling...

Only management employees should have access to allow someone to enter the system and control what they are allowed to do. With management controlling the access, responsibility is placed where it should be without letting others access something they do not need to do the job.
The security policy should address network login with usernames. Passwords should have minimum and maximum length, be complex, and should be changed periodically. Remote access should designate who is allowed to access and do what. What are the system requirements? What software and applications will be allowed? The internet connections need to be explained in the policy. How are computers tracked? How is equipment and media disposed considering harmful effects? How should media be allowed to be used and stored in the system?…

Sources used in this document:
Bibliography

CompTecDoc. (n.d.). Retrieved from Security Policies: http://www.comptechdoc.org/idependence/security/policies/security-policies.html

Welander, P. (2007, Apr 01). 10 Control System Security Threats. Retrieved from Controleng.com: http://ciip.wordpress.com/2009/05/25/top-10-scada-security-threats
Cite this Document:
Copy Bibliography Citation

Related Documents

Security Management Defining an Effective
Words: 3174 Length: 12 Document Type: Research Paper

The reality is however that legacy systems pose the greatest potential risk to any enterprise, as these platforms are anachronistic in terms of security support, lack many common safeguards, and don't have the necessary Application Programmer Interfaces (APIs) to scale globally as a secured platform (Gupta, Roth, 2007). Legacy systems were designed in an era where single authentication for an entire enterprise system was sufficient enough, and the concept

Security in Cloud Computing
Words: 3274 Length: 10 Document Type: Research Paper

Security in Cloud Computing Security issues associated with the cloud Cloud Security Controls Deterrent Controls Preventative Controls Corrective Controls Detective Controls Dimensions of cloud security Security and privacy Compliance Business continuity and data recovery Logs and audit trails Legal and contractual issues Public records The identified shortcomings in the cloud computing services and established opportunities for growth regarding security aspects are discussed in the current research. The security of services is regarded as the first obstacle. The opportunity for growth is provided as combination

Security - Agip Kazakhstan North
Words: 14948 Length: 35 Document Type: Term Paper

They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and

Security Awareness the Weakest Link
Words: 8202 Length: 30 Document Type: Case Study

To offer an information security awareness training curriculum framework to promote consistency across government (15). Security awareness is needed to ensure the overall security of the information infrastructure. Security awareness programs is the can help organizations communicate their security information policies, as well as tips for users, to help keep systems secure, and the practices the entire organization should be utilizing. However, as Kolb and Abdullah reiterate, "security awareness is not

Security Information Is the Power. The Importance
Words: 5012 Length: 15 Document Type: Term Paper

Security Information is the Power. The importance of collecting, storing, processing and communicating the relevant information presently is viewed as crucial in order to achieve success in almost all the fields be it business firms, individuals or organizations. An integrated set of components assisting collection, store, process and communication of information is termed as information system. Increasing dependence on information systems is noticed in order to excel in the respective fields

Security Risk Management Process -
Words: 3314 Length: 13 Document Type: Term Paper

Microsoft proposes six steps to enable proper reactive management of security risks which include: protecting safety and life, containing and assessing the damage, determining the cause of and repairing damage, reviewing risk response and updating procedures in the hopes of preventing risk in the future (Microsoft, 2004). A proactive approach is much more advantageous however as it enables corporations to prevent threats or minimize risks before negative occurrences happen within an

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now