Security Finance & Payback Security Finance A Essay

PAGES
2
WORDS
548
Cite

Security Finance & Payback Security Finance

A strong effective information security program consists of many layers that create a "defense in depth" (Spontak, 2006). The objectives of information security is to make any unauthorized, unwanted access extremely difficult, easily detected, and well documented. Components of strong defense include firewalls, virus filters, intrusion detection, monitoring, and usage policies. Some businesses are missing the business culture, policies and procedures, separation of duties, and security awareness.

The Finance Department is critical to the security of the information system. Financial executives can set the tone, encourage compliance with security policies, and lead by example. Allowing the sharing of passwords puts the information security at risk, especially where financial, employee, and customer information is concerned. When employees are uneducated regarding compliance regulation, the organization can end up in trouble...

...

Employees should be evaluated on information security measures, not just on customer service measures. Separation of duties creates internal control. Department heads need to communicate with each other on what employees are able to access in the information system. The most challenging part of information security is staff awareness.
The finance department is a major contributor to the success of information security just by the actions and procedures they follow. Ensuring staff awareness of the security policies and procedures, training on compliance regulation, and ensuring that policies are being followed by the CFO as well as other employees adds to the security of the information system. Executives should lead by example as well as take measures to raise employee awareness.

Payback

Return on security investments (ROSI) is popular for measuring the cost-benefit aspect of information security (Gordon, 2002). This concept has led to some…

Sources Used in Documents:

Bibliography

Gordon, L.A. (2002). Return on information security investments: Myths & Realities. Strategic Finance, 84(5), 26-31.

Spontak, S. (2006). Defense in Depth: How financial executive can boost IT security. Financial Executive, 22(10), 51-53.


Cite this Document:

"Security Finance & Payback Security Finance A" (2012, July 20) Retrieved April 23, 2024, from
https://www.paperdue.com/essay/security-finance-amp-payback-security-110096

"Security Finance & Payback Security Finance A" 20 July 2012. Web.23 April. 2024. <
https://www.paperdue.com/essay/security-finance-amp-payback-security-110096>

"Security Finance & Payback Security Finance A", 20 July 2012, Accessed.23 April. 2024,
https://www.paperdue.com/essay/security-finance-amp-payback-security-110096

Related Documents
Wireless Broadband Technology
PAGES 50 WORDS 20344

Wireless Broadband Technology Overview of Wireless technology Presently it is quite evident to come across functioning of a sort of wireless technology in the form of mobile phone, a Palm pilot, a smart phone etc. With the inception of fast connectivity in the sphere of commerce it is customary and useful to operate from central locations communicating with the remote branches, conducting conferences in remote places, discussing with every body at every