Verified Document

Security Finance & Payback Security Finance A Essay

Security Finance & Payback Security Finance

A strong effective information security program consists of many layers that create a "defense in depth" (Spontak, 2006). The objectives of information security is to make any unauthorized, unwanted access extremely difficult, easily detected, and well documented. Components of strong defense include firewalls, virus filters, intrusion detection, monitoring, and usage policies. Some businesses are missing the business culture, policies and procedures, separation of duties, and security awareness.

The Finance Department is critical to the security of the information system. Financial executives can set the tone, encourage compliance with security policies, and lead by example. Allowing the sharing of passwords puts the information security at risk, especially where financial, employee, and customer information is concerned. When employees are uneducated regarding compliance regulation, the organization can end up in trouble...

Employees should be evaluated on information security measures, not just on customer service measures. Separation of duties creates internal control. Department heads need to communicate with each other on what employees are able to access in the information system. The most challenging part of information security is staff awareness.
The finance department is a major contributor to the success of information security just by the actions and procedures they follow. Ensuring staff awareness of the security policies and procedures, training on compliance regulation, and ensuring that policies are being followed by the CFO as well as other employees adds to the security of the information system. Executives should lead by example as well as take measures to raise employee awareness.

Payback

Return on security investments (ROSI) is popular for measuring the cost-benefit aspect of information security (Gordon, 2002). This concept has led to some…

Sources used in this document:
Bibliography

Gordon, L.A. (2002). Return on information security investments: Myths & Realities. Strategic Finance, 84(5), 26-31.

Spontak, S. (2006). Defense in Depth: How financial executive can boost IT security. Financial Executive, 22(10), 51-53.
Cite this Document:
Copy Bibliography Citation

Related Documents

Security Management Strategies for Increasing Security Employee
Words: 2501 Length: 8 Document Type: Essay

Security Management Strategies for Increasing Security Employee Retention Design Effective Job Characteristic Model Skill Variety Task Identity and Task Significance Autonomy and Feedback Meeting Expectations Market Competitive Package Strategies for Increasing Security Employee Retention Security employees constitute the most important component of organizational workforce. It is because; they ensure the core survival of organization and its assets. However, the ironic fact is the security employees are considered blue collar workers and their compensation packages are low (Hodson & Sullivan,

Security for Networks With Internet Access
Words: 4420 Length: 12 Document Type: Term Paper

Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework

Finance One Difference Between Industries With High
Words: 1813 Length: 6 Document Type: Multiple Chapters

Finance One difference between industries with high leverage and low leverage is a split between the need for fixed assets (high leverage) and a reliance on intellectual capital (low leverage). Airlines need planes, construction companies need equipment, and communications and hotel companies need infrastructure capacity. This compares with computers, drugs, biological products, educational services and electronics, all of which rely heavily on intellectual property to derive value. The conclusion that one

Finance in Public Finance, There
Words: 851 Length: 3 Document Type: Term Paper

This allows the public to see where their taxes are being spent and the way it is addressing the short / long-term issues. (Ekstedt, 2012) (Holzer, 2011) Public choice and the political processes The public has a choice as to who they want to represent them and the way various services will be provided to them. This means that they will select individuals who are closely aligned with these beliefs and

Lesson Plan Amp; Reflection I Didn't Know
Words: 857 Length: 3 Document Type: Essay

Lesson Plan Amp; Reflection I didn't know what state you are in so was unable to do state/district standards! Lesson Plan Age/Grade Range; Developmental Level(s): 7-8/2nd Grade; Below grade level Anticipated Lesson Duration: 45 Minutes Lesson Foundations Pre-assessment (including cognitive and noncognitive measures): All students are reading below grade level (5-7 months) as measured by standardized assessments and teacher observation Curricular Focus, Theme, or Subject Area: Reading: Fluency, word recognition, and comprehension State/District Standards: Learning Objectives: Students will develop

Branding New Service Dominant Logic
Words: 12522 Length: 50 Document Type: Dissertation

Branding in Service Markets Amp Aim And Objectives Themes for AMP Characteristics Composing Branding Concept Branding Evolution S-D Logic and Service Markets Branding Challenges in Service Markets Considerations for Effective Service Branding Categories and Themes Branding Theory Evolution S-D Logic and Service Markets Branding Challenges in Service Markets Considerations for Effective Service Branding Branding Concept Characteristics Characteristics Composing Branding Concept Sampling of Studies Reviewed Evolution of Branding Theory Evolution of Marketing Service-Brand-Relationship-Value Triangle Brand Identity, Position & Image Just as marketing increasingly influences most aspects of the consumer's lives, brands

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now