Verified Document

Security Policy And Risk Strategy Essay

An IP San is a fiber optic channel that can provide secure real time data to each location. Where, software and security applications can be adapted to the current system that is being used. The Snap Lock is: a security software that can be used to provide an effective way for each location to retrieve, update and change information. Support for why these procedures and products are the optimal approach for this organization

The reason why these different procedures and products were selected was: to reduce the overall risk exposure of the company's external threats. The current system that is being used by MMC increases risks dramatically, by having a number of different systems, where financial information is stored. If any one of these systems is vulnerable, there is the possibility that you could see a major security breach. To reduce these risks requires limiting the number of locations to two. You would then, use fiber optics and other high speed protocols to deliver the data to each location. The IP San was chosen, because it can effectively adapt to the current system that is being used, it works with a variety of financial programs and it offers secure connections. ("IP San, " 2010) You would then, use the Snap Lock security software as an added layer of safety against possible breaches. This system would work more effectively, because it would create a virtual fortress around the company's it infrastructure. ("Snap Lock Compliance and Snap Lock Enterprise Software," 2010)

High level architectural and design details for how and where these procedures and products will be implemented within the organization

The way that the above mentioned tools will be implemented into the company's it infrastructure is through: a system of creating one integrated structure and then implementing the different pieces into the one protocol. This will be accomplished by establishing the new protocol independently of the current system. Then, as you are integrating the pieces for the current system into the new protocol, you will be training and updating the staff about the new system. This will allow for sufficient...

The use of a single it protocol that can streamline all data / information; has shown to be cost effective and can increase the overall security of the system. At which point, you are taking this new protocol and are constantly testing it for vulnerabilities. This will ensure that the company is able to adapt to the different changes that are occurring in the world of it security. Once, management and various it personnel are aware of these issues, the risks dramatically decrease for each breach. This is supported by information from the Department of Homeland Security, which found that those companies who are not testing their system and looking for various weaknesses; could be the most vulnerable to these different issues because of their false sense of security. (Mason, 2010)
Clearly, MMC needs to implement a new security risk protocol. This is because the current system that is being utilized; has a number of locations that are storing all of their customers personal financial information. As a result, the chances increase exponentially of hackers being able to successfully breach the system. To prevent such instances, requires that the company implement one it protocol that will be in at two locations. This will provide increased amounts of security, by ensuring that all information is provide via high speed fiber optics network. You would then, implement Secure Lock to provide an added layer of protection. If the company can implement such a system, they will dramatically reduce risks, by facing these issues.

Bibliography

IP San (2010). Retrieved May 27, 2010 from Net App website: http://www.netapp.com/us/products/protocols/ip-san/ip-san.html

Snap Lock Compliance and Snap Lock Enterprise Software. (2010). Retrieved May 27, 2010 from Net App website: http://www.netapp.com/us/products/protection-software/snaplock.html

Mason, J. (2010). How to Bullet Proof Your DR Plan. Retrieved May 27, 2010 from Net App website: http://www.netapp.com/us/communities/tech-ontap/tot-data-recovery-plan-0908.html

Sources used in this document:
Bibliography

IP San (2010). Retrieved May 27, 2010 from Net App website: http://www.netapp.com/us/products/protocols/ip-san/ip-san.html

Snap Lock Compliance and Snap Lock Enterprise Software. (2010). Retrieved May 27, 2010 from Net App website: http://www.netapp.com/us/products/protection-software/snaplock.html

Mason, J. (2010). How to Bullet Proof Your DR Plan. Retrieved May 27, 2010 from Net App website: http://www.netapp.com/us/communities/tech-ontap/tot-data-recovery-plan-0908.html
Cite this Document:
Copy Bibliography Citation

Related Documents

Security Policy Document: Global Distributions, Inc. The
Words: 1891 Length: 7 Document Type: White Paper

Security Policy Document: Global Distributions, Inc. The purpose of this document is to establish key security parameters and guidelines for Global Distributions, Inc. (GDI) in order to protect the interests of the company and its clients. Scope These policies apply to all operations managed by GDI, including interactions and interfaces with client companies that are managed by GDI. All communication networks, database systems, and servers full under the purview of this policy. Policies Definition of

Security Policy: The Information Security Environment Is
Words: 1208 Length: 4 Document Type: Essay

Security Policy: The information security environment is evolving because organizations of different sizes usually experience a steady stream of data security threats. Small and large business owners as well as IT managers are kept awake with various things like malware, hacking, botnets, and worms. These managers and business owners are usually concerned whether the network is safe and strong enough to repel attacks. Many organizations are plagued and tend to

Security Overview Businesses Today Are
Words: 3366 Length: 13 Document Type: Research Paper

(Gartenberg, 2005) Like all other aspects of business today, security systems often prove to be highly complex and hard (even for the participants) to identify. The culture of an organization is like the culture of a family, a community, or a nation: Because it surrounds the people in it they often have a great deal of difficulty in recognizing to what extent policies and procedures arise from the constraints of culture

Security Awareness the Weakest Link
Words: 8202 Length: 30 Document Type: Case Study

To offer an information security awareness training curriculum framework to promote consistency across government (15). Security awareness is needed to ensure the overall security of the information infrastructure. Security awareness programs is the can help organizations communicate their security information policies, as well as tips for users, to help keep systems secure, and the practices the entire organization should be utilizing. However, as Kolb and Abdullah reiterate, "security awareness is not

Security - Agip Kazakhstan North
Words: 14948 Length: 35 Document Type: Term Paper

They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and

Security Information Is the Power. The Importance
Words: 5012 Length: 15 Document Type: Term Paper

Security Information is the Power. The importance of collecting, storing, processing and communicating the relevant information presently is viewed as crucial in order to achieve success in almost all the fields be it business firms, individuals or organizations. An integrated set of components assisting collection, store, process and communication of information is termed as information system. Increasing dependence on information systems is noticed in order to excel in the respective fields

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now