Implementing Security Research Paper

Length: 2 pages Sources: 3 Subject: Careers Type: Research Paper Paper: #32462577 Related Topics: Information Security, Security, Security Management, Career Assessment
Excerpt from Research Paper :

Security Implementation

Identity Management and Security Awareness Training Plan Strategy

all departments.

Duration and frequency: three sessions of one hour each. Technology developments that are used in permanently updating the company's security features must be communicated to employees. Update training sessions of two hours must be performed every three months in order to keep up with technology improvements.

The training program must inform employees on the company's security guidelines. The administrative, technical, or physical safeguards intended to protect the personal information of clients and employees must be communicated and explained to all department members. In addition to this, the company must identify current attitudes towards information security that employees have (Winkler & Manke, 2013). The training material will be structured in accordance with these attitudes.

Trainer selection:

In this case, the question is whether to select an in-house or an outside trainer. An outside trainer could have more experience on security awareness and better training skills. However, the in-house trainer knows best the company's current situation and needs.

Training material:

It is important to hand out printed material to employees. This material refers to internal security rules and guidelines,...

...

This is because if managers do not offer their support employees might think the training program is not important. In addition to attending the training sessions, the department managers must ensure that their subordinates have all the resources for applying the security guidelines and principles.

Current state assessment:

In order to develop a successful training strategy, it is important to evaluate the current situation of the company. Current state assessment allows to establish measurable objectives that mu be met.

Performance measures

Performance related to security of information must be defined and connected to the training plan. A system of rewards and punishments must also be established in order to motivate employees into following information security guidelines.

Implementation

A person or department must be delegated for implementing the training plan strategy. In this case it is the human resources departments' responsibility to develop and implement the training plan strategy.

Reference list:

1. Winkler, I. & Manke, S. (2013). The 7 elements of a successful security awareness program. CSO Online. Retrieved February…

Sources Used in Documents:

Reference list:

1. Winkler, I. & Manke, S. (2013). The 7 elements of a successful security awareness program. CSO Online. Retrieved February 14, 2015 from

2"

http://www.csoonline.com/article/2133408/network-security/the-7-elements-of-a-successful-security-awareness-program.html.

2
. Gerzon, J. (2011). What makes an organization's training plan strategic? Organization and employee development. MIT Human Resources. Retrieved February 14, 2015 from http://web.mit.edu/training/trainers/resources/strategic.html.


Cite this Document:

"Implementing Security" (2015, February 15) Retrieved January 23, 2022, from
https://www.paperdue.com/essay/implementing-security-2148859

"Implementing Security" 15 February 2015. Web.23 January. 2022. <
https://www.paperdue.com/essay/implementing-security-2148859>

"Implementing Security", 15 February 2015, Accessed.23 January. 2022,
https://www.paperdue.com/essay/implementing-security-2148859

Related Documents
Security for Networks With Internet Access
Words: 4420 Length: 12 Pages Topic: Education - Computers Paper #: 31313380

Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework

Security Awareness the Weakest Link
Words: 8202 Length: 30 Pages Topic: Education - Computers Paper #: 52504223

To offer an information security awareness training curriculum framework to promote consistency across government (15). Security awareness is needed to ensure the overall security of the information infrastructure. Security awareness programs is the can help organizations communicate their security information policies, as well as tips for users, to help keep systems secure, and the practices the entire organization should be utilizing. However, as Kolb and Abdullah reiterate, "security awareness is not

Security - Agip Kazakhstan North
Words: 14948 Length: 35 Pages Topic: Business Paper #: 25262390

They need to know what their responsibilities are not only as individuals but also as team members and corporate employees. David cites an excerpt from a corporate security document that illustrates his point: "A security policy serves many functions. It is a central document that describes in detail acceptable network activity and penalties for misuse. A security policy also provides a forum for identifying and clarifying security goals and

Security Components of a Retail
Words: 1733 Length: 5 Pages Topic: Business Paper #: 92028705

References Best practices in encryption. (2008). nuBridges.com. [Online]. Available: http://www.nubridges.com/keymanagement1/. Bryan, H. (2001). Reply to David Scott and C. Scott Shafer, recreational specialization: AC critical look at the construct. Journal of Leisure Research, 33(3), 344. By the numbers. (2008). Bass Pro-Shops. [Online]. Available: http://vocuspr.vocus.com/vocuspr30/Newsroom/ViewAttachment.aspx?SiteName=basspro&Entity=PRAsset&Atta chmentType=F&EntityID=112488&AttachmentID=7f9f9eb0-2281-4066-b382- c00619b835c8. Company overview. (2008). Bass Pro-Shops. [Online]. Available: http://www.onlinepressroom.net/basspro/. Gerstein, D.M. (2005). Securing America's future: National strategy in the information age. Westport, CT: Praeger Security International. Hepner, R. (2001, July 6).

Security Management Is a Process That Functions
Words: 694 Length: 2 Pages Topic: Business - Management Paper #: 80072827

Security Management is a process that functions systematically to identify and evaluate risks-posing threats whilst taking appropriate actions and resolutions aimed at safeguarding the company. Some security managers have the perception that risk is the future possibility of an occurrence that is bound to cause a negative impact, while keeping in mind that risk has also the possibility of providing future opportunities. In the course of taking up risks,

Security Implementation of
Words: 3464 Length: 10 Pages Topic: Business Paper #: 4428986

Information System Security Plan The information security system is required to ensure the security of the business process and make the confidential data of the organization secure. The organization's management is required to analyze the appropriate system to be implemented and evaluate the service provided on the basis of their required needs. The implementation of the system requires the compliance of organizational policies with the service provider to ensure the maximum