Poor Infrastructure Security -- Model Essay

PAGES
2
WORDS
527
Cite

The use of role-based knowledge management and security is implied in the structure of the proposed security equilibrium model. Anchoring this model in security governance and processes allows access to data and information to be role-based, measured for accuracy and much more aligned to the specific goals of users, team members, and facilitators. The technique or function to attain this level of role-based access to data needs to begin with a focus on creating profiles for each variation of users, team members and facilitators that only provides access to data of relevance. Finally the quantification of trust through the use of analytics and metrics can also ensure this model delivers credible, transferrable results on a dependable basis over time. Rather than relying on a series of theories to anchor the model, actual dashboards of scorecards can be used to effectively manage the levels of role definition, risk, and underscore the...

...

The nature of the first model shown in Figure 5.4 shows the need for changing perceptions to anchor information exchange. With his model the focus can be on creating a measurable outcome of effective security strategies, alleviating the confusion over roles and missed system integration points that can lead to more effective enterprise-wide security over time.
Organizational security policies

Individual Security Practices

Exploits

Velocity of system changes that can cause security threats

Quantification

Of Trust

Security of Processes and Systems

Actions

Tight

Manifests

Interprets

Realizes

Explores

Loose

Consistency of Security Roles and Definitions

Security Governance and Processes

Cite this Document:

"Poor Infrastructure Security -- Model" (2011, September 29) Retrieved May 16, 2024, from
https://www.paperdue.com/essay/poor-infrastructure-security-model-45909

"Poor Infrastructure Security -- Model" 29 September 2011. Web.16 May. 2024. <
https://www.paperdue.com/essay/poor-infrastructure-security-model-45909>

"Poor Infrastructure Security -- Model", 29 September 2011, Accessed.16 May. 2024,
https://www.paperdue.com/essay/poor-infrastructure-security-model-45909

Related Documents

Security Management Strategies for Increasing Security Employee Retention Design Effective Job Characteristic Model Skill Variety Task Identity and Task Significance Autonomy and Feedback Meeting Expectations Market Competitive Package Strategies for Increasing Security Employee Retention Security employees constitute the most important component of organizational workforce. It is because; they ensure the core survival of organization and its assets. However, the ironic fact is the security employees are considered blue collar workers and their compensation packages are low (Hodson & Sullivan,

Security management is "described in some quarters as a function of risk management," (Bulletin 2, Part 2). Although there is some crossover with public sector security functions, such as policing, security management is generally considered a private sector domain. "Whilst private security has a predominantly commercial basis, it should not be forgotten that it does interact with the public to a considerable degree," (Bulletin 2, Part 2). Security management is

Security Management The role of a security manager varies widely according to the particular organization and its needs, but despite this variety, there remain certain best practices and policies that can help maintain security and stability. This is nowhere more true than in the case of organizational loss, because while loss can mean widely different things depending on the field, the underlying theoretical concepts which inform attempts to minimize loss are

Security Management at Aviation and Healthcare Sectors Security Management Essay This paper discusses the concept of aviation security management and security management at healthcare settings. In addition to that, this paper also lists down and describes the important factors that can have an influential impact on the functions of aviation and a healthcare security manager. Security Management at Aviation and Healthcare Sectors Aviation Security The general aviation security confronts a number of security challenges. The

Security management 1. In a civil action, how can a claim of negligent hiring have a greater chance of succeeding? Jurisdictions have been increasingly putting laws in place pertaining to what makes organizations a potential target for a lawsuit on negligent hiring. Though in most instances, claims of negligent hiring may be effectively fended off, it proves increasingly tricky in the following cases: · If the individual harming or injuring another is an

The reality is however that legacy systems pose the greatest potential risk to any enterprise, as these platforms are anachronistic in terms of security support, lack many common safeguards, and don't have the necessary Application Programmer Interfaces (APIs) to scale globally as a secured platform (Gupta, Roth, 2007). Legacy systems were designed in an era where single authentication for an entire enterprise system was sufficient enough, and the concept