Security for Networks With Internet Access
The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework for the development of a comprehensive ERM standard, including procedures to guide internal auditing and the construction of a capable and contemporary cyber law policy. Within the organizational structure of any complex enterprise, such as a small software development business, the continual exchange of data necessary to facilitate operational efficiency allows for the presence of clearly identifiable risk factors, including hazard risks, financial risks, operational risks, and strategic risks. The purpose of any ERM plan is to assess the various risks associated with the network of online interactions which occur daily between employees, customers, suppliers, investors, and other key stakeholders in the organizational hierarchy, while providing clear standards of conduct intended to mitigate said risks. The threat of external interference with organizational objectives must be mitigated through the application of an effective security and cyber law policy, while the resolution of internal risks associated with employee abuse or misuse of proprietary data is best resolved through strictly applied access control methods. Finally, a clearly distinguished set of cyber law guidelines crafted in congruence with legal precedent for digital media, as established by recent American jurisprudence, must be developed to apprise all members of the organization with relevant copyright, patent, and privacy statutes.
Of the four primary types of risk identified above (hazard risks, financial risks, operational risks, and strategic risks), the operational risks associated with the generation, storage, and exchange of proprietary or otherwise sensitive data is by far the most pressing from on organizational perspective. The threat of external malfeasance, in the form of data theft, hacking, and other nefarious activities designed to stunt the company's continued growth. As the world of modern commerce becomes increasingly digitized, with massive hangar-like buildings used to house the thousands of computer servers necessary to store billions of gigabytes of essential data, large organizations have become keenly aware of the need to safeguard their files and archives from prying eyes. Today's globalized marketplace brings a wealth of advantages in terms of accelerated commerce, but along with these benefits comes an array of threats, from the anarchistic campaigns of targeted computer hackers to infiltration by a competing firm. The field of information security and data protection has emerged to formulate effective defenses against these insidious database invaders, and within the broader spectrum of information technology (IT), data protection has quickly risen to the forefront of the executive decision making process. Several empirical studies have demonstrated that "as organizations use automated information technology (IT) systems to process their information for better support of their missions, risk management plays a critical role in protecting an organization's information assets, and therefore its mission, from IT-related risk" (Stoneburner, Goguen & Feringa, 2002), and it is the responsibility of competent managers to understand and apply the concepts of risk management to the technological aspect of their operations.
Every company that engages in commerce, whether domestic or international, must maintain extensive digital records documenting various transactions, and with the specter of identity theft looming large as ever, effective data protection risk management is a crucial component in assuring customer's sensitive information is shielded. While achieving a 100% data protection rate is obviously the goal of every IT manager, it is more realistic to expect that incursions will occur while managing this risk effectively through preventative measures. Although the majority of major "organizations try to avoid costly information security breaches, organizations cannot make their information 100% secure all of the time" which is why "managing the risk associated with potential information security breaches is an integral part of resource allocation decisions associated with information security activities" (Bodin, Gordon & Loeb, 2008). This process of anticipating security breaches within a data network involves assessing overall strengths and weaknesses and diverting resources appropriately, which is why the most effective managers are expected to maintain a working knowledge of information security and data protection methodology. By recognizing the fact that "in most organizations, the network itself will continually be expanded and updated, its components...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now