Verified Document

Security Monitoring Strategies Creating A Unified, Enterprise-Wide Essay

Security Monitoring Strategies Creating a unified, enterprise-wide security monitoring strategy for any organization must be based on a series of strategic goals and objectives that encompass every functional area and system of a business. The intent of this analysis is to define the objectives that must anchor a security monitoring strategy to ensure its success, followed by specific recommendations for security monitoring of each major functional area.

Defining Security Monitoring Strategies

For an enterprise-wide security management strategy to be successful, the monitoring systems and processes must seek to accomplish three key strategic tasks. These tasks include improving situational awareness, proactive risk management and robust crisis and security incident management (Gellis, 2004). With these three objectives as the basis of the security monitoring strategies and recommended courses of action, an organization will be able to withstand security threats and interruptions while attaining its objectives.

Beginning with the internal systems including Accounts Payable, Accounts Receivable, Inventory, General Ledger, and Human Resources, monitoring needs to be designed to capture strategic threats at the operating system and application level to be effective (Nagaratnam, Nadalin, Hondo, McIntosh, Austel, 2005). Each of the applications in these areas of enterprise software is designed to be used in the context of user's roles and information needs. Restricting access to sensitive information by role as defined in these applications is critical to the monitoring of resources and their effectiveness in delivering value to the organization (Gordon, Loeb, Tseng, 2009). Creating a governance framework hat can provide for enough role-based flexibility while monitoring overall performance is critical for an organization to keep accomplishing its goals while also staying secure (Khoo, Harris, Hartman, 2010).

Often the many internal systems of a business...

Parts of this document are hidden

View Full Document
svg-one

Many organizations use Enterprise Resource Planning (ERP) system to unify these many systems into a single system of record to make security management and monitoring more cost-effective (Gellis, 2004). For the many internal IT systems that require IT monitoring, integrating them into a common system of record is also critical as it allows for auditing of cross-system and intra-system transactions. Too often organizations fail in their security monitoring strategies by allowing silos of systems to dominate their overall IT architecture (Nagaratnam, Nadalin, Hondo, McIntosh, Austel, 2005). By applying security monitoring at both the strategic IT level including the system of record and at the role-based access level of each application, organizations can attain a 360-degree level of system monitoring compliance and threat assessment.
Having an integrated system security structure also allows for more effective risk management strategies including the ability to isolate and act on security incidents more effectively than siloed systems allow for. Each of the mission-critical systems within a business, encompassing Accounts Payable, Accounts Receivable, Inventory, General Ledger, and Human Resources rely on integration with systems and processes external to the company as well. Integrating to systems outside the organization also present risks to the entire organization as well. These external integration links, whether automated through the use of advanced system technologies or defined through the use of logins and passwords, must be monitoring and audited as well (Gellis, 2004).

The risks and need for security are amplified by the use of Internet-based marketing, sales and e-commerce systems (Kesh, Ramanujan, Nerur, 2002). Monitoring of these applications is more challenging as they are open to the public. The first area of monitoring is on security authentication and attempts to break into sales,…

Sources used in this document:
References

Desai, M.S., Richards, T.C., & Desai, K.J. (2003). E-commerce policies and customer privacy. Information Management & Computer Security, 11(1), 19-27.

Gellis, H.C. (2004). Protecting against threats to enterprise network security. The CPA Journal, 74(7), 76-77.

Ghosh, A.K., & Swaminatha, T.M. (2001). Software security and privacy risks in mobile e-commerce. Association for Computing Machinery.Communications of the ACM, 44(2), 51-57.

Gordon, L.A., Loeb, M.P., & Tseng, C. (2009). Enterprise risk management and firm performance: A contingency perspective. Journal of Accounting and Public Policy, 28(4), 301.
Cite this Document:
Copy Bibliography Citation

Related Documents

Security Management Strategies for Increasing Security Employee
Words: 2501 Length: 8 Document Type: Essay

Security Management Strategies for Increasing Security Employee Retention Design Effective Job Characteristic Model Skill Variety Task Identity and Task Significance Autonomy and Feedback Meeting Expectations Market Competitive Package Strategies for Increasing Security Employee Retention Security employees constitute the most important component of organizational workforce. It is because; they ensure the core survival of organization and its assets. However, the ironic fact is the security employees are considered blue collar workers and their compensation packages are low (Hodson & Sullivan,

Securities Regulation of Nonprofit Organizations
Words: 12607 Length: 45 Document Type: Dissertation or Thesis complete

Securities Regulation SECURITIES REGULARIZATIONS IN NON-PROFIT ORGANIZATIONS The ensuring of the fact that an organization is working as per regulations and is following the code of conduct, while keeping the interest of the public first, are matters which are becoming more and more complicated with the passage of time. Therefore, it can be said with some emphasis, that today one of the most basic issues of many organizations is the issue of

Security for Networks With Internet Access
Words: 4420 Length: 12 Document Type: Term Paper

Security for Networks With Internet Access The continual process of enterprise risk management (ERM) has become an integral component of successful organizational assessment, because the process of accurately identifying various risk factors, and interpreting their potential advantages and disadvantages, ensures that a business remains capable of anticipating and addressing internal and external contingencies. The following ERM implementation plan for the security of internet-accessible networks is intended to provide a navigable framework

Security in Cloud Computing
Words: 3274 Length: 10 Document Type: Research Paper

Security in Cloud Computing Security issues associated with the cloud Cloud Security Controls Deterrent Controls Preventative Controls Corrective Controls Detective Controls Dimensions of cloud security Security and privacy Compliance Business continuity and data recovery Logs and audit trails Legal and contractual issues Public records The identified shortcomings in the cloud computing services and established opportunities for growth regarding security aspects are discussed in the current research. The security of services is regarded as the first obstacle. The opportunity for growth is provided as combination

Security Management Security Measures Risk Management
Words: 1552 Length: 5 Document Type: Essay

Security management is "described in some quarters as a function of risk management," (Bulletin 2, Part 2). Although there is some crossover with public sector security functions, such as policing, security management is generally considered a private sector domain. "Whilst private security has a predominantly commercial basis, it should not be forgotten that it does interact with the public to a considerable degree," (Bulletin 2, Part 2). Security management is

Security Management the Role of a Security
Words: 4672 Length: 15 Document Type: Essay

Security Management The role of a security manager varies widely according to the particular organization and its needs, but despite this variety, there remain certain best practices and policies that can help maintain security and stability. This is nowhere more true than in the case of organizational loss, because while loss can mean widely different things depending on the field, the underlying theoretical concepts which inform attempts to minimize loss are

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now