Security Organizations And Strategic Planning Essay

PAGES
6
WORDS
1702
Cite

IT Security Infrastructure IT Security Infrastructure & Its Importance to Physical Security Planning and Infrastructure

IT security infrastructure requires a varied number of skills and knowledge to understand how it relates to creation of comprehensive security strategy. Information technology is an important part of physical planning. Risks of cybercrime having gone high, it has become important for information to run securely through cloud. Business have moved to it infrastructure to store up data. Encryption of data has heightened safety of data against cyber threats. Keeping IT infrastructure secure is a task that that never ends. To ensure infrastructure security, the software must be up to date. Thinking of the need to keep business infrastructure free from unauthorized access is thinking of taking measures that will ensure top security (Garcia, 2007).

Some of the IT infrastructure; for example data and email encryption, is important for business data security. Data backup has made it possible to store up data with encryption. Use of antivirus has made data storage even safer. This is because antivirus eliminates risks of corruption of operations and data-driven viruses. IT infrastructure security co-relates with physical planning and infrastructure in many ways. (Fennelly, 2016) Critical infrastructure such as airports require secured IT infrastructure to safely run its operations. Airports require secure IT infrastructure to safely help you keep track of its day to day sensitive activities. Creating cities strategically require secure IT.

Secure IT can help in creating a livable city free of terrorism. Spatial planning of strategic residential places, business or tourism attractions also require secure IT infrastructure. Creating policies, regulations and governance structures that promote sustainable growth require IT infrastructure. Physical security planning, work hand in hand with secure IT infrastructure. This is because security planning is critical and sensitive. Tracking day to day operations in companies with a secure IT infrastructure as a crucial component (Khairallah, 2006).

Business Continuity Plans and their Importance

Business continuity plans basically involve strategy creation, recognizing and putting into consideration risks. Business planning focuses on ensuring that business assets and personnel remain functional even when disaster strikes. A business continuity plan is crucial in defining potential business risks. It addresses how the risks may affect operations in the business. To ensure safety in implementing the plan, defining possible risks is an important factor. Mitigation measures are an important part of planning. Every proactive organization with a continuity plan they use to project ahead. A business continuity...

...

A business plan helps organize a plan on what to work on. Identification of the required skill and organization is a function of the business plan (Fennelly, 2016).
A comprehensive business plan identify the services to be rendered by the organization or business. A continuity plan prepares the business with ways to curb disaster if and when it strikes. It is important to implement business continuity plan. This is because a business continuity plan helps review weaknesses within the organization. Business continuity plans address basic concerns in the organization. Implementing a business continuity plan will help keep the original and basic function of the business. Implementing the business continuity plan is useful in case of labor disputes. It reveals back up plans. Implementing business continuity plan will ensure that company standards are complied with by all. This is because the plan points out how operations must be run in the organization. Valuable business data is gained through the implementation of continuity plan. It preserves the reputation of the organization. The impact of implementing a business continuity plan is positive in realizing organizational goal (Fennelly, 2016).

Physical Security: What a Physical Security Site Survey Entails & Its Benefits

Physical security involves the various security measures put in place to prevent unauthorized access to equipment, buildings, facilities and resources. It protects property and personnel from harm or damage such as theft, espionage or even terrorist attacks. Multiple layers of inter-related systems are used in physical security. They include CCTV surveillance, security guards, locks, protective barriers and access control protocols, among other methods. A physical security survey involves three major stages. The first stage involves intelligence gathering. In this stage, information is collected on the company, its objectives and operations, and a risk assessment carried out. The assessment identifies the business or company assets in need of protection and their value. It also defines the types of adversary likely to be encountered and possible threats such as trespass, robbery, insider attacks, etc.

The second stage of a physical security survey involves access to information about the facility or business and its location. Commercial rural and inner city include location information likely to be obtained. The building structure, boundary, history, condition and prevailing protective measures such as bolts, alarms and bars may include information about a business building or facility. Structured processes such as interviewing of important employees, insurance assessors and crime prevention officers, and observation are used…

Sources Used in Documents:

References

Erbschloe, M. (2005). Physical security for IT. Amsterdam: Elsevier Digital Press.

Fennelly, L. J. (2013). Effective physical security. Waltham, Mass: Butterworth-Heinemann.

Fennelly, Lawrence J. (2016). Effective Physical Security (5th ed.). Butterworth-Heinemann.

Khairallah, M. (2006). Physical security systems handbook: The design and implementation of electronic security systems. Amsterdam: Elsevier/Butterworth-Heinemann.

Garcia, M. L. (2007). Design and evaluation of physical protection systems. Elsevier.



Cite this Document:

"Security Organizations And Strategic Planning" (2018, December 14) Retrieved April 26, 2024, from
https://www.paperdue.com/essay/security-organizations-strategic-planning-essay-2172932

"Security Organizations And Strategic Planning" 14 December 2018. Web.26 April. 2024. <
https://www.paperdue.com/essay/security-organizations-strategic-planning-essay-2172932>

"Security Organizations And Strategic Planning", 14 December 2018, Accessed.26 April. 2024,
https://www.paperdue.com/essay/security-organizations-strategic-planning-essay-2172932

Related Documents

Strategic Planning and Implementation Over the last several years, identity theft has become a major issue that a number of individuals are dealing with. This is because criminals are using various techniques to be able to gain access to a host of personal information including: bank accounts, credit card / social security numbers and the date of birth. Once this occurs, is when they can assume the identity of this person

Strategic Planning for Companies Strategic Planning for Cincom Systems Creating transformational change in companies by automating their most challenging processes, strategies and systems is what Cincom Systems excels at today. The company has five different product divisions, each selling enterprise software into various segments of the Customer Relationship Management (CRM) marketplace. Privately held with 700 employees employed across five continents, Cincom is also profitable and has had many customers on maintenance contracts

These values have a high degree of alignment with the organization's short-term plans. Iron Mountain is presently planning to continue its expansion, but also to build stronger brand loyalty in order to fend off competitors who trade on strong customer relationships. These values bring Iron Mountain closer to those competitors in terms of the way Iron Mountain relates to its customers, delivering a high degree of alignment in the process. There

" Of these respondents, over 50% of them stated that they lack a disaster recovery plan (Anthes, 1998). However, most of the problems stem from the lack of communication at the corporate level. (Hawkins, et al., 2000). Business Continuity Plans (BCP) and other forms of strategic planning are no longer a luxury, but a must-have factor and an important element of any organisation's risk management system. Organisations are increasingly dependent upon

1. From whom did you gather the information for the paper? Information for this paper was obtained from Col. Cheatham: he provided the 501 CSW Strategic Planning Final Draft Results and slides. Col. Cheatham is the Vice Wing Commander of the 501st Combat Support Wing (CSW) and is tasked with supplying world-class combat support from eight different installations. Col Cheatham obtained his commission in 1996 from the U.S. Air Force Academy

Canada. Increase benefits To gain more employees for the nursing staff, SKMC should increase their level of satisfaction by offering several incentives such as increased living expenses or better housing facilities. Moreover, they should include full medical coverage in the work contract. Regarding the foreign employees they should expand the annual leave from 42 days to at least 60 days in order for the abroad workers to be able to spend