Verified Document

Security Policy And Risk Strategy Essay

An IP San is a fiber optic channel that can provide secure real time data to each location. Where, software and security applications can be adapted to the current system that is being used. The Snap Lock is: a security software that can be used to provide an effective way for each location to retrieve, update and change information. Support for why these procedures and products are the optimal approach for this organization

The reason why these different procedures and products were selected was: to reduce the overall risk exposure of the company's external threats. The current system that is being used by MMC increases risks dramatically, by having a number of different systems, where financial information is stored. If any one of these systems is vulnerable, there is the possibility that you could see a major security breach. To reduce these risks requires limiting the number of locations to two. You would then, use fiber optics and other high speed protocols to deliver the data to each location. The IP San was chosen, because it can effectively adapt to the current system that is being used, it works with a variety of financial programs and it offers secure connections. ("IP San, " 2010) You would then, use the Snap Lock security software as an added layer of safety against possible breaches. This system would work more effectively, because it would create a virtual fortress around the company's it infrastructure. ("Snap Lock Compliance and Snap Lock Enterprise Software," 2010)

High level architectural and design details for how and where these procedures and products will be implemented within the organization

The way that the above mentioned tools will be implemented into the company's it infrastructure is through: a system of creating one integrated structure and then implementing the different pieces into the one protocol. This will be accomplished by establishing the new protocol independently of the current system. Then, as you are integrating the pieces for the current system into the new protocol, you will be training and updating the staff about the new system. This will allow for sufficient...

The use of a single it protocol that can streamline all data / information; has shown to be cost effective and can increase the overall security of the system. At which point, you are taking this new protocol and are constantly testing it for vulnerabilities. This will ensure that the company is able to adapt to the different changes that are occurring in the world of it security. Once, management and various it personnel are aware of these issues, the risks dramatically decrease for each breach. This is supported by information from the Department of Homeland Security, which found that those companies who are not testing their system and looking for various weaknesses; could be the most vulnerable to these different issues because of their false sense of security. (Mason, 2010)
Clearly, MMC needs to implement a new security risk protocol. This is because the current system that is being utilized; has a number of locations that are storing all of their customers personal financial information. As a result, the chances increase exponentially of hackers being able to successfully breach the system. To prevent such instances, requires that the company implement one it protocol that will be in at two locations. This will provide increased amounts of security, by ensuring that all information is provide via high speed fiber optics network. You would then, implement Secure Lock to provide an added layer of protection. If the company can implement such a system, they will dramatically reduce risks, by facing these issues.

Bibliography

IP San (2010). Retrieved May 27, 2010 from Net App website: http://www.netapp.com/us/products/protocols/ip-san/ip-san.html

Snap Lock Compliance and Snap Lock Enterprise Software. (2010). Retrieved May 27, 2010 from Net App website: http://www.netapp.com/us/products/protection-software/snaplock.html

Mason, J. (2010). How to Bullet Proof Your DR Plan. Retrieved May 27, 2010 from Net App website: http://www.netapp.com/us/communities/tech-ontap/tot-data-recovery-plan-0908.html

Sources used in this document:
Bibliography

IP San (2010). Retrieved May 27, 2010 from Net App website: http://www.netapp.com/us/products/protocols/ip-san/ip-san.html

Snap Lock Compliance and Snap Lock Enterprise Software. (2010). Retrieved May 27, 2010 from Net App website: http://www.netapp.com/us/products/protection-software/snaplock.html

Mason, J. (2010). How to Bullet Proof Your DR Plan. Retrieved May 27, 2010 from Net App website: http://www.netapp.com/us/communities/tech-ontap/tot-data-recovery-plan-0908.html
Cite this Document:
Copy Bibliography Citation

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now