logo

Security Management Report - ISMS, Physical Security, Access Control, Surveillance Systems, IDS

   

Added on  2022-11-23

22 Pages4174 Words335 Views
Running Head: Security Management 0
Security
Manage
ment
Report
Student name

Security Management 1
Table of Contents
PART 1........................................................................................................................ 2
Integrated Security Management System (ISMS).......................................................2
Emergency Response Plan......................................................................................... 3
Security Awareness.................................................................................................... 4
Physical Security........................................................................................................ 5
Electronic Access Control Systems.............................................................................5
Surveillance Systems................................................................................................. 6
Intrusion Detection System (IDS)............................................................................... 7
Network diagram..................................................................................................... 8
Service diagram...................................................................................................... 9
Features of ISMS....................................................................................................... 10
PART 2...................................................................................................................... 10
Security Training..................................................................................................... 10
What are the features of Annual safety attention?................................................11
Security Training Plan............................................................................................... 12
Contact person for training................................................................................... 13
Name.................................................................................................................. 13
Security and the Privacy Act.................................................................................13
Training Resources................................................................................................... 14
References............................................................................................................... 15

Security Management 2
PART 1
Company profile
Murata is a well-known company in Malaysia. The company is working in the
electronics-manufacturing field. It is a subsidiary of Murata Manufacturing Company
Ltd. in Japan. It manufactures different electronic components and supplies them in
Southeast Asia and all around the world. The company has 1028 permanent
employees and 174 contract workers.
Integrated Security Management System (ISMS)
The ISMS can manage five important elements of an organization, which are
necessary to secure all the business functions, such as building, sensitive area,
perimeter, people, and information technology centre. According to (Klassen,
2018), Integrated Security Management System (ISMS) is beneficial for an
organization in their security of different assists. In addition, most of the
organizations are having information assets, which require high security and
privacy. There are various methods for providing security to an organization, such
as CCTV, Voice configuration, and many others. It is necessary to monitor all the
processes and takes actions.

Security Management 3
Source: (Stttech, 2019)
There are various tools and techniques, which can be used for the security of the
organization, which areas:
Internet of Things (IoT)
Cloud-based services
Access control system
Network surveillance system
Biometric systems
Traffic barrier system, and
Many others
All those systems are providing help to the organization to secure their assets from
any type of theft, which can create critical issues, such as Denial of Services,
Malware, physical damage, and many others. There are various methods of
security, which provide more security to the organization, such as training and
education about the security of various assets of the organization.
Four layers of security
There are main four layers of security in ISMS, which areas:

Security Management 4
Application Layer
Platform Layer
Network Layer, and
Sensor Layer
All layer are connected with each other provide data to each other. There are
various things available in the market to secure an organization. From the last two
decades, the organization has adopted emerging technologies to implement
integrated security to the organization.
Sensor layer takes data from sensors and passes the data to the network layer
using various type of sensors, such as Camera, detector, smartphones, RFID, and
sensors. Network layer sends this data to the platform layer using the internet,
private network, and many others. Platform layer process that data using service
support platform, network management, information processing, and others.
Information is used for security in various systems, such as as energy-saving, fire
alarm, data security, and many others.
Source: (de Wijs, et al., 2016)
Physical Security
Two basic duties of performing physical security

Security Management 5
Observe the critical situation
Report to the senior person for that incident
Three initial steps are taken with a security threat:
Identify the threat
Report it
Discuss and develop a solution that eliminates the problem
The benefit to enhance the protection
The company uses various security system for securing their resources and
products. It will reduce their losses from damages of products and other things. In
addition, protection is highly increased because of ISMS. Sensors can be used for
various types of issues in the company, such as fire sensor, sound sensor, humidity
sensor, and other protection.
Emergency Response Plan
An organization must have an emergency response plan at various places in the
premises to secure people and assets from any fault or damage. There are many
emergencies in the electronic manufacturing industry, such as fire, high voltage,
and many others. Therefore, it is necessary to find risks in the organization and
provide their controls based on their ranks.
In addition, the organization should have a proper recommendation to use different
instruments. There is an emergency then there should be some mitigation rules and
responsible person to handle them, such as supervisor, in-charge, and others.
Moreover, risk register must maintain and follow by the staff members in their
works.
Serial
number
Risk Response Responsible
person
Remark
1. Fire Use fire
distinguisher to
In-charge Take
immediate

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Physical Security is the Process of Securing the Hardware
|8
|2647
|154

ENISA Big Data Security – Challenges and Recommendations (PDF)
|13
|3228
|258

Security and Privacy issues in IoT enabled Smart Cities
|23
|6142
|87

Network Security Assessment: Physical, Mobile, Perimeter and Host Defense
|8
|2647
|67

Big Data Security Infrastructure ENISA - Report
|13
|3369
|187

Cyber security Planning and Compliance (pdf)
|11
|3109
|30