logo

Security Plan And Security Management

   

Added on  2022-08-15

11 Pages1883 Words12 Views
Running Head: SECURITY PLAN
Security Management Plan
Name of the Student
Name of the University
Author Note

SECURITY PLAN
1
Table of Contents
Introduction......................................................................................................................................2
Matrix for hiring trained personnel..................................................................................................2
Company Policy...............................................................................................................................3
Liability Issues.................................................................................................................................4
Development of operating budget for the coming Fiscal Year........................................................5
Plan for handling complaints and compliance.................................................................................7
Conclusion.......................................................................................................................................8
Reference.........................................................................................................................................9

SECURITY PLAN
2
Introduction
The company deals with providing physical and personal protection in terms of computer
and mobile devices. The security of the assets of the company is also important in the company
(Nielsen, 2015). In order to provide required amount of services to the customers more trained
officers will be required in the company.
In the below report the hiring matrix will be discussed along with company policies,
identification of liability issues, development of operation budget for the coming fiscal year and
procedures to handle the complaints and compliance with harassment, discrimination and
misconduct within the company.
Matrix for hiring trained personnel
The hiring of skilled and trained personal in the company must be conducted in the below
format.
Cyber Security Management
Officer
Candidate
1
Candidate
2
Candidate
3
Candidate
4
Candidate
5
Required Experience:
professional Degree in Cyber
security, 5 years of experience,
Local resident, Rotation shift.
Eligibility Criteria: 2-5 years
of experience, Diploma in
Cyber security
Table 1: Application screening process

SECURITY PLAN
3
Questions Candidate
1
Candidate
2
Candidate
3
Candidate
4
Candidate
5
What is the difference between
vulnerability, threat and risk?
What is monitoring of DNS?
Why is encryption and
decryption required?
What is SSL?
How compromised systems
can be identified?
Table: 2 Interview Matrix
Company Policy
As the company is specialized in providing physical and personal protection to its
customers, hence the structure of the policy that will address the concerns and issues related to
the privacy of the company in gathering intelligence and surveillance for its customers are as
follows:
Governing the network Services- This will contains the ways the company will handle
the unauthorized access, remote configuration of IP, the devices security are
incorporated in this point along with company network intrusion (Carcary et al., 2016).
Policies of Data Security- Configuration of operation system, servers, regulations and
rules related to the handling of the server and the OS. The ID and passwords are

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Management Plan Analysis Report
|13
|703
|16

Cyber Security Part 3
|9
|2221
|135

Cyber Security Framework and Capacity Building for Cyber Security Acculturation
|18
|4434
|292

Cyber Security Management Report 2022
|17
|2393
|34

Security Issues in IoT and IT Infrastructure
|18
|4683
|229

Information Security System: Analysis of Incidents and Management Measures
|13
|2018
|472