logo

Strategic Information Security Assignment (Doc)

10 Pages2904 Words76 Views
   

Added on  2020-09-17

Strategic Information Security Assignment (Doc)

   Added on 2020-09-17

ShareRelated Documents
Strategic InformationSecurity
Strategic Information Security Assignment (Doc)_1
Table of ContentsINTRODUCTION...........................................................................................................................1Main body........................................................................................................................................1Assistance in developing a security program..............................................................................1Reflection on current roles and titles of the security personnel and suggestions forimprovements..............................................................................................................................2Plan to make such changes incorporating training requirements...............................................3Determining if the organisation uses any ISO security standards and provide reasoning whichsecurity model would be more suitable.......................................................................................4Threat determination ..................................................................................................................5Risk assessment...........................................................................................................................6CONCLUSION ..............................................................................................................................6REFERENCES................................................................................................................................8
Strategic Information Security Assignment (Doc)_2
INTRODUCTIONStrategic information security can be simply defined as plans of enforcing security in theorganisation. It is a very essential as various threats to information security is occurring day byday. It prevents access of unauthorised users, usage, revelation, interruption, alternation ordestruction of information (Collier, 2017). The present report is based on the management ofinformation security for the NHS (National Health Service ). In this project, the development ofa security program on the basis of the size of organisation such as small, medium or large isexplained. The present role and responsibilities of the security personnel is also described here. Main bodyAssistance in developing a security programIt has been seen that the important data of the organisation is being hacked by intruders.Security programs can be used in NHS for providing protection in order to conserve or securethose sensitive informations. Corporation can adapt various processes to develop a securityprogram. Some of the important one are listed below:Make security part of company culture : Hackers wants to hack the informations ordetails of patients , so hospitals and other health centres are the main targets of them.These enterprises can adopt such type of norms and values that can provide themprotection and security at the core of operations (Chinthapalli, 2017). By this way, theycan aid workers in keeping a proactive mindset of paying attention to security from thefirst day. NHS can use tactics such as mentor program, town halls, professionalimprovement for better communication with their staff members.Don't treat it as “check the box” : Running through the motion can increase the level ofvulnerabilities of corporations to the faster – developing nature of cyberattacks.Malicious users are continuously coming up with ingenious plan of actions to penetrateand crippled the systems. Their hostility can only be full filled by retroactive,innovational thought geared toward acting a pace ahead (Galliers and Leidner, 2014). Itis essential to know by the enterprise about the what legacy systems are present on theirnetwork and where they might have possible vulnerability. Abstracting legacy systemsfrom the primary networks would assist in limiting the revealing to attacks.1
Strategic Information Security Assignment (Doc)_3

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Cybersecurity: Protecting Home and Office from Cyberattacks
|12
|2626
|224

PfSense: A Comprehensive Cybersecurity Tool for Intrusion Detection System
|20
|3463
|311

Network Security and Types of Security Threats and Attacks in Information Technology
|8
|2577
|274

JP Morgan Data Breach
|5
|722
|96

Information Systems Security: IT Security Fundamentals, Vulnerabilities, and IBM Security Architecture
|5
|747
|57

Ethical Issues in Technology and Hacking
|4
|1264
|132