StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security Risk Mitigation Policies - Coursework Example

Cite this document
Summary
It is imperative to protect the integrity, confidentiality, and availability of data from misuse by people inside or outside any facility or organization. Security policies and risk assessment aspects should be identified and characterized. …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER92.3% of users find it useful
Security Risk Mitigation Policies
Read Text Preview

Extract of sample "Security Risk Mitigation Policies"

Security Risk Mitigation Policies It is imperative to protect the integrity, confidentiality, and availability of data from misuse by people inside or outside any facility or organization. Security policies and risk assessment aspects should be identified and characterized. In this case, there is a security issues with the wireless network connection as well as physical breach on customer’s personal data. This was due to weak access control policies within the organization. Therefore, there is need of establishing new risk management policies, which will address the two principal security breaches and mitigate the risks.

Despite the fact that the wireless networking provides numerous advantages, it is also coupled with various security threats which can alter an organization’s overall security profile. In the case of the wireless network bridge, there is need for effective management to the threats linked with wireless technology. Thorough and sound assessment of the risk provided in the environment should be done in order to develop a plan to mitigate it. A framework to assist the managers to fully understand and assess the threats associated with the utilization of a wireless technology should be implemented.

Some of the actions that should be adopted in countering this kind of threat in the organization are as follows. The first option should involve different methods for making it more intricate to intercept and locate the wireless signals. This way, hackers will have a hard time locating the organization’s signal. Additionally, the other principal option will involve utilization of encryption in order to preserve confidentiality even when the wireless signal gets intercepted (Choi et al., 2008).

It will also be imperative for the organization to utilize signal-hiding techniques so as to properly intercept wireless transmissions. This is because for any attacker to successfully intrude into a wireless network, they will first need to locate and identify the wireless network. This will be achieved by utilizing numerous steps that will make it extremely difficult to locate the organizations wireless access point. Therefore, the company should include some of the easiest as well as least costly methods which include turning off the service set identifier (SSID) which broadcasts by wireless access points.

This will not only make it hard for hackers to have no access, but also, it will make it hard for them to access the company’s servers and download sensitive and personal materials. Moreover, assigning cryptic names to the SSIDs will also make it hard to access the organizations data. Additionally, reducing the organization’s signal will provide requisite coverage. By incorporating these aspects into the company’s wireless network, it will provide the necessary security to properly run the dairy operations in a secure manner (Choi et al., 2008). The other major issue was the physical breach into the organizations data due to unauthorized access.

Therefore, the best way to deal with such an issue is by establishing Key aspects of information security. This will include limiting access of information to exclusively authorized entities. This way the people that will have access to the information will be provided with different usernames and passwords that will change every eight hours. Prevention of unauthorized changes to the data, as well as, corruption of proprietary data should be crucial. The company should focus on guaranteeing that only authorized individuals will have apposite access to critical systems and information (IPA, 2000).

Additionally, sensitive data should only be transmitted or shared with intended parties. By implementing the above discussed policies, the company will be able to prevent any further breaches into their system. References Choi, M et al. (2008). Wireless Network Security: Vulnerabilities, Threats and Countermeasures. International Journal of Multimedia and Ubiquitous Engineering, 3(3), 77-86 IPA. (2000). Countermeasures against Unauthorized Access. Retrieved from http://www.ipa.go.jp/security/english/virus/antivirus/pdf/Hacking_measures_eng.pdf

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security Risk Mitigation Policies Coursework Example | Topics and Well Written Essays - 500 words”, n.d.)
Retrieved from https://studentshare.org/information-technology/1649065-security-risk-mitigation-policies
(Security Risk Mitigation Policies Coursework Example | Topics and Well Written Essays - 500 Words)
https://studentshare.org/information-technology/1649065-security-risk-mitigation-policies.
“Security Risk Mitigation Policies Coursework Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1649065-security-risk-mitigation-policies.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Risk Mitigation Policies

White Paper Risk Analysis Metric Machine Parts Supplies Corp

policies, laws and technical controls should be implemented to ensure security of data and a better performing network.... The organization must implement these policies to ensure availability and security of data (Tyson and Crawford, 2011).... hellip; White paper risk analysis metric machine parts supplies corp.... which have the following characteristics: availability, reliability, scalability, security, flexibility, performance management and economic efficiency....
4 Pages (1000 words) Assignment

Security Policy and Social Media Use for Organization

Nevertheless, various policies can be used to mitigate these security risks.... The following sections articulate on the possible policies.... Mitigation measure/policies Creation of social media policies Organization need to create social media policies, including those that relate to privacy issues (Daft and Marcic 178).... For example, financial institutions should raise privacy awareness among the employees as one of the communication strategies in implementing such policies....
6 Pages (1500 words) Research Paper

The Importance of Computer Security

The main theme of Asghapour and her co-researchers were to emphasize the importance of effective security risk communication.... The researchers argue that this requires both communicating risk information and motivating the appropriate risk behaviors.... The crucial argument is that the purpose of risk communication is not transmitting truth to the users, but training them to take an appropriate move to respond against a certain threat to their system....
9 Pages (2250 words) Essay

DBMS Support and Security

The policies aim to increase the benefits of implementing IT in business.... Security strategies are designed as the overall plans to mitigate risk.... Proactive database security management and planning can save organizations significant amounts of money and reduce the overall exposure to risk.... Database security has been overlooked in… It is often not possible to put a price tag on the stored data but the organization knows that it is its most valuable asset....
5 Pages (1250 words) Research Paper

Risk and Security

Next, policies should be developed to make sure everyone follows the set principles.... Data leakage – threats and mitigation.... Besides these, the usage of portable risk and Security AFFILIATION: risk and Security The current era is that of fast information flow.... ConclusionIn a nutshell, technology has its own merits and demerits, and for companies to avoid information security breach, it is necessary that risk assessment be done properly (Elky, 2006)....
1 Pages (250 words) Essay

Risk Management model for Mitigation

Proper usage of the records to assist in making crucial decisions or policies.... According to Rush and Vednere (2014), there… They include: These arise from financial lows such as loss that significantly hinder, and dominate Risk Management model for mitigation The art of records management is a crucial element in determining the performance of bigcompanies and businesses.... Next, each risk should have a response (mitigation) to counter it, if it occurs....
2 Pages (500 words) Essay

Foreign Policies on Climate Change Memorandum

This paper assignment example "Foreign policies on Climate Change Memorandum" represents a policy memo, offering foreign policy suggestions to the president.... The conflicts could potentially lead to wastage of money time, money, and even risk lives.... However, delegate certain disasters like the rise in sea levels fall under the Department of security....
4 Pages (1000 words) Essay

Healthcare Informatics

Or whether there are appropriate policies for these social sites that guarantee the safety of the information to avoid health data security breaches that may turn costly on the part of the information owners?... There are often discussions of diseases that someone may be suffering from, the possible treatments and may be the best physician that others on the site have had experience with (Li, 2013)....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us