Abstract
The below mentioned paper is a Business communication assignment. Continued awareness of the staff and the management people is the heart of any information security system. The aim of this paper is to plan a security system based on the security requirements of the organization and to define the goals of implementing security.
The basic aim of a management security system is to make sure that the people involved in the management of the organization have a clear understanding of the policy, standards and other security procedures up to an acceptable level. This paper aims at facilitating the maintenance and design of a detailed information security awareness scheme and an information training and teaching method. It is the people and not technology which acts as the weakest thread in the Information systems security control. Common awareness and proper education are both essential aspects of constructing a human firewall and the related mental procedure that follows. Christopher through his essay, “The Human Firewall” highlights the exposure organizations face from the humans.
Specific training programs with the following motives are best suited for securing the confidential details of an organization. These include the following:
- Understand and realizing the true nature and priority of the security essentials of an organization.
- Identifying the major threats related to the illegal and undesired activities.
- Realizing the security implications of business plans for future and understanding their effect on the components and present network configuration.
- Making oneself understand the business strategies within an organization.
- Understanding the security essentials of futuristic business plans and the reliant business activities.
- Moreover, the money spent on such kind of awareness programmes should be worth the benefit they draw by the end.
These days, a lot of professional companies do the task of providing electronic security in the world. One such expert company is Zicom with a turnover of 450 crores annually while operating in five different countries. It introduced the Zicom command centre in 1995 along with wireless security equipments in home and retail segment. Zicom also introduced the Security services called SAAS also known as security as a service.
References:
Cooper, Lynne P., Nash, L. Rebecca, Phan, Tu-Anh T., Bailey, Teresa R., (2004), “Using Knowledge-Based Systems to Support Learning of Organizational Knowledge: A Case Study”, Jet Propulsion Laboratory,
California Institute of Technology, Pasadena, CA 91109-8099. 24.D. Pottas , Sebastiaan H. von Solms, Superseding Manual Generation of Access Control Specification - From Policies to Profiles, Proceedings of the IFIP TC11, Ninth International Conference on Information Security:
Computer Security, p.327-342, May 12-14, 1993 25.Guenther, Melissa, (2002) “Security Awareness Evaluation Form” Melissa Guenther, LLC.
Hannagan, Tim, 2002, ‘Management, Concepts and Practices‘, 3rd 26. Edn, Pearson Education Ltd, UK, 27.Katzke, S, "A Government Perspective on Risk Management of Automated
Information Systems", Proc. 1988 Computer Security Risk Management Model Builders' Workshop, NBS, Gaithersburg MD, USA, 1988.
28.Kindon, John W. (1984), “Agendas, Alternatives and Public Polices”, Boston, Little, Brown.
29.Mead, Richard, 1998, ‘International Management, Cross-Cultural Dimensions‘, 2nd Edn, Blackwell Publishing, UK,