preview

Essay on Evaluation of Booz Allen Hamilton Cybersecurity

Best Essays

Introduction During the process of analyzing an organizations effectiveness to manage cybersecurity risks, there are ranges of security policies that need to be implemented. A prime example of this concept is the cybersecurity policies developed for consulting firm Booz Allen Hamilton. The direct division formed to address the firm’s requirements within cyberspace is the Cyber Solution Network (CSN). The CSN division within Booz Allen Hamilton has a range of policies used to ensure the firm is protected against risk.

Cybersecurity Policy Best Practices The use of cybersecurity policies within CSN is to provide security of the divisions assets. The written policies provide guidance on implementation, through references to …show more content…

ii) Humans desiring instantaneous results for access and information, in order to improve response. What is meant to protect an individual maybe perceived as a hindrance, hitting a wall with compliance creates the idea that it is not in our own self-interest. iii) Policy frameworks are infrequently analyzed based on the impact on the organization and users. This creates a false sense of security, when compliance is not actually being adhered to.
b) Security is a Learned Behavior
i) Procedures for cybersecurity are often not intuitive. “Without proper education, users may not recognize the value of assets, risks, and cost of compromise” (Control Data Corporation, 1999, p. 4). This level of functionality must be learned and reinforced. Once the user comprehends the value of the asset they are protecting, they are more inclined to adhere to policies. ii) Management within CSN must be acquainted with “the value of information assets, the risk associated with these assets, and the appropriate protection policies” (Control Data Corporation, 1999, p. 4). Once the critical value the of the development and implementation of cybersecurity policies is recognized, proper funding and support can be given to protect these needs and provide commitment to securing them.
c) Expect the

Get Access