The Need for Information Security Management for Small to Medium Size Enterprises
ICT 357 Information Security Management
Leong Yuan Zhang
31741147
Trimester 1
Murdoch University
Contents Abstract 2 Introduction 2 Justifying The Need for Sound Information Security in Any Organisation 2 Linking Business Objectives with Security 3 Incident Response Management and Disaster Recovery 4 Mobile Device Security Managment 5 Biometric Security Devices and Their Use 6 Ethical Issues in Information Security Management 7 Security Training and Education 7 Defending Against Internet-Based Attacks 8 Industrial Espionage and Business Intelligence Gathering 9 Personnel Issues in Information Security 9 Physical Security Issues in Information
…show more content…
Despite that, most organisations do at least have some form of basic security in the form of anti-virus softwares. Other types of security software like firewall or authentication software/hardware are considerably less popular; perhaps due to the additional complexity of having to install and configure them for the organisation usage (ABS, 2003).
Linking Business Objectives with Security
Security can impact a company's profitability in both positive or negative ways. It fully depends on how it is being controlled, too little will not be enough while too much may cause bottlenecks within the company internal processes. One example would be background checks on possible new employees. At times, the duration of the check may take longer than the period of employment, especially when hiring temp staff to cover short term. In their book, Christian Byrnes and Paul E. Proctor argues that to eliminate the last 20% of risk that might occur would inversely required 80% more money to implement which can be seen in Figure 1.
Figure 1
It is common practice in large organisations to organise computer security around technologies, with a dedicated department running the show alongside the IT department. However computer security should be more business oriented as it is easier to achieve the security targets if good business practices are being followed. For SMEs, it is also far easier to
Looking at recommendations I would make, it’s important that management first recognize the function of cybersecurity in their overall business structure. They must maintain ongoing interactions
Any enterprise has to pay special attention to computer security. Computer security is a field that is concerned with the control of risks related to computer use. A primary focus should be on the external threats to the computing environment. In enterprise with branches cross country, it is important to allow information from "trusted" external sources, and disallow intrusion from anonymous or non-trusted sources. In a secure system, the authorized users of that system are still
“Security programs are aimed at creating an appreciation and understanding of the Security Department’s objectives as they relate to the specific industry they serve” (Sennewald, 2013). Businesses come in all different sizes, some big some small. Businesses need a plan to ensure assets, personnel, and facilities are protected and this plan must be actively in place. Security programs provide businesses with the framework needed to keep a business or company at the security level needed to operate. This can be done in numerous ways. Assessing the risks involved, lessening the gravity of those risks, and keeping the security program and the security practices updated are just to name a few. In this core assessment paper, I will identify an actual organizational security program, conduct
In this paper I will be discussing some of the benefits of having frameworks for information security management. What each of the frameworks of information security are, their pros and their cons. Which major perspectives to consider in information security management and framework choice. What organizational factors should be considered in framework choice? I will also attempt to come up with a better framework for information security.
In shaping a new security policies, it is essential to have a full understanding of all aspects of the internal network and services to be protected from both internal and outside threats. An article by Solms & Solms (2004) outlines several criteria in developing information security. First, a governing body must be formed to ensure all sensitive data is secured and provide due
Conclusion of Research: Through an actual study, we scrutinized the features of information security in an organization with best practices. And from this paper we explored about successful security development programs that highlight the security policies and understanding the current scenario of organization to targeted ratio.
The purpose of each control on the Sphere of Protection is to protect the valuable information and information systems assets. The focus of each control is management, operational, and technical controls in which sums up the sphere of protection. Management controls cover security processes designed by strategic planners and performed by security administration (2) Operational controls deal with operational functionality of security in organization and (3) Lastly, technical controls address tactical and technical implementations related to designing and implementing security in
The framework provides a roadmap for the implementation, evaluation and improvement of information security practices. An important feature of the information security governance framework is that it defines the roles of different members of an organization. The framework specifies what corporate executives, senior management, and CIOs/CISOs should do. The framework is also flexible enough to apply to different business models. The framework benefits are it identifies cornerstone security practices that nearly all organizations are following and makes recommendations where in an organization the responsibility falls. Some disadvantages to BSA's framework is that it is still a work in progress and it still needs to develop useful metrics that enable managers to quantify the return on investments in information security and the effectiveness of information security programs and measures (BSA).
Securing an IT environment properly can be broken down into three basic questions. The first question to address is what assets within the organization need protection? After these assets have been identified, it is important to ask in what are they threatened? Finally, the question of what needs to be done to counteract these threats (Stallings & Brown, 2012)? By answering these questions, it is
Firewalls prevent unauthorized users from accessing a private network when it is linked to the Internet. Intrusion detection systems monitor private networks from suspicious network traffic and attempts to access corporate systems. Passwords, tokens, smart cards, and biometric authentication are used to authenticate system users. Antivirus software checks computer systems for infections by viruses and worms and often eliminates the malicious software, while antispyware software combats intrusive and harmful spyware programs (Laudon and Laudon, 2009, p.260)
Security plays a major role in business. The value security Department brings to organizations is enormous as the department works hard to avert losses, shield property and human assets.
It can be assessed that security guards indirectly affect the economy, because their protection allows people to work and spend money, which helps to restore the economy. Having security guards in any facility makes people feel safe and protected; and such a responsibility of public trust should entitle them to a higher salary. Moreover, they deserve more pay because protecting people is a difficult task, and a high percentage of people do not cooperate with authority. Some people object to having security guards in facilities and around them; which makes the job of a security officer more complex. The challenge of having to protect a facility is a tough job, but protecting a facility on a 24 hour basis and protecting hundreds or thousands of people at the same time is a job that definitely should entitle more pay. When performing their duties, pay is the last thing on the minds of security guards. The protection of both the people and property, remain their priorities and they remain vigilant in doing so. People should consider the purpose of security guards, and acknowledge them accordingly.
There were a number of factors that contributed to the breach, which had they been addressed or had corresponding mitigation responses in place, would have reduced the likelihood that the breach would have taken place, or at a minimum reduce the impact of the attack. These items range from policy related issues, technology implementations, and security management and maintenance. Although I believe a number of these areas were in the process of being addressed, based on the information gathered regarding the details of the incident, it appears that it was still in many areas insufficient and would not have prevented an incident even if there had been more time available to perform the implementations.
Good security management requires risk management to mitigate or reduce risk to an acceptable level within an organization. Security management’s objective is to protect the company and its assets. A proper risk analysis will identify the company’s major assets, threats that put those assets at risk, and estimate the possible damage and loss a company may endure if any of the threats were to become real. With a good risk analysis, management can determine the type of budget they want to set to mitigate threats. Risk analysis justifies the cost of the countermeasures against the threats and determines the benefit or worth of security
In order to effectively implement security governance, the Corporate Governance Task Force (CGTF) recommends that organizations follow an established framework, such as the IDEAL framework from the Carnegie Mellon University Software Engineering Institute. This framework, which is described in the document “Information Security Governance: Call to Action,” defines the responsibilities of (1) the board of directors or trustees, (2) the senior organizational executive (i.e., CEO), (3) executive team members, (4) senior managers, and (5) all employees and users. This important document can be found at the Information Systems Audit and Control Association (ISACA) Web site at www.isaca.org/ContentManagement/ContentDisplay.cfm?ContentID=34997.