4 Apr 2022

103

Security operations

Format: APA

Academic level: College

Paper type: Essay (Any Type)

Words: 623

Pages: 2

Downloads: 0

A plan for administrative security controls

Administrative controls are very essential for business, organizational, personal and state protection. The administrative controls focus on the policies that are put in place in order to protect the security, privacy and confidentiality of decisions and operations of the function of administration in the organization (Keung, 2014). An effective plan for administrative security controls may include:

Finding the right information systems

Carrying out a risk assessment within the administrative operations of the institution

Creating and publishing policies, standards and guidelines

Carrying out a security-awareness training of all personnel 

Screening of the staff

Enforcing change control guidelines

A plan for procedural controls

The procedural controls are mainly safeguards to the information and machine systems in the organization. It is also a safeguard to the procedures of conducting various functions ion the organization or the state (Lee, 2015). A plan for procedural security controls includes:

It’s time to jumpstart your paper!

Delegate your assignment to our experts and they will do the rest.

Get custom essay

Enforcing and keeping access safeguard mechanisms

Creation of passwords and managing resources

Developing identification and authentication methods for people entering the organization or country

Installing security gadgets

Configuring the infrastructure of the organization or state

A plan for physical controls

Physical controls are aimed at ensuring the protection of all hardware and assets within the organization or state (Schell, 2013). A plan for physical security controls includes:

Putting up strict controls to individual access into the organization or country

Ensuring all systems are locked and ejecting unwanted floppy and CD-ROM drives

Safeguarding the perimeter of the organization or state

Keeping vigil to repulse any form of intrusion

Ensuring the environment is safeguarded and conducive for the installation of various machines

Challenges facing security management professionals

The modern security professionals face unprecedented challenges in their quest to safeguard their workstations. Today, security professionals are faced with the huge test of protecting organizations or states amidst rising complexities and uncertainties occasioned by the dependence on technology as a sole means of accomplishing their objectives. The first major challenge that security professionals face is cyber-crime which has exploded to high levels. Virtually all organizations and states today rely on the internet for the easy and fast transaction of functions involving customers. However, most of them lose the idea that the internet is quite insecure hence under-invest in IT security (Kshetri, 2013). The increasing political and commercial incentives for cyber-crime continue to attract more criminals to this business. The criminals have access to sophisticated and quite effective attack tools that they use. Since the organizational or state security professionals are given a very insufficient budget for IT security, the entire institution may become vulnerable to incidents of internet crime. 

Another major challenge to security professionals is the increasing functions and expansion of organizations. As organizations expand, the entry points and loopholes for criminals arise. Expansion of companies affects physical security controls as criminals find more entry points into the precincts of the organization. Expanding the corporate perimeters to large extents normally enhances the vulnerability of the organization to entry points for surveillance as well as other attacks (Andress & Winterfeld, 2013). 

Moreover, conducting security awareness in the organization or at the state level is a very difficult task for the security professionals. Firstly, this difficulty arises from the fact that very few people in institutions pay attention to the importance of security matters as long as they are safe at a given time. Therefore, many people are less interested in security issues at the time they are safe. Secondly, security awareness tests in organizations and at state level normally lead to injuries and even deaths because people respond to it as a real attack. This makes professionals to avoid such awareness tests. Therefore, there is a very high need for people to increase support and interest to security matters in order to make the work of security professionals easy and effective (Fischer, Halibozek & Walters, 2012). 

References

Andress, J., & Winterfeld, S. (2013).  Cyber warfare: techniques, tactics and tools for security practitioners . Amsterdam: Elsevier.

Fischer, R., Halibozek, E., & Walters, D. (2012).  Introduction to security . Oxford: Butterworth-Heinemann.

Keung, Y. H. (2014). Information Security Controls.  Advances in Robotics & Automation 2014 .

Kshetri, N. (2013). Privacy and security issues in cloud computing: The role of institutions and institutional evolution.  Telecommunications Policy , 37 (4), 372-386.

Lee, G. (2015). A Study on Improving Security Controls in the Electronic Financial Transaction.  Journal of the Korea Institute of Information Security and Cryptology 25 (4), 881-888.

Schell, R. R. (2013). Computer Security.  Air & Space Power Journal , 27 (1), 158.

Illustration
Cite this page

Select style:

Reference

StudyBounty. (2023, September 14). Security operations.
https://studybounty.com/5334-security-operations-essay

illustration

Related essays

We post free essay examples for college on a regular basis. Stay in the know!

Cruel and Unusual Punishments

Since the beginning of society, human behaviour has remained to be explained by the social forces that take control. Be it negative or positive, the significance of social forces extend to explain the behaviour of...

Words: 1329

Pages: 5

Views: 104

Serial Killers Phenomena: The Predisposing Factors

CHAPTER 1: INTRODUCTION _Background information _ Ronald and Stephen Holmes in their article _Contemporary Perspective on Serial Murder_ define a serial killer as anyone who murders more than 3 people in a span...

Words: 3648

Pages: 14

Views: 441

Patent Protection Problem

A patent offers inventors the right for a limited period to prevent other people from using or sharing an invention without their authorization. When a patent right is granted to inventors, they are given a limited...

Words: 1707

Pages: 6

Views: 275

General Aspects of Nonprofit Organizations

Nonprofit organizations are prone to the long and tedious legal process of start-up as compared to their for-profit organizations. However, there are similar rules that govern the startup and the existence of both...

Words: 294

Pages: 1

Views: 73

Contract Performance, Breach, and Remedies: Contract Discharge

1\. State whether you conclude the Amended Warehouse Lease is enforceable by Guettinger, or alternatively, whether the Amended Warehouse Lease is null and void, and Smith, therefore, does not have to pay the full...

Words: 291

Pages: 1

Views: 134

US Customs Border Control

Introduction The United States Border Patrol is the federal security law enforcement agency with the task to protect America from illegal immigrants, terrorism and the weapons of mass destruction from entering...

Words: 1371

Pages: 7

Views: 118

illustration

Running out of time?

Entrust your assignment to proficient writers and receive TOP-quality paper before the deadline is over.

Illustration