StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

EISA: Evaluating and Meeting the Security Needs - Research Paper Example

Cite this document
Summary
In fact, research shows that the greatest challenge that the organizations faces are the information technology assets and infrastructure. To ensure stability of the department’s…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER98% of users find it useful
EISA: Evaluating and Meeting the Security Needs
Read Text Preview

Extract of sample "EISA: Evaluating and Meeting the Security Needs"

EISA: Evaluating and Meeting the Security Needs Number The security of an organization’s information technology infrastructureis highly crucial. In fact, research shows that the greatest challenge that the organizations faces are the information technology assets and infrastructure. To ensure stability of the department’s operation’s, the health of the entire cyber community should be guaranteed. Various researches have proven that the employees in the department contribute a whole lot to the security of the department’s information asset.

The paper gives an analysis of the information security needs of the human resource department at Intel Corp Company.There are two security elements that put into consideration the department. First, the physical security of the information system assets within the department should be tightened. The movement of visitors should be monitored. CCTV cameras should be installed in all the offices of the departments to take video footages of all the movements in the departments. In addition, the reception room should be organized so that all the visitors, who enters the offices in the department, clear with the secretary (Kovacich, 2008).

This will simplify the process of identifying the culprit in case the system’s assets such as a removable disk are stolen. In addition, the department’s employees should be checked when leaving the premises because instances have occurred where the internal employees steal the organizations assets. Some employees do not observe the ethical rules and regulations in the work places.The second and most crucial is the logical security of the assets. Logical security involves different activities that ensure the organization’s assets are secured logically.

The first logical security measure is the protection of the system from malicious programs that can be injected by the attackers. This is enabled via the use of anti-malware programs such as antivirus. It has been realized that some malware program can be injected to the system via the work station. As such, system should turn down any attempt by an employee or unauthorized person to insert an optical disk or USB storage device to a work station computer.Another crucial factor is the user account management and group privileges.

Some employees attempt to carry out actions that are not within their system privilege right. There should be a monitoring system that tracks and report such actions (Kovacich, 2008). For example, an employee who does not have the right to delete data, try to delete or alter some information in the system. The monitoring system should stop the action and notify the security officer. The security policy document should recommend severe punishment for an employee who engages in such a heinous act.

To prevent unauthorized users from accessing the department’s resources, all the work stations in the department should access the system by giving the authentication credentials. The system should prompt the user to enter the user name and password. In addition, the system should automatically log out if a work station remains unused for more than ten minutes. This will avoid situations where the user forgets to log the system out making it vulnerable for another person to access the system.

The settings are configured using Microsoft group policy and active directory.DMZ and enterprise firewalls are also configured in the router that controls the department’s assets to block suspicious request that comes into the department. The firewalls will also filter the outgoing requests to ensure that the internet resources that get into the department are trusted (Solomon & Kim, 2010). ReferencesKovacich, G. (2008). The information systems security officers guide: Establishing and managing an information protection program.

Butterworth-Heinemann.Solomon, M., & Kim, D. (2010). Fundamentals of information systems security. Jones & Bartlett Learning.Trcek, D. (2010). Managing information systems security and privacy. Springer.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“EISA: Evaluating and Meeting the Security Needs Research Paper - 1”, n.d.)
EISA: Evaluating and Meeting the Security Needs Research Paper - 1. Retrieved from https://studentshare.org/architecture/1610436-eisa-evaluating-and-meeting-the-security-needs
(EISA: Evaluating and Meeting the Security Needs Research Paper - 1)
EISA: Evaluating and Meeting the Security Needs Research Paper - 1. https://studentshare.org/architecture/1610436-eisa-evaluating-and-meeting-the-security-needs.
“EISA: Evaluating and Meeting the Security Needs Research Paper - 1”, n.d. https://studentshare.org/architecture/1610436-eisa-evaluating-and-meeting-the-security-needs.
  • Cited: 0 times

CHECK THESE SAMPLES OF EISA: Evaluating and Meeting the Security Needs

The Business Scenario for ClearHear

In the essay “The Business Scenario for ClearHear” the author analyzes outsourcing, which is valuable and valid and this option must be exercised when other options fail to satisfy the business needs.... It does not make sense to reject the order due to the inability to hold on to the statement of values....
2 Pages (500 words) Case Study

What is a federal grant

Every funding agency requires that you submit your Mission Statement with your grant proposal.... Mission Statement should include and reflect the outpatient treatment program's commitment to use educational technology to meet our goal goals.... hellip; What is a federal grant?... The first thing that I would do is begin grant research for St....
8 Pages (2000 words) Case Study

How HR Professionals Can Use Online Recruiting to Support More Effectively Recruitment Activities

This helps human resource department to meet its urgent human resource needs such as overcoming the challenge of abrupt and significant employee turnover.... One of the major changes, especially in professional scopes is transition from reliance on the traditional mass media to internet based communication media such as email and the social media....
5 Pages (1250 words) Essay

Can We Really Trust Our Government, Do We Really Have Privacy

Governments have been pioneers in security cover and we trust it will keep on being so.... Innovative developments have since quite a while ago postured difficulties to the… Our security performance and protection systems have largely held up well.... Several studies have proved that, in the current world people cannot trust governments, as they have intruded into their privacy in the name of security until there is nothing confidential....
6 Pages (1500 words) Essay

Vendor Management in Freight Forwarding Companies

"Vendor Management in Freight Forwarding Companies" paper analyzes of cost reduction strategies and whether the multiple-vendor approach is applicable for the cost reduction.... The research question is whether the multiple vendor systems in freight forwarding companies are effective.... nbsp;… Networks of packagers are involved in the freight forwarding business....
11 Pages (2750 words) Research Proposal

The Challenges of Parenting

This paper "The Challenges of Parenting" focuses on the fact that for instance, your daughter is having a great deal of difficulty in school.... You think she may have learning disabilities.... You would like to get the school system to evaluate her and help plan a program for her.... nbsp;… I am writing to you today because I am at a loss!...
10 Pages (2500 words) Research Paper

Application of the Legislative Frame Work and Codes of Practice

nbsp; Rights are universal and are thus codified in national legislation and international convention thus this approach recognize asylum seeker needs through the lens of human right (Thomas, 2009).... Asylum seekers, regardless of their immigration status, are human beings, with fundamental and basic rights, needs, and aspirations.... In general term this legislation includes legislation:Under section one of national assistance act, 1948 local authority have the responsibility and duty to provide care beyond the provision of accommodation, this legislative translate to code of practice where an asylum seeker is seen as individual with the same right as UK nationality, thus asylum seeker needs to be listened to and their need identified and responded to with an understanding of their current situation and their future aspiration taken into consideration (Thomas, 2009)....
5 Pages (1250 words) Essay

Network Architecture and Security Considerations in IISC

This term paper "Network Architecture and Security Considerations in IISC" is aimed to analyze the security Administrator Handbook of the IISC.... Therefore, all users will be subject to the limitation provided to protect the security and integrity of data in the entire communication network.... hellip; The cost of designing network architecture and security consideration is normally done against the aforementioned factors that it aims to minimize....
15 Pages (3750 words) Term Paper
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us