Question

In: Economics

Many business environments have both visible and invisible physical security controls. You see them at the...

Many business environments have both visible and invisible physical security controls. You see them at the post office, at the corner store, and in certain areas of your own computing environment. They are so pervasive that some people choose where they live based on their presence, as in gated access communities or secure apartment complexes. Alison is a security analyst for a major technology corporation that specializes in data management. This company includes an in house security staff (guards, administrators, and so on) that is capable of handling physical security breaches. Brad experienced an intrusion—into his personal vehicle in the company parking lot. He asks Alison whether she observed or recorded anyone breaking into and entering his vehicle, but this is a personal item and not a company possession, and she has no control or regulation over damage to employee assets. This is understandably unnerving for Brad, but he understands that she’s protecting the business and not his belongings.

When or where would you think it would be necessary to implement security measures for both?

need 300 words with no plagrism

Solutions

Expert Solution

Ans- Security is a very important measure for our life. A person would feel secure if he/she has taken steps or measure for himeself. Nowadays security is a very broad concept. Every organisation(even small) take the security measures as a serious concern.

Security nowadays is not only preventive but also responsive. The prevention of any thing is another thing but we should also respond to that thing to avoid the activities in future.

In an organisation when there is a high confidential information that must be protected any how needs a proper security measure. Security cameras and security guards must be aware every time. There is no place for any mistake if the data is highly confidential. Sensible data should be protected any how.

Some of the security measures that we should take to secure our private as well as organisation data are as follows:-

1- Establish a strong passwords that should be long,easy to remember to you,should contain characters like 1,2,3 etc. Weak passwords should not be established in an organisation.

2. Built a strong firewall to avoid theft.

3. Update your system regularly and install antivirus protection so that chances of online theft or cyber crime being minimized.

4. A proper chain of security should be performed in an organisation. Like once in a week every employee of the organisation should be monitored carefully to be ensured that no one is doing wrong practices like insider's trading. Security cameras should be fitted at every crowded place and should be monitored instantly. Security guards should be enthusiastic,not tired easily.

5- The most important measure is to educate your employees. Give them a proper training to avoid any wrong practices.

The security measure must be applied in big organisations where loss due to any leaking of information is very huge. Proper implementation of security cameras at corridors,chambers should be done.


Related Solutions

One category of general controls is physical and online security. Describe the control and give at...
One category of general controls is physical and online security. Describe the control and give at least three examples of implementation of the control.
1- On occasion, you will see no color change in the medium, however, there is visible...
1- On occasion, you will see no color change in the medium, however, there is visible growth on the Simmons citrate agar surface. How would you interpret this result? 2- In most biochemical test media, you will find a source of protein such as casein, beef extract or peptone. Why does Simmons citrate agar not have any such materials?
To see internal controls in action, look around you. When you go to the store, see...
To see internal controls in action, look around you. When you go to the store, see what types of internal controls you can identify. At your place of work see if you can identify internal controls that might be in place. After checking out some different places, come up with two internal controls you have observed. It can be at your place of business or when you are a customer (and they don't have to be from the same place)....
a. Assuming you have two projects A and B and both of them have negative NPV...
a. Assuming you have two projects A and B and both of them have negative NPV and IRR less than cost of capital. Is there conflicts of interests between stockholders and bondholders? If so, why do they have conflicts? Please give two examples/situations where there is conflict of interests between the two parties. b. Discuss the benefits of diversification among different stocks. What is the limiting case of diversification. If you can only buy stocks, can you diversify away market...
Two reflecting telescopes have the same angular resolution, but one of them uses visible light, and...
Two reflecting telescopes have the same angular resolution, but one of them uses visible light, and the other uses infrared. Which telescope must have the larger primary mirror?
what are various Business environments that Hungry Lion operates in as they have an impact on...
what are various Business environments that Hungry Lion operates in as they have an impact on the successful operation of the business?( 20 Marks)
to compare physical differences between four isoforms of proteins you have to isolate them. describe an...
to compare physical differences between four isoforms of proteins you have to isolate them. describe an affinity coloumn for this purification.
Consider the following scenario: In this assignment, you will consider the need for security controls to...
Consider the following scenario: In this assignment, you will consider the need for security controls to protect the availability, confidentiality, and integrity of electronic data. Continuing with the scenario from Week 2 Discussion, every registered user of Paul Gray's online share trading company is required to read the safety and privacy page of the portal. As a secure portal, it has Secure Socket Layer (SSL) as a security measure. Gray has asked you to help him with this aspect of...
Engaging in regular exercise has both psychological and physical benefits. You believe you have a novel...
Engaging in regular exercise has both psychological and physical benefits. You believe you have a novel way to help obese adults start and maintain a regular exercise program. Your idea is to have them visualizing themselves engaging in exercise (walking) via virtual reality for two weeks before having them actually go out and walk. From data compiled by the National Institutes of Health, you know that obese adults in the United States walk, on average, 0.40 miles per day, with...
Read "Activity 3.2. In many instances, members of the dominant group have invisible privileges. After completing...
Read "Activity 3.2. In many instances, members of the dominant group have invisible privileges. After completing the inventory, what are your overall thoughts about the situations listed? Did you find anything surprising? Do you feel as if anything is missing from the list? If yes, what? Activity 3.2 Sample Privilege Inventory (adapted from McIntosh, 1998) Following are some of the invisible privileges that members of various dominant groups carry. Compare your situation with those listed here. Place a check mark...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT