Question

In: Operations Management

Undertake research to find how security culture is developed and maintained in non-IT-based environments. How can...

Undertake research to find how security culture is developed and maintained in non-IT-based environments. How can lessons from these implementations be used for developing and sustaining IS security culture?

Solutions

Expert Solution

In non-IT environment security is not that major a concern for the firm's, therefore, they do not invest in dedicated systems and department for performing this task. But they do invest in pre-existing solutions for their security like monitoring software, databases and servers for backup, using cloud-based app services for implementation of a separate area to control and automate their cleanup and detection processes. Using that, and, educating the employees about security measures that can and need to be followed by them to maintain the integrity of the data and by investing in a secure development lifecycle, companies that are not IT based can improve their security and create a secure environment.

Utilizing the teachings from the above points, an IT company or firm can always increase their security measures by investing in a good cloud-based solution which will enable them to outsource their resource dependence which could then be used to increase the security of the system. Drills and a trained staff are always an advantage to any security system and also investing in a security development lifecycle is beneficial for any IT based company too.


Related Solutions

Factors that have contributed to the decline of non-money-based culture
How has money has become the focal point of modern world culture and ssociety, especially in the Western world
A researcher studies normal human fibroblast cells. They can be maintained in culture but die off...
A researcher studies normal human fibroblast cells. They can be maintained in culture but die off after about 30 cell generations. Unexpectedly, a colony of cells continues to survive and divide past 30 generations. Which scenario is most likely true for these cells?
Research a culture from outside of the U.S. and find traditions and beliefs within that culture...
Research a culture from outside of the U.S. and find traditions and beliefs within that culture that are different from those within the U.S. clearly explain the similarities and differences in material and non-material parts of both cultures. Do not forget to include the similarities and differences between both cultures' beliefs on health and illness. Explain any specifications that you need to pay attention to while caring for patients from this culture.
How can a security professional cultivate a culture of security awareness, collaboration, and buy-in among management, staff, clients, and stakeholders?
How can a security professional cultivate a culture of security awareness, collaboration, and buy-in among management, staff, clients, and stakeholders? Present several examples, including rationale. 
Q13 Find an annual report of an internet-based firm and undertake a financial analysis of the...
Q13 Find an annual report of an internet-based firm and undertake a financial analysis of the firm using financial ratios. Comment on the financial health of the firm. [4 Marks]
Discuss the relationship between culture and non-verbal communication. Discuss how it can be understood through the...
Discuss the relationship between culture and non-verbal communication. Discuss how it can be understood through the terms of technical, formal, and informal culture. Based on research of a particular culture (not the United States) discuss if this culture is individualistic/ collectivistic and being low context- high context culture and how non-verbal behaviors are viewed based on this.
Corporate Culture plays a significant role in the success orfailure of a security program. Find...
Corporate Culture plays a significant role in the success or failure of a security program. Find and comment on two ways that management can change corporate culture to improve the security posture of a company? Why do you believe these changes will make a difference in the corporate culture?
Corporate Culture plays a significant role in the success or failure of a security program. Find...
Corporate Culture plays a significant role in the success or failure of a security program. Find and comment on two ways that management can change corporate culture to improve the security posture of a company? Why do you believe these changes will make a difference in the corporate culture? Be sure to research outside your textbook for this and properly cite your sources.
Discuss how patient privacy and HIPAA requirements can be maintained. 
Discuss how patient privacy and HIPAA requirements can be maintained. 
) Undertake research; find out what options are available to digitally sign master files before storage....
) Undertake research; find out what options are available to digitally sign master files before storage. Write a 1 to 2 page report in which you set out your findings including the benefits of digital signatures and the procedures which can be used to create them
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT