In: Computer Science
Case Study Scenario: You are the recently appointed head of a security team responsible for protecting the information holdings of Innovations IT which is a consulting agency for IT based technologies
comprising of 1500 staffs. The organization locates in the central business district of the city. The security team is responsible for administering the security of information from deliberate and accidental threats. The recent information security management team found that the security has not been properly addressed in some key areas such as incident response, disaster recovery, business continuity, social engineering attacks and lack of personnel awareness of the various threats to information, and poor password security. The above issues identified needed urgent remedy. Technical systems were found to be reasonably
effective in maintaining database and document management security, and were well serviced by the IT team. As the head of the team, it becomes your responsibility to ask your team to analyze the possible threats and provide a report on the detailed security countermeasures for all the possible threats.
As a part of the security analysis, the tasks of the team are to:
a) Identify and describe the organizational holdings (assets) at risk
b) Identify and describe the potential security threats to the organization
c) Design the necessary security counter-measures to manage and address the threats
d) Develop a comprehensive information security training and awareness program for the users of the organization belonging to the different levels of the organizational hierarchy
Here I Have Given Brief Explanation
The guidelines are created by security plan to ensure safety of the organization from lany kinds of risks, which might develop or progress due to changing technology, and business needs. The importance of publishing and downloading to the relevant parties and should be effectively to the employees too → Security is a very complex and combines communicated. various factors out of these factors few Facton must be present all the time to safety of of any organization other factors can be added later as and when required on according to the need. entive factors together combine together to formulate a full proof Security plan for any organization In order to make the security plan effective It is very essential to... implement it at individual, organizational, and inter- organizational level - A Security plan consists of policies, safeguarding all the corporate assets be it
ky pro ang story is many times seen to be lost between "He need security and is my coffee ready of the fact that they need security analyze the various physical humanon physical, human an electronk assula yet?". All the organizations are well aware planning but they lose deep insight and seriousness into the planning In this report, we are going to It company electronic holdings that are of possible risk due to shag in securities of the which has human buse of 1500 employees and is stationed at Central business district - After analyzing the potential risks, we are going to find out the potential. and actual threats that are possible to the physical, human and electronic holdings. of the organization once the risk and the threats are analyzed it will help. ish designing Security plan to. cover all as counter measures that can on should be taken to manage physical CS be
protect the organization from future. human and electronic threats and. its holdings. risks to aware ness the - Based on the findings we need to develop a comprehensive information Security education and programme to e ducate management Stuff and Contractors about Security The. security education programs and the awareness generating programs should contain a range of innovative and tested. processes aimed at security and a description of measures used to test the efficacy of the plan. enhancing CS CamScanne