StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security Policy Analysis - Essay Example

Cite this document
Summary
The uncertain event can eventually impact how successful a particular project can get. For instance, if requirements of the project change or you…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER97.4% of users find it useful
Security Policy Analysis
Read Text Preview

Extract of sample "Security Policy Analysis"

Security Policy Analysis Insert Insert Define program risk A program risk encompasses the likelihood of threats that may affect the original course of a particular project (Vona, 2008). The uncertain event can eventually impact how successful a particular project can get. For instance, if requirements of the project change or you encounter errors.Define institutional riskIt refers to an occurrence that may prevent an organization from attaining its set objectives. The threat is on the entity that is the institution concerned.

Describe how your selected organization incorporates program risk and institutional risk in its security program. Offer examples of both types of riskInformation technology firms need to develop an initiative to identify, manage and eliminate those risks so that the institution may achieve its set goals within an acceptable timeframe. In most cases, an ICT firm will be handling a number of projects especially those in software. These company’s make earnings from these projects (Luetge & Jauernig, n.d.).

As a result, they need to mitigate risks facing the projects as one of the factors that will influence the project. In regard to that, there is a need to identify, examine and regulate the threats that may affect the completion of any project.The company also faces other threats not related to the projects in any manner. These form the institution risks. Most of them will attempt to obstruct the system from achieving its objectives. It involves the organization settling on priorities concerning the efforts made in the institution and the use of resources for optimum achievement.

It should span all the mission areas of the company.Assume you are a technical advisor for the Chief Information Officer (CIO) of your organization. The CIO sends you an email communicating that she wants to be briefed on "OMB M-11-11" because the administrator has just added it to the list of priorities for the organization. She has limited knowledge of the policy and needs to know how it will effect the organization, and what we have already accomplished towards meeting the requirements within the system.

You have been given 30 minutes with the CIO. What would you report? And why?First, I would report on what OMB-11-11 is (Xceedium.com, 2015). In relation to that, it is a policy that advocates for the implementation of identity verification among persons to facilitate authorization to have access to information systems, networks and facilities in an organization.Next, I will report on the implementation of OMB-11-11. The application will entail a detailed procedure and use of software applications that will make the process simpler such as a Xsuite.

The access control mechanism will offer privileges such as keeping track of passwords, access methods that rely on keys both for network and information systems. Through such application software, it is possible to separate authorization and authentication to beef up security especially in highly sensitive areas of the institution. In addition, implementation will include setting policies to ascertain where a user goes after authentication and what they are privileged to do there.I will also report on challenges that will face the implementation of OMB-11-11.

For instance, quick deployment of the systems to users with optimal privileges. Most need access to various systems and be able to perform many duties. Others include the infrastructure to implement the policy and inclusion of legacy systems in the institution.Finally, I look at what the institution has done so far. In this case, the company solely relies on administrator, clients privileges to restrict access to information. That is done through the use of passwords.ReferencesLuetge, C., & Jauernig, J.

Business Ethics and risk management.Vona, L. (2008). Fraud risk assessment. Hoboken, NJ: J. Wiley & Sons.Xceedium.com, (2015). HSPD-12 - Privileged Access Control | Xceedium | Xceedium. Retrieved 24 April 2015, from http://www.xceedium.com/solutions/federal-government-solutions-summary/federal-government-solutions-detail-page-2-hspd-12-and-omb-11-11-smartcard-mandates

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security Policy Analysis Essay Example | Topics and Well Written Essays - 250 words - 1”, n.d.)
Security Policy Analysis Essay Example | Topics and Well Written Essays - 250 words - 1. Retrieved from https://studentshare.org/information-technology/1690872-security-policy-analysis
(Security Policy Analysis Essay Example | Topics and Well Written Essays - 250 Words - 1)
Security Policy Analysis Essay Example | Topics and Well Written Essays - 250 Words - 1. https://studentshare.org/information-technology/1690872-security-policy-analysis.
“Security Policy Analysis Essay Example | Topics and Well Written Essays - 250 Words - 1”, n.d. https://studentshare.org/information-technology/1690872-security-policy-analysis.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security Policy Analysis

Fundamental Obligation of Homeland Security

policy analysis Introduction America is fighting against enemies with the intent of attacking the American nation whilst destroying people's way of live.... It is the duty and policy of Homeland Security to guide the nation as they commit themselves to achieve a more protected Homeland, which can sustain the people's way of life.... The document provided a good example of how to create public policy (Forest, 2006, p.... The statement has salient points and the powers required in turning policy into law....
4 Pages (1000 words) Essay

Evaluation and Risk Assessment

Threat analysis enables information security experts to determine the most appropriate approaches of securing systems against systems attacks.... The primary focus of threat analysis should be on analyzing the resources of the attackers.... It is crucial for all organizations to analyze threats to help them develop specific security policies, which they can implement together with policy priorities and comprehend implementation needs for securing organizational resources....
2 Pages (500 words) Research Paper

Security in Public Transport

This brings us to the policy commitments of the DFT in context of crime.... In view of its policy commitments, a major issue is raised in the fact that episodes of crime and disorder rarely come to the notice of crime agencies, irrespective of the fact that they are serious concerns that are beginning to shape people's choices when it comes to mode of transport and the time or situation when they avail public transport facilities.... Further, a recent survey of both users and non-users of public transport indicates that, after service and reliability, over 50 percent of respondents felt personal security should be the priority area for improvement....
4 Pages (1000 words) Essay

Enhanced Commitments to Women to Ensure Food Security

One of these policies is the policy on “enhanced commitments to women to ensure food security”.... This study will now provide a critique of this policy.... This critique shall evaluate the advantages and the disadvantages of this policy, along with the issues which have been seen with the implementation of this policy.... In October 2002, the WFP set forth the new Gender policy which was meant to consider the recommendations from the review process....
9 Pages (2250 words) Case Study

Stakeholder Analysis for the Democratic-Republican National Convention (DRNC)

The analysis will define the organization through explaining its main missions and vision as well as the areas that it covers… The analysis identifies the main stakeholders that will attend at the National Convention event while defining the concerns and interest they have.... It will go further to evaluate the organization through a SWOT analysis so that the Apart from presenting information on the strategy that the department will employ, it will also come up with recommendations that will assist the department as it seeks to satisfy the needs of its stakeholders....
5 Pages (1250 words) Essay

Writing a policy about Human Resources Security

However, policies on external cloud computing services as a source of human resource security have accelerated via internet based servers since External cloud computing services Policy on external cloud computing services for human resource security policy introduction Cloud computing entails loading computer data, on multiple servers, that are used regularly can be retrieved via the Internet.... Cloud Computing: Overview and Risk analysis.... analysis of computer system vulnerability....
1 Pages (250 words) Assignment

Does the US Border Control Reflect Best Practice from an International Perspective

The United States border control policy is one of the policies that has affected the operation at the border and has been a challenge to both the citizens and immigrants.... The main mission of border patrol policy in the United States is to control terrorist weapons and terrorists… The border control policy has been tightened after the 9/11 attack that led to hundreds of American citizens losing their lives.... The paper is a discussion on the impact of border control policy towards the citizens as well as its opportunities and challenges....
5 Pages (1250 words) Essay

Policy Briefing

The main mission of border patrol policy in the United States is to control terrorist weapons and terrorists themselves from entering the county as well as identifying the people who are likely to enter the county without permission or in an illegal manner.... The border control… The policy has therefore been affected to prevent entrance of weapon of mass destruction into the county (Wang, 2009). While the border control policy has changed Its main mission has remained unchanged; to prevent and detect illegal entry of people into the United States of America....
5 Pages (1250 words) Essay
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us