Got a tricky question? Receive an answer from students like you! Try us!

Corporate Security Policies - Essay Example

Only on StudentShare
Pages 4 (1004 words)


The need to secure business sites has increased along with the intensification of competition. Information constitutes the core asset of any corporate entity and as information is being increasingly stored on digital media, it is imperative that companies institute security policies which would limit access to the said media and, quite possibly, their physical location (Fernandez and Sinibaldi, 2003; CoreStreet, 2006)…

Extract of sample
Corporate Security Policies

Referring to both theory and practice, this essay will investigate the strategies companies utilize for the design and implementation of their security policies.
Todorov (2007) highlights the imperatives of implementing physical security policies. Even while conceding to the importance of automated, computer-mediated security systems, Todorov (2007) contends that the importance of physically securing sensitive sites within a company cannot be overlooked. Concurring, Fernandez and Sinibaldi (2003) explain that the securitization of sensitive physical sites within a corporate structure is comprised of four principle components. First is the management of physical locations, whereby the access control system policy should be designed and implemented with the purpose of controlling access to locations/sites. Second is the control of who may access a restricted room. As different types of employees may have access to different areas/sites within the company, it is necessary to implement an authentication and authorization role-based access control system. ...
Download paper
Not exactly what you need?

Related Essays

Corporate Corruption: Causes and Reactions
Executives are charged with criminal offenses, politicians rush to propose new legislation, and the country tends to forget the root causes of corruption, and the public policies that make such corruption possible, until new cases inevitably emerge. …
7 pages (1757 words)
Security Threat Prevention
There is a lack in the security training which we have observed. The employee training for the use of systems is adequate but there is a lack in the security training which we have observed. The aspect of the psychology of the employee in this regard was overlooked. At The Company Employee training so far regarding security has been confined to six hours of lectures followed by a video and an…
21 pages (5271 words)
Internal Policies and Procedures
The ERP platform is designed and implemented to control majority of the business process in the company. The users in the geographically separated locations like 2 factories and 4 sales offices are connected using remote connectivity. This also enables the users to interact with the system in a secure environment to manage workflows.…
7 pages (1757 words)
Data Security
The purpose of this report is to research the necessary solutions and to provide recommendations for management team.…
8 pages (2008 words)
Security Planning
In this endeavor, attention has to be given to the provision of gas masks to the public and the shortcomings in tackling terrorist attacks, natural calamities and emergencies has to be ascertained. In addition, it is essential to estimate the extent of safety enjoyed by citizens, governments, communities, businesses and systems of information technologies in the context of such attacks, calamities…
9 pages (2259 words)