StudentShare solutions
Triangle menu

Corporate Security Policies - Essay Example

Nobody downloaded yet

Extract of sample
Corporate Security Policies

Referring to both theory and practice, this essay will investigate the strategies companies utilize for the design and implementation of their security policies.
Todorov (2007) highlights the imperatives of implementing physical security policies. Even while conceding to the importance of automated, computer-mediated security systems, Todorov (2007) contends that the importance of physically securing sensitive sites within a company cannot be overlooked. Concurring, Fernandez and Sinibaldi (2003) explain that the securitization of sensitive physical sites within a corporate structure is comprised of four principle components. First is the management of physical locations, whereby the access control system policy should be designed and implemented with the purpose of controlling access to locations/sites. Second is the control of who may access a restricted room. As different types of employees may have access to different areas/sites within the company, it is necessary to implement an authentication and authorization role-based access control system. ...
may not access particular sites but keeps logs with appropriate auditing facilities of the employees who entered each room at any particular time and date. Thirdly is the design and implementation of application interfaces which allow administrators to create new permissions, users and locations which, in turn, would allow supervisors to generate audit reports to survey access to rooms and to allow users to change passwords, among others (Fernandez and Sinibaldi, 2003).
The often technology mediated securitization of access to physical sites is dictated by the imperatives of ensuring that no unauthorized persons are able to gain access to sensitive data or, indeed, tamper with the said data.
2.2 Network Security
Physical security policies are partly informed by the imperatives of fortifying network security. Fernandez et al. (2006) explain that even though it may be assumed that any corporate network has the requisite software and hardware security systems installed, that does not eliminate the need for physical security. Firewalls, anti-malware and spyware technologies substantially contribute to the denial of access to unauthorized users and additional software-based network security systems largely ensures that even authorized users whose identities have been authenticated cannot tamper with the data in question (Fernandez et al., 2006). Nevertheless, network security systems have been known to be penetrated, not only by hackers, but by corporate employees (Grimes, 2006). It is hardly uncommon for employees to access data which they do not have the network security clearance to do, through the theft of passwords, and to subsequently steal copies of the data for sale to competitors or to tamper with the data for a variety of personal or financial reasons ...Show more

Summary

The need to secure business sites has increased along with the intensification of competition. Information constitutes the core asset of any corporate entity and as information is being increasingly stored on digital media, it is imperative that companies institute security policies which would limit access to the said media and, quite possibly, their physical location (Fernandez and Sinibaldi, 2003; CoreStreet, 2006)…
Author : ealtenwerth
Corporate Security Policies essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Corporate Security Policies"
with a personal 20% discount.
Grab the best paper

Check these samples - they also fit your topic

The effectiveness of the various corporate governance policies and approaches in the USA and United Kingdom
The researcher of this paper gives the meaning and importance of corporate governance in order to assess the various theories and approaches of corporate governance adopted by various countries. The paper also compares the various approaches of corporate governance adopted by United Kingdom and USA.
10 pages (2500 words) Essay
Security Legislations and Standards
Security Legislations and Standards. According to Chew et al (2008), the need to determine information security performance is generated due to some economic, regulatory and organizational reasons. In this scenario, various available policies, rules and guidelines check performance measurement generally, and information security performance measurement primarily, as a basic requirement.
4 pages (1000 words) Essay
Networking Security and administration
It may be necessary to make appropriate human resource investments also. Server Systems - list of all server systems, their current operating system and version number, their current IP addresses, their physical location, their logical (network) location, and applications that reside on each server system.
6 pages (1500 words) Essay
Corporate Security within Emerging Markets
According to the report security risks have become more multifaceted, too. Many of the risk, such as terrorism, organised crime and IT security, are asymmetric and networked, making them harder to handle. Security has a higher framework in the corporate world in the present day than it did couple of years ago.
23 pages (5750 words) Essay
Emergency Preparation and Response in the World of Corporate Security
According to the report the corporate sector remains vulnerable to threats including, but not limited to, employee violence, external human violence, weapons threat, bomb threats, fire and the Code Red computer vulnerability. The role of corporate security for emergency preparedness and management of risk situations is determined through a study of existing norms.
16 pages (4000 words) Essay
Emergency Preparation and Response in the World of Corporate Security
sk situations is determined through a study of existing norms, corporate security providing companies, security departments within companies, threat and risk assessment. General practices and guidelines are suggested for increased security control within a company by overcoming
15 pages (3750 words) Essay
Computer Security Policies
and two offsite locations; one in Reston, VA and Annapolis, MD. Our main office boasts of 15 full time staff experienced in all aspects of ICT whether technical or business processes. The staff also comprise of 3 IT engineers, 2 software
4 pages (1000 words) Essay
Software Development, QA, Anti-Piracy
Given the value of information and the extent to which its unauthorized access and subsequent misuse has the potential to wreak
4 pages (1000 words) Essay
Security plan
In addition, it is yet vital and significant to maintain exceptional security in a networked structure. Because one PC can have many points of entry and can be used in a wrong way, on the other hand, a computer network has numerous
15 pages (3750 words) Essay
Security is as much about perception as reality.Discuss using selected examples from a number of fields of security such as National security,environmental security, Corporate security and international security and a supporting theory explaining se
The core goal of such components is poverty reduction and steering economic growth. Essentially, it constructs to the building blocks of human interrelationships, hence peace and security transverse. United Nations Development Program also
8 pages (2000 words) Essay
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
YOUR PRIZE:
Apply my DISCOUNT
Comments (0)
Click to create a comment
Contact Us