Got a tricky question? Receive an answer from students like you! Try us!

Corporate Security Policies - Essay Example

Only on StudentShare
College
Author : ealtenwerth
Essay
Miscellaneous
Pages 4 (1004 words)

Summary

The need to secure business sites has increased along with the intensification of competition. Information constitutes the core asset of any corporate entity and as information is being increasingly stored on digital media, it is imperative that companies institute security policies which would limit access to the said media and, quite possibly, their physical location (Fernandez and Sinibaldi, 2003; CoreStreet, 2006)…

Extract of sample
Corporate Security Policies

Referring to both theory and practice, this essay will investigate the strategies companies utilize for the design and implementation of their security policies.
Todorov (2007) highlights the imperatives of implementing physical security policies. Even while conceding to the importance of automated, computer-mediated security systems, Todorov (2007) contends that the importance of physically securing sensitive sites within a company cannot be overlooked. Concurring, Fernandez and Sinibaldi (2003) explain that the securitization of sensitive physical sites within a corporate structure is comprised of four principle components. First is the management of physical locations, whereby the access control system policy should be designed and implemented with the purpose of controlling access to locations/sites. Second is the control of who may access a restricted room. As different types of employees may have access to different areas/sites within the company, it is necessary to implement an authentication and authorization role-based access control system. ...
Download paper
Not exactly what you need?

Related Essays

Corporate Corruption: Causes and Reactions
Executives are charged with criminal offenses, politicians rush to propose new legislation, and the country tends to forget the root causes of corruption, and the public policies that make such corruption possible, until new cases inevitably emerge. …
7 pages (1757 words)
Security Threat Prevention
There is a lack in the security training which we have observed. The employee training for the use of systems is adequate but there is a lack in the security training which we have observed. The aspect of the psychology of the employee in this regard was overlooked. At The Company Employee training so far regarding security has been confined to six hours of lectures followed by a video and an annual guest lecture which is more of socializing than a purposeful study and evaluation.…
21 pages (5271 words)
Internal Policies and Procedures
The ERP platform is designed and implemented to control majority of the business process in the company. The users in the geographically separated locations like 2 factories and 4 sales offices are connected using remote connectivity. This also enables the users to interact with the system in a secure environment to manage workflows.…
7 pages (1757 words)
Data Security
The purpose of this report is to research the necessary solutions and to provide recommendations for management team.…
8 pages (2008 words)
Security Planning
In this endeavor, attention has to be given to the provision of gas masks to the public and the shortcomings in tackling terrorist attacks, natural calamities and emergencies has to be ascertained. In addition, it is essential to estimate the extent of safety enjoyed by citizens, governments, communities, businesses and systems of information technologies in the context of such attacks, calamities and emergencies. The cost effective nature of preparedness in respect of uncertain and unpredictable has also to be estimated (Department Of Homeland Security Centers).…
9 pages (2259 words)
Emergency Preparation and Response in the World of Corporate Security
In “Emergency Preparation and Response in the World of Corporate Security” I have carefully studied the fundamental security problems faced by corporate America. The purpose of this research is to provide a framework which security departments in business environments can utilize in achieving their goal of providing a secure workplace for all employees, contractors, and visitors. The security focus is to determine the appropriate actions to be taken during normal activities and steps to take in the event of unusual circumstances. It is not possible to incorporate a definite preparation…
15 pages (3765 words)
Computer Security Policies
The Reston, VA site has 1 on site senior consultant, 4 in-house junior consultants and 2 remote field consultants while our Annapolis, MD comprises 1 onsite senior consultant, 4 in-house junior consultants and 3 remote field consultants. Like our headquarters personnel, our offsite staff have years of ICT experience and industry-level certifications such as CISSP, CISA, PMP and others.…
4 pages (1004 words)