StudentShare solutions
Triangle menu

Security Threat Prevention - Essay Example

Nobody downloaded yet

Extract of sample
Security Threat Prevention

There is a lack in the security training which we have observed. The employee training for the use of systems is adequate but there is a lack in the security training which we have observed. The aspect of the psychology of the employee in this regard was overlooked. At The Company Employee training so far regarding security has been confined to six hours of lectures followed by a video and an annual guest lecture which is more of socializing than a purposeful study and evaluation.
Suggestions in this report centre around increasing the human alertness and avoiding danger in human inadvertence causing security breech. We also suggest that Emergency measures must follow the 'buddy' system, and confined to a few persons. Some recommendations regarding new methods of training, and installing adequate software and hardware checks are also recommended.Suggestions which are cost effective and with regard to the psychology of employees and the best practice regarding training have been outlined and detailed recommendations with the cost effectiveness is highlighted. Implementing the package will certainly improve the system security.
FedEx, the Company is a premier shipping cargo and courier service company. Its operations are vast and international. For our study of their security policy we have chosen the Company Trade Networks Services and since it depends on IT technology and networking, it involves security issues. This system is very data sensitive and requires extensive security policies to gain credit with international customers. This report confines itself to the issues related to the operative section, technology and personnel involved in this branch of operation of The Company. The Company Trade Networks is a system to solve problems in shipping goods globally. It provides international freight forwarding, export documentation, distribution, cargo insurance, and eCommerce and trade facilitation solutions. In detail, the company provides a Customs Brokerage service to speed up delivery by offering fast customs clearance. This is ancillary to Transportation - which is the main feature offering international services.

Global Trade Data is a service that offers all time support to clients that can be used by customers to store and manipulate their cargo data and compute costs and saving measures. It entails storage and accepting of sensitive data. Form filling, duty cases, Trade advisory services, all require the customer to provide data. Similarly the e-manifest or online invoicing insurance and other allied services like Duty Drawback, Trade & Customs Advisory Services, E-Manifest- Customs and Border Protection (CBP).Cargo Insurance, FDA Food Facility Registration, EDI/XML Electronic Data Interchange/Extensible Markup Language (EDI/XML). My Global Trade Data are some of the very sensitive services which involve human interference, security issues in the electronic system and ethics and legal issues.

The My Global Trade Data stores client's minute information on international shipments and contains proprietary information. As obtained, it has log-in and password procedures, secure communications protocol with a strong firewall. Forms designed help customer create databases for customers which are accessed by them and the operatives manning the ...Show more


FedEx Trade Networks Services depends on IT technology and networking, it involves security issues. This system is very data sensitive and requires extensive security policies to gain credit with international customers. Contact and management of the system is through the website…
Author : vonrubie
Security Threat Prevention essay example
Read Text Preview
Save Your Time for More Important Things
Let us write or edit the essay on your topic
"Security Threat Prevention"
with a personal 20% discount.
Grab the best paper

Check these samples - they also fit your topic

Security Risk Analysis for Intrusion Detection and Prevention of Cybercrime
The risk involved will be analyzed in the military network with regards to cybercrime and their effects discussed. The paper examines Intrusion Detection methods and suggests steps taken to curtail vulnerabilities in the system. Source determination and intrusion prevention procedures will be discussed as per the level of threat they pose.
8 pages (2000 words) Essay
Threat Assessment & Physical Security

The author explains that because of the nature of the principal’s lifestyle and present predicament, it would be better arrange for a security officer who has a medical or nursing background.  Since the work involves a round-the-clock observation, it is important that two nurses are available to do the job on shifts.

6 pages (1500 words) Case Study
The future of intrusion prevention
There are two types of risk analysis, the quantitative and the qualitative. The first is a mathematical approach based on probabilities and the second is a high/medium/low approach. Unfortunately the majority of threats defy all sorts of probability analysis.
10 pages (2500 words) Essay
Prevention: Human Factors
The site is the central visible functional point which acts as the communication, data transfer and access port for the company and the customer. Customer identity and safety are ensured with passwords and login procedures. The employee training for the use of systems is
35 pages (8750 words) Essay
Mexican Drug Cartels as a Security Threat
After this point this paper will discuss the reasons why the group uses violence; and building on this previous point consider if the use of violence can and cannot be considered terrorism. Lastly this paper will discuss globalization and the
4 pages (1000 words) Essay
Unified Threat Management (UTM)
Even individual end-users behind home networks face a bevy of threats from spam, scammers, fraudulent offers, spyware (whether illicit or created by “legitimate” companies), malware, viruses, keyloggers, identity theft, credit and debit card interceptions and fraud, and
14 pages (3500 words) Essay
Security and loss prevention
The growth has mainly been attributed to public sector laws, businesses security concerns, and international security. The paper will discuss the societal changes and events that have led to the significant growth of private security from
1 pages (250 words) Essay
Security and Loss prevention
To avert this, order pickers should be properly scrutinized before delegating such sensitive responsibilities, and in this screening, they must provide their felony records to ensure whoever is
1 pages (250 words) Essay
Security Threat Groups/Gangs In Prison
They were formed at various time intervals with different missions to accomplish. The geographical distribution of the streets or prison gangs in the country in terms of members and chapters vary considerably such that not all of these gangs are represented across all prison
5 pages (1250 words) Essay
For instance, in 2012, terrorists and saboteurs in Iran caused power cuts to disrupt the country’s nuclear program in two plants. However, most of the terrorists and terrorist groups lack the ‘ability to engage in nuclear weapons because they
3 pages (750 words) Essay
Hire a pro to write
a paper under your requirements!
Win a special DISCOUNT!
Put in your e-mail and click the button with your lucky finger
Your email
Comments (0)
Click to create a comment
Contact Us