Got a tricky question? Receive an answer from students like you! Try us!

Security Organization - Essay Example

Only on StudentShare
College
Essay
Miscellaneous
Pages 6 (1506 words)

Summary

Having been the flu season, last January we were forced to hire temporary workers for our call centre. All came highly recommended and were interviewed by the HR department. All temporary workers sat for an orientation session and their work duties were explicitly outlined for them…

Extract of sample
Security Organization

Later investigations revealed that it was an insider incident, involved the theft of subsequent selling of patients' credit card numbers, and that the activities emanates from the Call Centre. Having provided you with a general overview of the situation, I will now explain its potential and actual consequences, summarize the results of the post-mortem and clarify both lessons learnt and future action.
In regulating conduct related to the use of computers, the United States government currently defines a computer as "an electronic, optical, electrochemical, or other high-speed data processing device performing logical, arithmetic, or storage functions, and includes any data storage facility or communications facility directly related to or operating in conjunction with such a device" (United States Computer Fraud and Abuse Act (e)(l), 1984, cited in Kipper, 2007, p. 194). This definition accounts for the way in which IT has fused data storage, computing and telecommunications technologies and in so doing, touches upon the potential of both the computing and telecommunications technologies to violate the integrity and confidentiality of the stored data. ...
Download paper
Not exactly what you need?

Related Essays

Assessment of Technology centric Strategies for information security in an organization
It is a "best practices" strategy in that it relies on the intelligent application of techniques and technologies that exist today. The strategy recommends a balance between the protection capability and cost, performance, and operational considerations." [National Security Agency]…
3 pages (753 words)
Maritime Transportation Security Act
While the attacks focused attention on our aviation system's vulnerability, it became obvious that our maritime domain needed greater attention. Besides being gateways through which dangerous materials could enter, ports are attractive targets because they are often large and sprawling, accessible by water and land, close to crowded centers, and interwoven with highways, roads, factories, and businesses (Flynn, 2004).…
6 pages (1506 words)
Security Management Paper
The matrix is use to be able to provide equal opportunity to all the applicants on lawful job related and non-discriminatory criteria. A pre-designed tool was created by Texas Tech as a hiring selection matrix. The matrix composed of a spreadsheet, which helps to evaluate the applicant. The snapshot of the matrix is shown below (figure 1). To start with this matrix on the upper portion of the matrix just types the required qualification of the person needed for the job. The preferred skills may include education, Clerical experience, MS Office experience, ten key by touch, TTU experience,…
8 pages (2008 words)
Security Managers Should Be Managers First And Security Specialist Second
Most companies are still far from having an elevated, coordinated security unit.…
14 pages (3514 words)