StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Risk-Management Policy - Essay Example

Cite this document
Summary
This paper “Risk-Management Policy” describes a risk-management policy that will be utilized by a large multi-international corporation in addressing the security breaches that have been affecting them in the past. It describes the mitigation strategies that will be utilized by the company…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.3% of users find it useful
Risk-Management Policy
Read Text Preview

Extract of sample "Risk-Management Policy"

This policy will be important because it will help in restoring the customer's confidence in the organization’s handling of their confidential data and financial assets. It is also vital since it provides authority and accountability to specific people concerning the authority of disclosing or sharing the information in the organization. According to Calder, Watkins & Watkins, the organizations governing body has to give powers along with the necessary authority to a system administrator who will be the only person who can access the organization’s data.

The security of the organization’s customer’s confidential information will be enforced through the use of passwords which will remain known only to their systems administrator (2010). In addition, the systems administrator within the organization will be solely responsible for disclosing any information to any authorized person who may require it. To enhance the data’s security further, the system administrator will be required to utilize several data encryption techniques.

This will include encryption techniques like the creation of block ciphers, Feistel cipher structures, and the utilization of other advanced encryption standards. These techniques will help in ensuring that unauthorized people within the organization cannot interpret the meaning of the data. This will further prevent them from divulging any information concerning their customers to the members of the public (Calder, Watkins & Watkins, 2010).The Multi-international organization will have to employ a competent network administrator who will be solely responsible for ensuring that the network is secured from external intruders.

This will help in preventing any unauthorized damage and access that the organization’s computers may encounter. The Network administrator may apply some of the common wireless security features which include the Wireless Equivalent on Privacy (WEP) along with the Wi-Fi Protected Network Access features (WPA). There are various standards of the two technologies in the market that can be adopted by the organization in improving their network’s security. The network administrator will be required to configure all access points within the organization’s network with restrictions to ensure that no unauthorized parties get accessibility to their data (Jones & Ashenden, 2005).

This will further be enforced through the use of several encryption standards along with checks on the MAC addresses that are accessing the organization’s network. According to Jones & Ashenden, the creation of privileged networks for use only by the organization’s personnel will also be vital in ensuring the information concerning the organization’s customers is secure (2005). In addition to the above measures, the organization’s network administrator can implement the newly introduced Wireless Intrusion Prevention Systems (WIPS).

It is widely utilized for the purpose of countering the security risks that an organization’s network may encounter. This system could be utilized in line with other security measures that include network firewalls and passwords for accessing their systems (Jones & Ashenden, 2005).The paper examined the security risks that have been affecting the security of the multi-international organization’s information concerning their customers. The solutions suggested to the problems will be very effective in ensuring the organization’s network and information are well protected from intruders who may be having malicious intentions.

The organization’s staff will have to comply with the standards of conduct required of them to ensure no information concerning their customers is divulged to unauthorized parties (Calder, Watkins & Watkins, 2010).

Read More
Tags
Cite this document
  • APA
  • MLA
  • CHICAGO
(Risk-Management Policy Essay Example | Topics and Well Written Essays - 500 words, n.d.)
Risk-Management Policy Essay Example | Topics and Well Written Essays - 500 words. https://studentshare.org/management/1597858-risk-managemnt-policy
(Risk-Management Policy Essay Example | Topics and Well Written Essays - 500 Words)
Risk-Management Policy Essay Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/management/1597858-risk-managemnt-policy.
“Risk-Management Policy Essay Example | Topics and Well Written Essays - 500 Words”. https://studentshare.org/management/1597858-risk-managemnt-policy.
  • Cited: 0 times

CHECK THESE SAMPLES OF Risk-Management Policy

Common Information Security Threats

This requires a focus on a risk management policy geared toward establishing a cost-effective security system.... Common Information Security Threats Introduction The purpose of computers and other network systems is to facilitate information exchange; today, organizations are managed using computer network....
3 Pages (750 words) Essay

Technical and Formal Security

Full Paper Title Name University Information Security Cyber-criminals are intelligent as well as organized.... Once the computer network is breached, they install small lop holes or software intruders for giving hackers access whenever they want to access the network again.... hellip; In simple words one can say that, it is a computer to computer attack to steal the confidential information, integrity or the data presently available on the network....
4 Pages (1000 words) Research Paper

Risk Management Policy (NHS)

This paper analyzes the risk management policy of a company in the healthcare industry called NHS Greater Glasgow.... The focus of the analysis is on the impact of the risk management policy on the managerial team and regular staff of employees.... The current risk management policy in place in this company was establish in 2005 after the policy underwent a rigorous evaluation process that obtain input from a lot of decision makers in this enterprise working in different division of the company dispersed across the entire country....
2 Pages (500 words) Essay

The Treasury Profile For Marks & Spencer PLC

M&S was established about one hundred twenty five year ago.... It is having a record of twenty –one million satisfied customers in UK alone.... Further, it is having foreign operations in more than… It is having about 2,000 suppliers and employs about 78,000 employees.... M& S controls about 11....
14 Pages (3500 words) Essay

The National Bank of Canada Priority

To guarantee that their products and services will be available during disruptive events/ hazards, NBC provides this Business Continuity Planning policy.... This policy will enable the company to continue its banking operations and help in reducing losses in the midst of crisis.... This group has bigger responsibilities in terms of policy implementation and should regularly report to the senior management for the effectiveness of the policy....
4 Pages (1000 words) Research Paper

Four Pillars of Safety Management Systems

The safety policy component is efficient for creating a proactive and predictive program because it offers new regulations that can help in improving equipment and system designs (Ludwig, 2007).... onclusionThe 4 main pillars of SMS entail safety risk management, policy, assurance, and promotion....
2 Pages (500 words) Essay

Evaluating Workplace Health and Safety Management Systems

However, most people do not know the rules of WHS… Based on the report below, it is clear that employers, managers, and employees need to be taught on risk management policy among other policies of WHS on management for success in any enterprise.... For effective and efficient management of business, the rules and regulations of World Health Survey are important (Leask, and Fyall, 2006....
4 Pages (1000 words) Assignment

Aspects of Quality Assurance Used by Fife Fire and Rescue Services

Fife Fire and Rescue Services looks towards ensuring that the quality of service is of high quality and having a risk management policy will ensure that the services will of high quality.... … The paper "Aspects of Quality Assurance Used by Fife Fire and Rescue Services" is a good example of a case study on management....
10 Pages (2500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us