Creating and Communicating Security Strategies in Business Essay
Order ID 53003233773 Type Essay Writer Level Masters Style APA Sources/References 4 Perfect Number of Pages to Order 5-10 Pages
Creating and Communicating Security Strategies in Business Essay
Part 1: Business Environment and Potential Risks
Security is a key factor in the running of any business. As the IT security professional officer for the Sparks Corporation that deals with selling of various products and services to both retailers and wholesalers in various parties of the world. The corporate has several branches spread across different regions of the world.
The branches have been endowed with different human resources in departments such as sales, security sector, retailing and wholesaling department, human resources, and marketing of the company`s products. All the employees of the cooperation have access to the retailing locations and access to public ventures. However, the public has no access to the facilities.
The advances made in the world have made it important that the corporation uses some of the digital devices to execute its duties. The corporation has workstations with laptops, tablets, and digital mobile phones. To access the corporation`s devices the employees have personal logins for their emails, computer, and mobile phones ((Tajik, 2019). The corporation has also specific applications that are always updated on personal devices for the individuals that bring personal devices to use at work.
The corporation has also initiated the use of delegation of duties to help in improving service delivery. The employees are assigned duties by the use of the computers depending on the benefits that come with the person using the device. The physical security personnel have only access to the physical security areas and only have access to the section of the physical IT section to aid in the protection of the facility (Brito et al. 2020).
The monitoring and controlling of the security section for the Sparkzy Corporation will only be done by the IT security employees tasked to ensure that the facility and its branches are well secured. The following is a memo that describes the policies and regulations that the employees have to adhere to for security purposes.
Part 2: Assembling of the Policies for the Corporation
TO: All Stakeholders
FROM: IT Security Department
RE: Security Policy
This defines the security regulations that have to be followed throughout the entire facility for the benefit of the Corporation. All the computers and the devices used in the conducting of the corporations’ businesses have to be aligned most effectively and safely which would result in boosting the security of the corporation with limited chances of data loss or security breach.
Access Control Measures
Accessing any of the corporation’s networks will only be limited to the employees and relevant stakeholders of the company. However, they shall all have to introduce themselves through the use of unique login passwords, and the biometrics that one seeks to access. To access the platform by the use of the unique logins one will require to always update their logins and ensure that in case the login is not used for more than twenty days then its deactivated and the owner will have to seek permission from the administrator to reactivate their account.
The use of the passwords will also require that there is a two-way verification for the person seeking to access the facility`s network. The password has to be strong and be in constant use to avoid being deactivated and most importantly the password must also not be shared by any person to avoid putting the facility in a compromised manner.
Physical Security Measures
These are the key areas that play a huge role in ensuring that the facility is secured. The physical security system must be improved to ensure that there is an effective provision of the required security measures. The first key thing that must be done is improved on locking of the doors. All the entry and exit points must be managed to ensure that there is no entry or exit of the facility without following the set security procedures.
Secondly, there must be the use of the standard access methods in which the facility must always be manned by the use of a digital system in which the technology would man anybody getting inside and outside the premises. This will require that there is the use of the standard cards that would only allow those with access cards to gain entry or exit of the facility (Tajik, 2019).
Besides that, with the increased insecurity issues there is also the need to have a surveillance system for the premises which will be monitored on a 24-hour system. The system will comprise of both fixed cameras and the surveillance video cameras that will capture all the details of individuals and activities taking place at the premises. The surveillance will be done in conjunction with the physical personnel security in which all activities will also be recorded and saved for future references.
Additionally, there will also be the installation of the alarm systems at the premises. The system will be aired to all sections of the company. The alarms will be connected with the physical security to ensure that in case of any alert the system coordinates the most effective way that would result in the management of the situation.
The running of the facility will not be successful without the use of the services rendered by the employees. However, to ensure that the facility is secured the employees will have to adhere to the new security policies and be aware of the danger that looms with any insecurity decision that they might take.
· The employees will not be allowed to use their devices to send and receive emails meant for the corporation.
· There shall be no bringing of personal devices in the premises, this is to avoid causing risk on the facility`s data and the entire running of the facility.
· Besides that, personal devices will also be not in use while at work. They have to be turned off and only be used when the employee is not doing any official activity of the company (Hamadaqa, Mars & Adi, 2020).
· In case it’s mandatory that an employee brings their device to the facility there must be adhering to the regulations of the facility such that there is no data that’s carried out of the facility for personal use and their devices must be updated with current antivirus software.
Brito, M., Gonçalves, M. A., Caravana, N., Esperança, M., & Teixeira, H. (2020). The Impact of Implementing Hygiene and Safety Measures on Absenteeism—A Case Study in a Small Metallurgical Company. In Occupational and Environmental Safety and Health II (pp. 749-754). Springer, Cham.
Hamadaqa, E., Mars, A., & Adi, W. (2020). Physical Security for Fleet Management Systems. Cryptography, 4(1), 1.
Tajik, S. (2019). On the physical security of physically unclonable functions. Springer International Publishing.
Creating and Communicating Security Strategies in Business Essay
QUALITY OF RESPONSE NO RESPONSE POOR / UNSATISFACTORY SATISFACTORY GOOD EXCELLENT Content (worth a maximum of 50% of the total points) Zero points: Student failed to submit the final paper. 20 points out of 50: The essay illustrates poor understanding of the relevant material by failing to address or incorrectly addressing the relevant content; failing to identify or inaccurately explaining/defining key concepts/ideas; ignoring or incorrectly explaining key points/claims and the reasoning behind them; and/or incorrectly or inappropriately using terminology; and elements of the response are lacking. 30 points out of 50: The essay illustrates a rudimentary understanding of the relevant material by mentioning but not full explaining the relevant content; identifying some of the key concepts/ideas though failing to fully or accurately explain many of them; using terminology, though sometimes inaccurately or inappropriately; and/or incorporating some key claims/points but failing to explain the reasoning behind them or doing so inaccurately. Elements of the required response may also be lacking. 40 points out of 50: The essay illustrates solid understanding of the relevant material by correctly addressing most of the relevant content; identifying and explaining most of the key concepts/ideas; using correct terminology; explaining the reasoning behind most of the key points/claims; and/or where necessary or useful, substantiating some points with accurate examples. The answer is complete. 50 points: The essay illustrates exemplary understanding of the relevant material by thoroughly and correctly addressing the relevant content; identifying and explaining all of the key concepts/ideas; using correct terminology explaining the reasoning behind key points/claims and substantiating, as necessary/useful, points with several accurate and illuminating examples. No aspects of the required answer are missing. Use of Sources (worth a maximum of 20% of the total points). Zero points: Student failed to include citations and/or references. Or the student failed to submit a final paper. 5 out 20 points: Sources are seldom cited to support statements and/or format of citations are not recognizable as APA 6th Edition format. There are major errors in the formation of the references and citations. And/or there is a major reliance on highly questionable. The Student fails to provide an adequate synthesis of research collected for the paper. 10 out 20 points: References to scholarly sources are occasionally given; many statements seem unsubstantiated. Frequent errors in APA 6th Edition format, leaving the reader confused about the source of the information. There are significant errors of the formation in the references and citations. And/or there is a significant use of highly questionable sources. 15 out 20 points: Credible Scholarly sources are used effectively support claims and are, for the most part, clear and fairly represented. APA 6th Edition is used with only a few minor errors. There are minor errors in reference and/or citations. And/or there is some use of questionable sources. 20 points: Credible scholarly sources are used to give compelling evidence to support claims and are clearly and fairly represented. APA 6th Edition format is used accurately and consistently. The student uses above the maximum required references in the development of the assignment. Grammar (worth maximum of 20% of total points) Zero points: Student failed to submit the final paper. 5 points out of 20: The paper does not communicate ideas/points clearly due to inappropriate use of terminology and vague language; thoughts and sentences are disjointed or incomprehensible; organization lacking; and/or numerous grammatical, spelling/punctuation errors 10 points out 20: The paper is often unclear and difficult to follow due to some inappropriate terminology and/or vague language; ideas may be fragmented, wandering and/or repetitive; poor organization; and/or some grammatical, spelling, punctuation errors 15 points out of 20: The paper is mostly clear as a result of appropriate use of terminology and minimal vagueness; no tangents and no repetition; fairly good organization; almost perfect grammar, spelling, punctuation, and word usage. 20 points: The paper is clear, concise, and a pleasure to read as a result of appropriate and precise use of terminology; total coherence of thoughts and presentation and logical organization; and the essay is error free. Structure of the Paper (worth 10% of total points) Zero points: Student failed to submit the final paper. 3 points out of 10: Student needs to develop better formatting skills. The paper omits significant structural elements required for and APA 6th edition paper. Formatting of the paper has major flaws. The paper does not conform to APA 6th edition requirements whatsoever. 5 points out of 10: Appearance of final paper demonstrates the student’s limited ability to format the paper. There are significant errors in formatting and/or the total omission of major components of an APA 6th edition paper. They can include the omission of the cover page, abstract, and page numbers. Additionally the page has major formatting issues with spacing or paragraph formation. Font size might not conform to size requirements. The student also significantly writes too large or too short of and paper 7 points out of 10: Research paper presents an above-average use of formatting skills. The paper has slight errors within the paper. This can include small errors or omissions with the cover page, abstract, page number, and headers. There could be also slight formatting issues with the document spacing or the font Additionally the paper might slightly exceed or undershoot the specific number of required written pages for the assignment. 10 points: Student provides a high-caliber, formatted paper. This includes an APA 6th edition cover page, abstract, page number, headers and is double spaced in 12’ Times Roman Font. Additionally, the paper conforms to the specific number of required written pages and neither goes over or under the specified length of the paper.
GET THIS PROJECT NOW BY CLICKING ON THIS LINK TO PLACE THE ORDER
Do You Have Any Other Essay/Assignment/Class Project/Homework Related to this? Click Here Now [CLICK ME]and Have It Done by Our PhD Qualified Writers!!