Loading...

Messages

Proposals

Stuck in your homework and missing deadline?

Get Urgent Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework Writing

100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Essay on how an organization’s information security blueprint becomes a project plan

Category: Risk Management Paper Type: Report Writing Reference: APA Words: 1700

Implementation of the plan requires preparing a detail project on the security information. The creation of project plan is often assign to project manager or to the decision maker to calculate the cost of security. Project plan of physical security could be prepared by using simple tools and methodology in the working structure. The budget plan is prepared in the way which could be define in such a way:

 

The above table shows that how resources are utilized on a specific security which shows different level of consumption of resources with estimated expenses. The major work plan should be distributed with the attributes for each work in the plan (C. Y. Ku, et al., 2009).

Implementation of security information through staffing, enumerating credentials, supporting policies and practices

Whenever there is implementation of the information security, there are many resources which may be created in the staffing and grading of the resources which could impact the IT function of the computer to save the data. When the information security plan is being in updating, employees get threat to feel that there may be lost of data in the computer. At the time of implementation of the information security there may be many issues to enforce the data. The general management of the community must work with the information security to integrate the information security in the management practice so it could be possible for data security. Security function in an organization could be placed with IT functions, physical security system and information security function. It also take insurance and risk management into consideration to deal the threat of risk management. Organizations requires proper enforcement of the needs of education training and security functions which could be helpful in security information.

While implementing the physical security, selecting personnel also based on the criteria which include examines supply and demand. Several expertise of the implementation of the security function keep in view the market forces and determine that which segment is most risky in matter of the security threat. These measures are taken in to consideration until it reach at maximum cost which is unaffordable for the organization. In the present time of information security, organizations are setting the demand with the individual principle of security to protect the data. Information security system use standard of jobs as they are assigned work. This role refers to the people or group of people who are working in the organization to guarantee about the risk factor. They are responsible for the overall strategic goals of the company to meet the requirements of the business functions. For example, CEO, board of directors and CIO who are working with the strategic department of the business. Different executives perform different role in the protection of data through information security and physical security.

Chief Executives Officer (CEO) also have a high performance role which includes the responsibility of the senior management to protect the information with positive attitude to influence the risk which could be assessed by the unauthorized way. He has some basic responsibility relevant to his job as to integrate the procedure of information security to make easy the functions of the business (A. Ahmad, et al., 2014).

Chief Information Officer (CIO) is a security dealing authority in the organization who deals with the management to designate them at different vacant which secure the data as well as implement the strategies at senior managers to control the techniques of saving the data. These are the persons who are personally trained to do secure the information. His basic strategies. His basic responsibilities are to allocate the resources to secure the information and function of the organization. He gives surety that the system of the business is fully security of the data which is compulsory to impact in positive way of security system of the organization which make sure that the system is being run smoothly with effective management.

The security system of the organization also based on different key authorities which are responsible to protect the data in soft and hard form. The data in the computer or system of the organization are protected through information security while data in physical form is protected through physical security measures in the organization. The authority line is complete with CEO to technician which fulfil the requirement of the security information (L. Ertaul & Sudarsanam, 2005).

Risk Assessment and Business Continuity Planning

Risk management and risk assessment are competed with the basic security risk analysis to maintain the infrastructure of the business and to analyze the situation of how a business entity continues to implement information security management. It should be included in the employees’ jobs that no one could copy or use data of others without his or her permission. Business organizations should use barriers and obstacles to prevent unauthorized persons from checking the data. Secure data should be made in the form that faces the disaster in the supervision of the delivery of data from one authority to another. It is the process to determine which factors could be beneficial for the organization and what re not suitable according to the business situation. It is difficult task to check which part of the risk gains confidentiality and which relates to integrity. This assessment makes the organization to divide the performance of the factors. To protect data from the theft companies are using safeguards and equipment to secure the risk. There must be secure power cables and power supply so that data in computers also saved from hacking. Any organization that is dealing in the market should implement these measures to continue the business in the market. The security measures are necessary to develop the security system in the organization. The natural occurring risk could impact on the abilities of the operation. The damage should be incorporated in the emergency planning procedure and business continuity plans. Assets of the company from threating scenarios which could identified the risk which can measured and implement the emergency. After the identification of the risk, the potential impact is easy to measure to extend the business with risk handing. If the organization follow all the steps to secure the information system there are more chances to protect the data.

Summary of PHYSICAL AND INFORMATION SECURITY

·         The report is based on the system of security of data in the activities of the business by the professional expertise.

·          There are legislations and regulations which are used in the physical and information security of the data.

·         The study discussed about the role of information security and the relationship between the physical security and information security in the environment of the organization.

·         There is also budget plan for the security system for the organization. The study is based on the discussion about the staffing in the organization to support the policies and procedures which are compulsory to implement and follow to protect the personal and professional information of the organization and the employees.

·         The main objective of this report is to describe the role of the physical security which is connected with the information security program in the system of dealing of data with precaution and elaboration with the reasons that how it could be helpful to maintain the continuity in the business with the assessment of the risk.

Conclusion  of PHYSICAL AND INFORMATION SECURITY

The information system of the security functions within the organization relating to the issues and problems which could be create problem in the staffing of information security. Professionals who are dealing with the security of the data in the organizations are competent to solve the problems in the issues regarding the threat of data security. It relates to the physical security of the data with the information security. The duties are distributed to the authorities according to the principles of information security system to make the consistency in the data security. . The study discussed about the role of information security and the relationship between the physical security and information security in the environment of the organization. There is also budget plan for the security system for the organization. The main objective of this report is to describe the role of the physical security which is connected with the information security program in the system of dealing of data with precaution and elaboration with the reasons that how it could be helpful to maintain the continuity in the business with the assessment of the risk (P. D. Ray, et al., 2010).

References of Explain how an organization’s information security blueprint becomes a project plan

A. Ahmad, Maynard, S. B., & Park, S. (2014). Information security strategies: towards an organizational multi-strategy perspective. Journal of Intelligent Manufacturing,, 25(2), 357-370.

B. Bulgurcu, Cavusoglu, H., & Benbasat, I. (2010). nformation security policy compliance: an empirical study of rationality-based beliefs and information security awareness. MIS quarterly, 34(3), 523-548.

C. Y. Ku, Chang, Y. W., & Yen, D. C. (2009). National information security policy and its implementation: A case study in Taiwan. Telecommunications Policy, 33(7), 371-384.

H. N., & Liu, H. (2012). Cyber-physical-social based security architecture for future internet of things. Advances in Internet of Things, 2(01), 1.

K. Popović, & Hocenski, Ž. (2010). Cloud computing security issues and challenges. . The 33rd International Convention MIPRO, 344-349.

L. Ertaul, & Sudarsanam, R. (2005). Security Planning Using Zachman Framework for Enterprisesy.

P. D. Ray, Harnoor, R., & Hentea, M. (2010). Smart power grid security: A unified risk management approach. 44th annual 2010 IEEE international Carnahan conference on security technology , 276-285.

R, B. (2007). Information Lifecycle Security Risk Assessment: A tool for closing security gaps. Computers & security,, 26(1), 26-30.

T. R. Peltier. (2013). Information security fundamentals. CRC press.

Our Top Online Essay Writers.

Discuss your homework for free! Start chat

Math Exam Success

ONLINE

Math Exam Success

1239 Orders Completed

Best Coursework Help

ONLINE

Best Coursework Help

1554 Orders Completed

Top Grade Tutor

ONLINE

Top Grade Tutor

11445 Orders Completed