Thursday, April 18, 2019

Human Factors in Security Essay Example | Topics and Well Written Essays - 3500 words

Human Factors in certificate - Essay ExampleIt only takes a single lapse to put the classified data and randomness resources at risk. Thus, the sensitive data whitethorn be acquired unlawfully, damaged, or modified because personnel have either become complacent or are assuming new responsibilities without specific credentials awareness. Therefore, efficient security indoctrination measures must be planned and employ to manage all risks associated with Information and Communication Technologies. Managers at all levels have to ensure that, the indoctrination of AAN personnel commences on induction and continues throughout the progression of their career. 2. The Report In the follo come alongg paragraph a brief radical is presented by AAN managers in order to raise a winning ask over for a huge contract. 2.1 super Secretive Organizations AAN Limited is involved in designing hundreds of small electrical products and consists of highly professional manpower. everywhere the last 3 years, the company has been exploring the Asian markets. In order to make a successful bid for winning a huge contract for Indian government, the company is required to change its overall construction and working environment. In order to gain the optimum confidence level of Indian government, AAN Limited is spillage to change itself into a highly secretive organization. It means the company has to create a highly secured and preventative environment to keep all of its business projects confidential not only from external factors but to a fault from any unauthorized persons even belong to AAN. On the contrary, a constricted deliberation related to security devices as a whole may initiate a counterfeit confidence in the establishment (Turn & Ware, 1975). A cultural shift surrounded by in-depth awareness of information security is needed to win the desired contract. AAN set up execute this project through its short and long term strategic objectives. This can be achieved by clo se coordination of planning, communication, peer review, and documentation (Kevin, Gene, & George, 2004) (a) Establishment of Department of Information Security vigilance at headquarters level and IT Centre at section levels (b) Formulation of information security dogma (c) Designation of IT Officers at section level (d) Provision of information security awareness to all personnel (e) Ensure the use of only officially procured and registered hardware and software (f) All hardware and media is to bear prehend security marking (g) Ensure that no unauthorized hardware is used 2.2 Human Factors in Security 2.2.1 Roles and Responsibilities Roles and responsibilities of all personnel with respect to information security have been clearly defined by all stakeholders. The word security means the controlling methods by which a computer, some other devices, or information contained in them are modified (Miller, 1971).

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.