Information Security Management Essay

Total Length: 549 words ( 2 double-spaced pages)

Total Sources: 0

Page 1 of 2

Security Management

Information Security Management

Managing the information security at a major university is never an easy task, and especially with a team of only ten the complexities and the resource demands can sometimes make the situation seem all but impossible even on the best of days. When the former head of information security management suddenly departs as the result of an FBI arrest -- and when that arrest stems from the fact that this Chief Security Officer was a member of Anonymous, the most active and influential (so far as the public is aware, at least) cyber-terrorist group (as identified by law enforcement) -- the situation only becomes that much more difficult. As the interim Chief Security Officer newly in charge of ensuring university information security and with a team of employees ready to tackle the task, there are both immediate and long-term plans that need to be made and put into action.


The first order of business is ensuring that the former Chief Security Officer did not in any way utilize or compromise the university's own information technology system for Anonymous' purposes. If the allegations against him are true, and given his arrest it is reasonable to move forward with the possibility that he was involved in something nefarious, then there will need to be a complete check of all security systems currently in place. This could potentially take weeks in and of itself, and if any significant flaws are found it will take even longer. While it would have been difficult for the CSO to implement anything truly compromising without any other team member's knowledge, this potential does exist and must….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Information Security Management" (2012, May 11) Retrieved May 16, 2024, from
https://www.aceyourpaper.com/essays/information-security-management-57720

Latest MLA Format (8th edition)

Copy Reference
"Information Security Management" 11 May 2012. Web.16 May. 2024. <
https://www.aceyourpaper.com/essays/information-security-management-57720>

Latest Chicago Format (16th edition)

Copy Reference
"Information Security Management", 11 May 2012, Accessed.16 May. 2024,
https://www.aceyourpaper.com/essays/information-security-management-57720