Security Policies Given the Highly Essay

Total Length: 749 words ( 2 double-spaced pages)

Total Sources: 2

Page 1 of 2

If not, what other recommendations would you make to Harold? Explain your reasons for each of recommendations.

No, the actions that were taken by Harold are not adequate. The reason why, is because he has created an initial foundation for protecting sensitive information. However, over the course of time the nature of the threat will change. This could have an impact on his business, as these procedures will become ineffective. Once this occurs, it means that it is only a matter of time until Harold will see an increase in the number of cyber attacks. At first, these procedures will help to prevent hackers from accessing the company's files. Then, as time goes by they will be able to overcome his defenses. This increases the chances that he will see some kind of major disruptions because of these issues. ("Security Policies," n.d, pp. 281 -- 302) ("Computer-Based Espionage," n.d, pp. 365 -- 391)

The recommendations for Harold include: creating different backup systems and constantly monitoring for new threats. Creating different backup systems is when you are establishing other security protocols. They are serving as a failsafe, in the event that a primary block such as: a firewall is breached.
This will help to isolate the threat and limit the kinds of information that they will have access to. ("Security Policies," n.d, pp. 281 -- 302) ("Computer-Based Espionage," n.d, pp. 365 -- 391)

Constantly monitoring for new threats is when you are: looking for unusual activity or anything that can be suspicious. In this case, you would look at: the traffic patterns, the number of visitors to the site and the logs. This will help you to determine if there is anything unusual. Once this occurs, you can isolate the threat and make any kind adjustments to the various security procedures. These different recommendations are important, because if they are used consistently they will help Harold to adapt to the various threats that are emerging. In many ways, one could argue that this is one of the keys in being able to: prevent a cyber attack and the possible loss of sensitive information. ("Security Policies," n.d, pp. 281 -- 302) ("Computer-Based Espionage," n.d, pp. 365 -- 391)….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Security Policies Given The Highly" (2011, May 11) Retrieved May 18, 2025, from
https://www.aceyourpaper.com/essays/security-policies-given-highly-44553