Security Policy and Risk Strategy Essay

Total Length: 1383 words ( 5 double-spaced pages)

Total Sources: 2

Page 1 of 5

The most appropriate products that could be used by MMC to achieve this objective would be: IP San and a Snap Lock. An IP San is a fiber optic channel that can provide secure real time data to each location. Where, software and security applications can be adapted to the current system that is being used. The Snap Lock is: a security software that can be used to provide an effective way for each location to retrieve, update and change information.

Support for why these procedures and products are the optimal approach for this organization

The reason why these different procedures and products were selected was: to reduce the overall risk exposure of the company's external threats. The current system that is being used by MMC increases risks dramatically, by having a number of different systems, where financial information is stored. If any one of these systems is vulnerable, there is the possibility that you could see a major security breach. To reduce these risks requires limiting the number of locations to two. You would then, use fiber optics and other high speed protocols to deliver the data to each location. The IP San was chosen, because it can effectively adapt to the current system that is being used, it works with a variety of financial programs and it offers secure connections. ("IP San, " 2010) You would then, use the Snap Lock security software as an added layer of safety against possible breaches. This system would work more effectively, because it would create a virtual fortress around the company's it infrastructure. ("Snap Lock Compliance and Snap Lock Enterprise Software," 2010)

High level architectural and design details for how and where these procedures and products will be implemented within the organization

The way that the above mentioned tools will be implemented into the company's it infrastructure is through: a system of creating one integrated structure and then implementing the different pieces into the one protocol.
This will be accomplished by establishing the new protocol independently of the current system. Then, as you are integrating the pieces for the current system into the new protocol, you will be training and updating the staff about the new system. This will allow for sufficient time to ensure that the new protocol is fully working and everyone understands how to use it. The use of a single it protocol that can streamline all data / information; has shown to be cost effective and can increase the overall security of the system. At which point, you are taking this new protocol and are constantly testing it for vulnerabilities. This will ensure that the company is able to adapt to the different changes that are occurring in the world of it security. Once, management and various it personnel are aware of these issues, the risks dramatically decrease for each breach. This is supported by information from the Department of Homeland Security, which found that those companies who are not testing their system and looking for various weaknesses; could be the most vulnerable to these different issues because of their false sense of security. (Mason, 2010)

Clearly, MMC needs to implement a new security risk protocol. This is because the current system that is being utilized; has a number of locations that are storing all of their customers personal financial information. As a result, the chances increase exponentially of hackers being able to successfully breach the system. To prevent such instances, requires that the company implement one it protocol that will be in at two locations. This will provide increased amounts of security, by ensuring that all information is provide via high speed fiber optics network. You would then, implement Secure Lock to provide an added layer of protection. If the company can implement such a system, they will dramatically reduce risks, by facing these issues......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Security Policy And Risk Strategy" (2010, May 28) Retrieved May 6, 2024, from
https://www.aceyourpaper.com/essays/security-policy-risk-strategy-10696

Latest MLA Format (8th edition)

Copy Reference
"Security Policy And Risk Strategy" 28 May 2010. Web.6 May. 2024. <
https://www.aceyourpaper.com/essays/security-policy-risk-strategy-10696>

Latest Chicago Format (16th edition)

Copy Reference
"Security Policy And Risk Strategy", 28 May 2010, Accessed.6 May. 2024,
https://www.aceyourpaper.com/essays/security-policy-risk-strategy-10696