Criminal Justice

Submitted by: Submitted by

Views: 119

Words: 1696

Pages: 7

Category: Science and Technology

Date Submitted: 03/18/2014 07:12 PM

Report This Essay

Fanny Aguilar

CHSC 235

Professor: Ralph Gaspard

12/14/13

The Pamela Company: Security Management

The Pamela Company started with an extensive line of whimsical hair accessories and has subsequently branched out to include wings, capes, and her custom designed, fabulous frothy and colorful tulle tutus (with wands), and she admits to being "inspired by pieces of fabric" for her beautiful creations. Pamela Richardson is the owner and manager of this company. She counts with 6 people helping her. Pamela Richardson is in business for 32 years. As any other company, knowing that “security costs money” The Pamela Co. needs to identify assets requiring protection and undesirable events that could happen to the information, equipment, facilities, personnel and activities. On the other hand this company is supposed to all the risks, the level of vulnerability, threats and the impact that all of these factors cause to the company. In other words, this company needs a risk management assessment. “A risk assessment is the process of evaluating the threats and vulnerabilities” of the identified assets (Carl Roper, 1999).

In the case of information The Pamela Co. has a lot of valuable information that should be protected. All the invoices, credit cards information and patent designs require protection. As any other business, this company deals with transactions every day. Since all the sales involve credit card information it would be crucial if people get credit cards numbers and use them to make purchases. Also, the personal information from the invoices might lead to identity theft, which is a very detrimental event in people’s lives. When identity theft happens, sometimes destroys peoples’ image and reputation. This is why personal documentation should be stored in safe cabinets. Hard papers should be filed on safe cabinets where only authorized people have access to it. Nobody knows when people might want to roam into information. Also, if we refer to software...