Bsa/310 Week 2

Submitted by: Submitted by

Views: 10

Words: 601

Pages: 3

Category: Business and Industry

Date Submitted: 04/14/2016 10:33 AM

Report This Essay

BSA/310 Week 2 Individual Assignment

Hector Palacios

BSA 310

March 24 , 2016

John Rogers

BSA/310 Week 2 Individual Assignment

What are three key elements for an organization to consider in strengthening its overall information security posture? Describe how each plays a role in the operations of the entire organization.

I think that the three important factors I will acknowledge are employee’s education foundation and intuition, personal safety methods and software inspired security. The information technology schemes have appropriate software security programs to avoid fraud or data extraction. Utilization of these programs will help lessen external assaults and also few dangers within the company. Personnel education is another factor that must be analyzed. Strengthening the workforce for social engineering approach and also instructing them of business processes and rules is one of the cardinal procedures in obtaining safety. With the lack of precisely educated personnel: user data, secrets and the company’s files can be on evil ownership. With the help of a thoroughly prepared program, personnel safety concerns can be easily prevented. The last factor in safety that I want to reinforce is the personal safety methods. Some companies have spaces that can only be accessed by specific personnel that fulfill safety requirements. Entrance codes and keys, card readers, personnel checkpoints and also pursuing agents are precautions for safety. These procedures will considerably lessen the probabilities of hacks and frauds. For these precautions to be breached, one must have the necessary authorization. Don’t mistake risks; it can emerge from the workforce for they have the capabilities, however I believe that many of the personnel that you have faith in accept the responsibilities passionately. Some people can utilize this opportunity to avoid safety procedures in order to execute responses that will be advantageous to them rather than the company they...