Open Always
Email: Call Now! +1-315 515-4588
Open Always
Email: Call Now! +1-315 515-4588

Research Sample Paper on Information Security Functions

This sample paper on (Research Sample Paper on Information Security Functions) was uploaded by one our contributors and does not necessarily reflect how our professionals write our papers. If you would like this paper removed from our website, please contact us via our Contact Us Page.

A Database of over Million Scholarly Resources. Start your Search Now

Research Sample Paper on Information Security Functions
  1. List and describe the options available for the location of the information security functions within the organization. Discuss the advantages and disadvantages of each option.

Information security function should be located where it can best address enforcement of polices within the organization. One option of locating information security function is in the IT department. This location is convenient because the information security department spends time daily with IT department and thus up to date information is ensured. Also, the IT staffs understand all technological issues that affect information security and therefore the best people to handle it. This location, however, can bring the conflict of interest between the senior employees. It also gives an implication that information security is a technological issue which is not. Another option is physical security. This option facilitates communication between individuals with security responsibilities. It also provides long-term preventative viewpoints on security activities which minimizes costs. This option, however, may unintentionally give powers to the people in charge who may see themselves as exceptional individuals taking part in criminal justice process which can create differences between the information security functions and physical security functions.

The third option is Administrative services. This option acknowledges that all workers should work with the information security department hence acting as a middle manager between the CEO and other workers within the organization. The one disadvantage, however, is that the administration does not have all knowledge about information security technology which may hamper their communication to the top management. Last location option is in the Insurance and risk management department. This location is good at prioritizing risk and ensures security information function is not compromised. On the other hand, the risk manager may lack all IT skills thus need for extra coaching which may be costly (Eaton, 2013).

  1. What are the critical considerations when dismissing an employee? Do these change according to whether the departure is friendly or hostile, or according to which position the employee is departing from?

Security information is very critical to an organization and must be handled with care. Whether the dismissal of an employee arises from a hostile or friendly circumstances, an organization must ensure the employee do not have a contact to the organizational security information. When an employee is being dismissed, all files must be returned to the store or destroyed. The organization must also consider that an employee may have foreseen his termination and started taking information home like files. In such a case, the system should be scrutinized after the employee has left and any access to the organization system by the particular employee disabled. This should be critically carried out in case an employee was in a position that handled the company’s information. Other considerations include changing door locks, cabinet locks, key card access and securing removable hardware and media.                                                  

  1. What are the three primary aspects of information security risk management? Why is each important?

Risk management process involves assessment of information security risks. This ensures the security requirements of an organization are understood together with all the risks associated with an organization’ assets. The three major aspects of information security risk management include identification of assets and identification of threat and identification of vulnerabilities to the identified assets (Lomas, 2013). Assets are physical and nonphysical infrastructures of an organization. They are most important in generating revenue of an organization. These assets have economic values which should be protected. The second aspect is threats. Threats have the ability to damage or completely shut down the network of an organization and consequently lead to a heavy loss.  They may occur in physical form or in the form of programs like viruses. Identification of threats is important to put in place preventive measures and keep the organisational network safe. Finally is vulnerabilities. They are loopholes within an organization which can give a third person access to the system. This poses a great danger to the system since it can be damaged.






















Eaton.J.Robert.(2013) Security and Personnel.Principles of Security Systems.

Lomas, E. (2013). Information Security Risk Management: Handbook for ISO/IEC 27001. Records Management Journal.


Sharing is: CARING

Are you looking for homework writing help? Click on Order Now button below to Submit your assignment details.

Homework Writing Help
We Can Help you with this Assignment right now!
Research Sample Paper on Information Security Functions

Are you looking for homework writing help on (Research Sample Paper on Information Security Functions)? Well, you can either use the sample paper provided to write your paper or you could contact us today for an original paper. If you are looking for an assignment to submit, then click on ORDER NOW button or contact us today. Our Professional Writers will be glad to write your paper from scratch.

We ensure that assignment instructions are followed, the paper is written from scratch. If you are not satisfied by our service, you can either request for refund or unlimited revisions for your order at absolutely no extra pay. Once the writer has completed your paper, the editors check your paper for any grammar/formatting/plagiarism mistakes, then the final paper is sent to your email.

Privacy| Confidentiality

Research Sample Paper on Information Security Functions

We do not share your personal information with any company or person. We have also ensured that the ordering process is secure; you can check the security feature in the browser. For confidentiality purposes, all papers are sent to your personal email. If you have any questions, contact us any time via email, live chat or our phone number.

Our Clients Testimonials

  • I appreciate help on the assignment. It was hard for me but am good to go now

    Impact of pollution on Environment
  • Am happy now having completed the very difficult assignment

    Creative Message Strategies
  • Your writer did a fine job on the revisions. The paper is now ok

    Ethics: Theory and Practice
  • The paper was so involving but am happy it is done. Will reach you with more assignments

    Title: Privatization in or of America
  • I expected perfection in terms of grammar and I am happy. Lecturer is always on our head but was pleased with my paper. Once again, thanks a lot

    Title: Bundaberg Inquiry
  • The paper looks perfect now, thank to the writer

    Health Care Systems
  • You helped me complete several other tasks as you handled paper. wonna thank you

    Critique Paper on Political Change

Related Articles

Research Sample Paper on Information Security Functions

Analyze the Nursing Roles in providing Comprehensive care in a Variety of Community Health Settings

Community Settings This week’s graded topics relate to the following Course Outcomes (COs). CO3: Plan prevention and population-focused interventions for vulnerable populations using professional clinical judgment and evidence-based practice. (POs...
Read More

Case Study Assignment on Ethical Issues in Asia-Pacific business

Case study assignment on Ethical Issues in Asia-Pacific business For this assignment, students will write a case study report in 2,000 words based on a case identified with circumstance or...
Read More

Sample Report Paper on The proposed reward system and strategy for the big city university

A good reward system should motivate workers. It should also attract and retain the same workers. On the contrary, a bad reward system does not do either of these things....
Read More

Management of PCOS through Homoeopathy-A case report

Introduction PCOS is the acronym for Polycystic Ovarian Syndrome. It is the most common endocrine disorder of women in their reproductive period manifested by irregular menstrual cycles and polycystic ovaries,...
Read More

Get more from us…

Would you like this sample paper to be sent to your email or would you like to receive weekly articles on how to write your assignments? You can simply send us your request on how to write your paper and we will email you a free guide within 24-36 hours. Kindly subscribe below!

Email Address: