Sample Essay on Week 4

According to Gollmann (2011), security is principally a management concern, but not a technological concern. Finances are needed in order to ensure that information is stored safely and hence the budgeting aspect is a management concern and not technological. Authorization must be there in all the activities conducted in the business aspect. This entails that, for activities to be effectively carried out, there should be management that would authorize what is supposed to be done and by whom (Peake, 2010).

The security of computers is very sensitive because if not well maintained, the confidential and essential information of a company might be exposed to the outside world. This will pose great peril to the affected company. In this perspective, not every company’s employee is supposed to know this sensitive company’s information since it might be leaked to the competitors of a company (Vacca, 2014). This indicates that there should be a management aspect to make sure that, whatever is meant to be secure is secured by the authorized individual.

On the budgeting aspect, management is needed so that the amount of money required may be channeled to the activities that they are intended for. There are some company’s departments that require more funds than others. In order to have this information properly saved, there is need to have a person to manage (Venkatakrishnan & Goswami, 2012). This indicates that money is needed and if overestimated or underestimated, it might affect the company as a whole.

As the Information Technology director of a small company, below are some of the absolute actions for protecting the information in a security plan.

  • Protect systems, network, and data from being damaged by malicious spyware and viruses.
  • Offer security to internet connectivity.
  • Make installation of firewalls on the systems and activating them.
  • Make back-up copies of crucial business information/data.
  • Control the network and computer apparatus physical access.
  • Coach the workforce about the basic security measures.
  • Limit the way employees’ access the information and control their ability to install new software.

With these measures at hand, the security of a company is not vulnerable.

 

 

References

Gollmann, D. 2011. Computer security. Chichester, West Sussex: Wiley.

Top of Form

Bottom of Form

Peake, K. 2010. The Information Technology Program Manager’s Dilemma: Rapidly Evolving

Technology and Stagnant Processes. Ft. Belvoir: Defense Technical Information Center.

Top of Form

Bottom of Form

Vacca, J. R. 2014. Managing information security. Amsterdam: Syngress.

Top of Form

Bottom of Form

Venkatakrishnan, V. and Goswami, D. 2012. Information systems security. Heidelberg: Springer.