Deep

CurbingIntrusionintheCorporation xInstitutionalSecurity x

Running Head: CURBING INTRUTION IN THE CORPORATION 1

Don't use plagiarized sources. Get Your Custom Essay on
Deep
Just from $13/Page
Order Essay

CURBING INTRUTION IN THE CORPORATION 4

Curbing Intrusion in the Corporation

Student’s Name:

Professor’s Name:

Date:

Keeping a corporation safe forms of intrusion requires prior planning and establishment of short term, midterm and long term plans. A long range plan entails outlining the possible course of action that need to the in motion in order to realize the purposed goal. A three long range plan to guard the corporation against intrusion is possibly the best tool available to will ensure that the corporation does incur losses resulting from unauthorized internal and external intrusion (Mendelow, 2015). Long term range helps the mandated team to act swiftly in case of an intrusion the possibly neutralize the damage impact.

External perpetrators can access the corporation in several ways and a long range plan should contain factors that would be instrumental in detecting and stopping unauthorized access into the corporation. Some of the common ways in which perpetrators would gain access into the corporation center are;

Tailgating, a form unauthorized access into the corporation’s secure zone where a particular intruder with motive to access the corporation’s premises follows an authorized person through a door. This kind of intrusion can be deterred by giving prior training to all authorized users on importance security awareness strategies (Bace, 2015). Restring entry to one individual at time by setting up turnstiles and mantraps.

Perpetrators also use door popping to gain access into the corporation. Installing access control system to detect when doors are popped and alerting the security would be vital in averting this security problem. To increase the effective of access control cards by using complementary technologies such as biometric to reduce the chances of forging them at home (Shabtai, Elovici, & Rokach, 2012). I would advise the corporation’s management consider using re-core looks and electronic key management solutions to track lost keys to prevent external perpetrators from gaining access to the corporation’s premises. Setting up surveillance cameras has also proven to be effective in many occasions.

To prevent internal perpetrators from accessing the corporation’s center, frequent background checks on those situation within the corporation should be conducted to ensure that only users with credentials access particular zones. Setting up access control level at various locations would ensure that only authorized personal with the corporation access the corporation center. This depends on the roles of an individual or the level of mandate accorded to within the corporation (Trost, 2018). Cable locks should be used within the corporation’s center to prevent looting of electronic equipment by rogue individuals. Looking up sensitive file and usb drives in secure safes should be a priority.

In some cases employees are found culpable of unauthorized access to secured zone within the corporation. To avert such incidences my team intents to introduce new hire forms checklists where new employees can verify their work legibility. Emergency plans to conduct training on employees to trouble shoot in case other colleagues breach the security protocol for the corporation (Zimmermann, Mé, & Bidan, 2015). A concrete background check on all the employees in the corporation would go a long way in sieving rouge employees within the corporation.

Erecting the necessary mechanisms in the corporation to detect unauthorized access is critical in stopping intruder before they impact damage on the corporation. Intruders have been reported to cause corporations financial losses as well causing disruption and stress on the crucial activities in the organization. Some of the initiatives in place to detect false intrusion include development of wireless intruder detection systems, introductions of intrusion detection systems that are always on alert and respond quickly in case of intrusions. Using high security access cards would help identify when an individual tries to use forged access card (Kuchaki, 2019). My team also capitalizes on inspecting files and directories for any changes or manipulation.

References

Bace, R. G. (2015). Intrusion Detection and Intrusion Prevention Devices. Computer Security Handbook, 27.1-27.18. doi:10.1002/9781118851678.ch27

Kuchaki, M. (2019). Evaluating Intrusion Detection Systems and Comparison of Intrusion Detection Techniques in Detecting Misbehaving Nodes for MANET. Advanced Technologies. doi:10.5772/8204

Mendelow, A. L. (2015). Setting corporate goals and measuring organizational effectiveness—A practical approach. Long Range Planning, 16(1), 70-76. doi:10.1016/0024-6301(83)90135-8

Shabtai, A., Elovici, Y., & Rokach, L. (2012). A Survey of Data Leakage Detection and Prevention Solutions. Berlin, Germany: Springer Science & Business Media.

Trost, R. (2018). Practical Intrusion Analysis: Prevention and Detection for the Twenty-first Century. Addison-Wesley Professional.

Zimmermann, J., Mé, L., & Bidan, C. (2015). Introducing Reference Flow Control for Detecting Intrusion Symptoms at the OS Level. Lecture Notes in Computer Science, 292-306. doi:10.1007/3-540-36084-0_16

Running Head: INSTITUTIONAL SECURITY 2

INSTITUTIONAL SECURITY 2

Institutional Security

Student’s Name:

Professor’s Name:

Date:

Question 1: Countermeasures implemented on campus to enhance student, faculty and staff security.

Data is information that has been observed, processed and either used or not. Data that belongs to a particular company is usually not allowed to be seen by other unfavorable people even for just a little moment. “As data protection legislation gets tighter, schools need to become extra vigilant” (Simister A., 2017) All institutions including both schools, colleges and universities all have one thing in common. The common thing between them is that all of them both increasingly gather and process their personal as well as confidential information concerning their students, staff and also some other member of the general public. In that case, most of the institutions are confronted by the same scenarios which is about some people wanting to steal the information in order to personally gain whatever it is they will e receiving after stealing the information. Therefore, there are measured that institutions could adhere to in order to ensure security of the information and there credibility as well.
The following are the countermeasures that could be taken to ensure institutions do not just let unscrupulous individuals from getting critical and confidential information. The first thing that institutions could do is to appoint a data protection officer in the offices (Steve, S., 2014). This will be an important step since the officer will be the person responsible as well as accountable for the data protection issues that might arise in the organization at any time. It is always a good idea for the data protection officer to be referred to in the data protection policy since it will be required of them to directly deal with the institutions security-related inquiries from the members of the staff. The data protection officer will also be responsible for training the staff concerning matters to do with information security, investigating suspicious activities from the other staff members and also keeping up with the industrial practices and latest security measures.
Also, it is important to train new and existing employees, enacting policies and procedures in the institution in order to curb the issues of data security. Security usually begins with the employees in the institution and therefore is important for them to adequately trained to deal with situations pertaining to data security. This is usually the work of the data protection officer. “Each staff member should have a clear understanding about data protection issues, and the measures that should be taken to mitigate the risks of a potential breach.” It is usually ideal for the members of the staff to attend at least one training course every year which will aid in aligning the compliance protocol of the institution. They should also be reminded that at any moment, they may be a source of a breach and hence they should be up to date with the policies behind data protection policy which they could use as reference if they are unsure of what to do when they get themselves in a particular scenario (Simister A., 2017).
Another methodology involves working from home or the Bring Your Own Device rule. This is increasingly becoming a popular trend amongst institutions. The policy states that the members of the staff are permitted to bring from home their personal devices, including laptops, mobile phones, tablets and flash drives in the workplace (Steve, S., 2014). Even though there are a couple of security threats that are involved with this technique since the institution will not have control over how the devices are managed. In order to help mitigate these risks, the institution is supposed to install device management software on any device that is used to access the institution’s data.
Moreover, there is the subject access requests (SAR’s) (Simister A., 2017). Under the Data Protection Act, the subjects of data typically have the right to request for any private information which is held by any organization. It is essential to note that this method may comprise private emails which may have information that is delicate and personal. Institutions also need cyber insurance; this is important to an institution so that it may cover the potential data breaches. This is because the fines\s associated with the breaches are commonly very high. Insurance companies cover cyber attacks and data theft. The last point would be for the institution to regularly conduct audits in the name f the institution. This is important because it’s the fastest way to find out where the sensitive data for the organization is located, who has access to what type of data and when the data was last accessed. With these measures, it will be hard for institutional data to be stolen.

References:

Senseon.com. (2018, August 9). Understanding the Top External Physical Security Threats within Financial Institutions. SENSEON. 

https://www.senseon.com/blog/top-external-security-threats-financial/

Simister A. (2017, September 17). Protecting data: 7 security measures your institution needs. Education Technology. 

https://edtechnology.co.uk/Blog/protecting-data-7-security-measures-your-institution-needs/

Steve, S. (2014, September 22). Top 5 Security Measures For Educational Institutions. Cygilant Blog. 

https://blog.cygilant.com/blog/bid/355425/top-5-security-measures-for-educational-institutions

What Will You Get?

We provide professional writing services to help you score straight A’s by submitting custom written assignments that mirror your guidelines.

Premium Quality

Get result-oriented writing and never worry about grades anymore. We follow the highest quality standards to make sure that you get perfect assignments.

Experienced Writers

Our writers have experience in dealing with papers of every educational level. You can surely rely on the expertise of our qualified professionals.

On-Time Delivery

Your deadline is our threshold for success and we take it very seriously. We make sure you receive your papers before your predefined time.

24/7 Customer Support

Someone from our customer support team is always here to respond to your questions. So, hit us up if you have got any ambiguity or concern.

Complete Confidentiality

Sit back and relax while we help you out with writing your papers. We have an ultimate policy for keeping your personal and order-related details a secret.

Authentic Sources

We assure you that your document will be thoroughly checked for plagiarism and grammatical errors as we use highly authentic and licit sources.

Moneyback Guarantee

Still reluctant about placing an order? Our 100% Moneyback Guarantee backs you up on rare occasions where you aren’t satisfied with the writing.

Order Tracking

You don’t have to wait for an update for hours; you can track the progress of your order any time you want. We share the status after each step.

image

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

Areas of Expertise

Although you can leverage our expertise for any writing task, we have a knack for creating flawless papers for the following document types.

image

Trusted Partner of 9650+ Students for Writing

From brainstorming your paper's outline to perfecting its grammar, we perform every step carefully to make your paper worthy of A grade.

Preferred Writer

Hire your preferred writer anytime. Simply specify if you want your preferred expert to write your paper and we’ll make that happen.

Grammar Check Report

Get an elaborate and authentic grammar check report with your work to have the grammar goodness sealed in your document.

One Page Summary

You can purchase this feature if you want our writers to sum up your paper in the form of a concise and well-articulated summary.

Plagiarism Report

You don’t have to worry about plagiarism anymore. Get a plagiarism report to certify the uniqueness of your work.

Free Features $66FREE

  • Most Qualified Writer $10FREE
  • Plagiarism Scan Report $10FREE
  • Unlimited Revisions $08FREE
  • Paper Formatting $05FREE
  • Cover Page $05FREE
  • Referencing & Bibliography $10FREE
  • Dedicated User Area $08FREE
  • 24/7 Order Tracking $05FREE
  • Periodic Email Alerts $05FREE
image

Our Services

Join us for the best experience while seeking writing assistance in your college life. A good grade is all you need to boost up your academic excellence and we are all about it.

  • On-time Delivery
  • 24/7 Order Tracking
  • Access to Authentic Sources
Academic Writing

We create perfect papers according to the guidelines.

Professional Editing

We seamlessly edit out errors from your papers.

Thorough Proofreading

We thoroughly read your final draft to identify errors.

image

Delegate Your Challenging Writing Tasks to Experienced Professionals

Work with ultimate peace of mind because we ensure that your academic work is our responsibility and your grades are a top concern for us!

Check Out Our Sample Work

Dedication. Quality. Commitment. Punctuality

Categories
All samples
Essay (any type)
Essay (any type)
The Value of a Nursing Degree
Undergrad. (yrs 3-4)
Nursing
2
View this sample

It May Not Be Much, but It’s Honest Work!

Here is what we have achieved so far. These numbers are evidence that we go the extra mile to make your college journey successful.

0+

Happy Clients

0+

Words Written This Week

0+

Ongoing Orders

0%

Customer Satisfaction Rate
image

Process as Fine as Brewed Coffee

We have the most intuitive and minimalistic process so that you can easily place an order. Just follow a few steps to unlock success.

See How We Helped 9000+ Students Achieve Success

image

We Analyze Your Problem and Offer Customized Writing

We understand your guidelines first before delivering any writing service. You can discuss your writing needs and we will have them evaluated by our dedicated team.

  • Clear elicitation of your requirements.
  • Customized writing as per your needs.

We Mirror Your Guidelines to Deliver Quality Services

We write your papers in a standardized way. We complete your work in such a way that it turns out to be a perfect description of your guidelines.

  • Proactive analysis of your writing.
  • Active communication to understand requirements.
image
image

We Handle Your Writing Tasks to Ensure Excellent Grades

We promise you excellent grades and academic excellence that you always longed for. Our writers stay in touch with you via email.

  • Thorough research and analysis for every order.
  • Deliverance of reliable writing service to improve your grades.
Place an Order Start Chat Now
image

Order your essay today and save 30% with the discount code Happy