Gonsalves, Christine-Week 4
SEC 701
Midterm
Part I: Read the article entitled “Security at Center Stage” and compare it to one of the 'Key Tenets' Maslow writes about.
The article “Security at Center Stage” depicts five secrets to a CSO’s success; it outlines the attributes needed to obtain success in the evolving field of security management. With the evolving role of a CSO there is a great necessity to satisfy all levels of need in the security and business setting. According to the article “Security at Center Stage” a CSO’s success is contingent on being “more that the average techie”, having a “focus on business”, being a “relationship builder”, requiring “an eye toward pervasive security”, and implementing a “dual reporting structure.”
…show more content…
According to Fay a key tenet of Maslow’s theory, “A need can be satisfied in different ways” is a principal that is similar to the five secrets.
As in the field of security there is always a need for continued advancement and development. In the first secret “more that the average techie” , it states that today’s role of a CSO is no longer a traditional one. According to the article “Security at Center Stage” a CSO needs to be a “well rounded individual”, and possess an understanding of technology as well as how the technology relates to defenses and the ability to communicate this knowledge to a business-oriented environment.
According to the article “Security at Center Stage” the second secret states “focus on business”, this emphasizes communication and the importance of harnessing a multitude of skills such as strategic thinking/planning, leadership, an understanding of business, the ability to influence in addition to a keen knowledge of security and technology. The need for constant development only leads to further advancements in other
…show more content…
fields. The third secret focus is on “relationship builder” , this is a vital component to an organization in that it aids to build and motivate a team. Developing a relationship enforces the social needs of employees and strengthens interactions. Furthermore, this inspires employees to work as a team, and motivates them to reach their potential and achieve self-fulfillment. Effective CSO’s will be able to customize their goals to a specific target. According to the article “Security at Center Stage” the fourth and fifth secrets speaks of “an eye toward pervasive security”, and “dual reporting structure.” The fourth secret states that is it essential to create a pervasive security culture in order to instill reasonability; from the top down by implementing a system of recognition for achieving, and surpassing proper application of security measures. The fifth secret “dual reporting structure” is similar to the auditing function to maintain independence by a system of checks and balances. Security management is an ever evolving structure as in Maslow’s key tenet, “A need can be satisfied in different ways.” An effective CSO must possess immersive knowledge to effectively carry out security and business objectives.
According to the article “Security at Center Stage” a CSO must implement various ways to develop relationships and promote security. It is pertinent that they possess the appropriate qualities as stated in the article to achieve organizational and industrial security to create competent security professional that can deal with situations as they arise, and be able to effectively communicate to all levels of an organization as stated in the article “shared best practices in security serve us all very well, and our communal defense can only be improved through
collaboration.” Part II: Select one of the '5 Secrets' from this article and compare it to one credo that Fay writes about regarding 'A Credo For The Security Leader'. As stated by Fay the credo “maintain a dialogue with the users of security services” is similar to the secret “relationship builder”. According to the article, “In addition to building and motivating his own team of pros, he’s going to be out on the front line.” , the CSO seeks to convey the message that it is everyone’s responsibility to play a proactive role in maintaining security. “If you want to enjoy the corporate network, then these are the rules to help me protect it.” , every employee has a strong responsibility to the organization to uphold security. Communal security can only be implemented and improved through collaboration at all levels.
Collaboration among security officers will probably require them to focus on an agreed-upon definition of security incident. The group probably wants to prioritize their limited time dealing with significant threats to the system, not just review reports that have little or no security significance. It is almost inevitable that as a result of human error, a technical failure or a novel attack, that some security incident or privacy breach will occur. It is extremely important that the RHIO has agreed upon procedures for incident response, reporting, and remediation.
Charen presents her thesis prominently at the beginning of her essay in her title. By doing so, she not only clearly expresses her thesis that we must give up some liberty to secure the United States, but also peaks the interest of the reader with a provocative and timely statement. To understand the appeal of the title as a narrative hook, the reader should consider the context in which it was written. Charen’s essay was written at a post-9/11 time when security was on the minds of everyone in the United States.
In the article, Offense, Defense, and the Security Dilemma, Robert Jervis argues that the security dilemma is more lethal and that the international conflict is more likely to occur when the offense has an advantage over defense. Robert Jervis also maintains that, when a defense is prominent the chance of war and conflict decreases exponentially. Throughout the article, Jervis makes multiple compelling arguments regarding the offense-defense balance and the security dilemma. The security dilemma exists when "many of the means by which a state tries to increase its security and decrease the security of others. " Security dilemma provides a rational foundation referred to as the ‘spiral model’, which is a term used in international
According to the third tier of Maslow’s hierarchy of needs, all human beings need a sense of love and belonging. Big Brother fulfills this basic need by removing interpersonal relationships - romantic,
The inalienable rights that he and his colleagues would lay as the foundation of fledgling nation were the lifeblood of a successful society. They had come to understand that freedom and safety didn’t exist on opposite sides of spectrum, as we are so often duplicitously lead to believe; freedom is the ultimate form of safety. What is safety? At it’s most base it is the lack of potential to harm
Whitman, M., & Mattord, H. (2010). Management of information security. (3rd ed., p. 6). Boston, MA: Cengage Learning.
Final Assignment Topic 1: What are the capabilities and limitations of intelligence in supporting homeland security efforts? The United States has endured numerous security breaches and high security threats over the past two decades. After the attacks on 9/11, the office of Intelligence became a vital source in retrieving sensitive data and tracking down potential terrorists and their networks which could pose a threat to the American people and then forwarding that vital information to the Department of Homeland Security and other government agencies.
Homeland security was developed by the United States government to protect the country from external aggression, reduce the likelihood of terrorist attacks and manage the damage that occurs in case of attacks. To this end, the government set up and reconstituted numerous agencies to aid in the fight against terrorism in the United States. The United States Department of Justice and Department of Homeland Security constitute the most prominent departments under the United States law to champion the fight against any attacks by extremist groups. Federal, State and local law enforcement agencies, as well as the United States’ military also have a role to play in homeland security. With the increasing cases of attacks and acts of aggression towards the United States, the government sought to strengthen the resolve to curb any attacks aimed at killing or maiming the citizens or destruction of government institutions and installations. In the wake of the September 11 attacks, it was apparent that stringent measures were needed to prevent attacks on American soil and protect the citizens of the country. This paper examines the duties; responsibility and intelligence methods used by the military, federal, State and local law enforcement agencies, as well as homeland security agencies in the fight against terrorism, with the aim of drawing similarities and differences.
Security helps the organization meet its business objectives or mission by protecting its physical and financial resources, reputation, legal position, employees, and other tangible and intangible assets through the selection and application of appropriate safeguards. Businesses should establish roles and responsibilities of all personnel and staff members. However, a Chief Information Officer should be appointed to direct an organization’s day to day management of information assets. Supporting roles are performed by the service providers and include systems operations, whose personnel design and operate the computer systems. Each team member must be held accountable in ensuring all of the rules and policies are being followed, as well as, understanding their roles, responsibilities and functions. Organizations information processing systems are vulnerable to many threats that can inflict various types of damage that can result in significant losses (Harris, 2014). Losses can come from actions from trusted employees that defraud the system, outside hackers, or from careless data entry. The major threat to information protection is error and omissions that data entry personnel, users, system operators and programmers make. To better protect business information resources, organizations should conduct a risk analysis to see what
get directly involved in the threat assessment and mitigation process. Because security is the type of investment that is difficult to gain funding for, particularly when competing for limited resources with projects that promise big results-efficiency improvements, revenue enhancements, and the like-it is all the more critical that it is not left to the IT group to make the case. General and functional managers must get involved in the security discussion, understand the threats, and assess the degree of risk that the firm should be allowed to take. Actually, as a general or functional manager should responsible for weigh in on the difficult trade-off decision between purchasing more security and accepting higher risks.
Management- private security manager is answerable and accountable for improving definite programs in training security employees or pe...
It can be said then that a Chief Information Officer is a crucial senior administrative post in an organization since information technology plays a great role in giving leverage to business. Typically, a Chief Information Officer has a strong background in some fields of IT such as information systems, computer engineering or computer science. Being a senior post, it is a must for a Chief Information Officer to possess a post-graduate degree in the field of management such as a Master’s in Busines...
Moreover, this critical review is important to the national security of America and abroad. The influence a leader and manager has on the security industry is vital. The positions are so crucial because security professionals across the board need influential leaders. It takes all kinds of security professionals to perform the demanding profession of security without fail. The 21st Century is challenging for any career choice, but for security, it is an ever-changing environment.
Johnson, B. R. (2005). Principles of Security Management. Upper Saddle River, NJ: Pearson Prentice Hall.
The first thing that we must consider about Information Security is that there is not a final destination at which we can arrive. IT Security is an ongoing set of processes and activities that requires attention and expertise on a daily basis. It is important to understand that systems are not secured by themselves and it is our responsibility to maintain and improve them periodically as required. It is of vital importance to establish the appropriate mechanisms and requirements in order to support the company’s CIA triad. The following report will provide you guidance about auditing and hardening techniques applied though the 7 Domains by utilizing IT Security Best Practices.