Information Security Strategic Planning Methodology

Great Essays
2. Question Vincent LeVeque speaks of strategy, information technology and security. The author then mentions “Information security strategic planning methodology” (LeVeque, V. 2006. p.4). What is this strategic planning used for and what benefits does it have?

2.1 Answer
Information security strategic planning is used by organisations to mitigate, accept, transfer or prevent information risks related to people, technologies and business processes and adapting new security measures to its business environment. The methodology or the strategic is used for organizations to adequately protect the integrity, availability and confidentiality of information. (LeVeque, V. 2006)

The benefits of an effective information security strategic plan is,
…show more content…
(2006). Information Security – A Strategic Approach , Its relevance to IS/IT security and how it probes into a security problem is not utter explained in any chapter in the book. The answer to this lays on the author's experience as an information security consultant working for a list of clients in the private and public sector (LeVeque, V. 2006). LeVeque speaks of strategy planning and how it can nurture an organization, how it works with information technology and adds security on top of the strategic planning. The strategic planning method assists organizations predict future goals and implementing secure business processes to protect the information and its benefits are significant, which can offer a competitive …show more content…
Passwords will always have a risk of an attacker guessing the correct the password
(Gollmann, D. 2011). If the password has been thought prudent the risks of an attacker guessing it will drastically decrease (Gollmann, D. 2011). A study from 2010 was published by Ashlee Vance where the most common password was “123456” and in this study Vance mentions “easier a password is for the owner to remember generally means it will be easier for an attacker to guess”. A hard password to remember by the user will mean it will be hard for an attacker to guess it. If the password is hard to remember then the user might need to write it down, which ends with another opportunity for the attacker. This leaves a “conclusion” the better memory a person has the stronger password can they have. The only solution here will be to make precautions to hide the note with the password. It can't possibly be right. The Vance study doesn't mention defences like Dieter, passwords

Related Documents

  • Great Essays

    Strategic planners are what I would call the backbone or the hands and feet in the strategic process. Strategic planners find themselves navigating the, sometimes treacherous, waters between the military profession and that of a bureaucracy. Snider describes them as the two natures of the Army. “Maintaining an appropriate balance between the Army’s two natures is thus ever elusive; at any time, bureaucracy can come predominate over the profession.” Strategic planners are now working at the level where the military objectives are closely tied to the political objectives.…

    • 1244 Words
    • 5 Pages
    Great Essays
  • Great Essays

    Strategic planning creates direction for the agency, its employees, and volunteers (Patti, 2008). Triggers Again, any of the aforementioned internal or external factors may be triggers to engage in strategic planning. Most likely, the organizational climate and employees’ job satisfaction are the top reasons to engage in strategic planning (Claiborne et al., 2013). Strengths, Weaknesses, Opportunities and Threats…

    • 1176 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Goals, objectives, and actions needed to reach these goals are outlined in Strategic Planning…

    • 3960 Words
    • 16 Pages
    Improved Essays
  • Improved Essays

    For all its perks, living in a dorm room is not without risk. In particular, theft is relatively common on college campuses. No matter how good the security measures are, it's nearly impossible to prevent theft when valuable items are left out in the open. Wallets, cellphones, laptops and other electronic devices are especially vulnerable, and without some form of protection they can become an easy target for any visitor or passer-by. The Sentry X075 Security Safe is one possible solution, but is it worth the money?…

    • 552 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    I recently sat down to watch, "Crouching Tiger, Hidden Dragon," and thought it was very interesting. I thought it was cool how the movie focused on the power of a woman and martial arts. I believe the acting and relationship between the characters was showcased well and the talent of the individuals was obvious and entertaining to watch. This movie is all about the search for the magic sword, "Green Destiny," and the drama this stolen object leads to.…

    • 386 Words
    • 2 Pages
    Decent Essays
  • Superior Essays

    Interesting End From the author of the novel “Personal Days”, Ed Park conveys the bizarre ways that a human being can integrate words, letters, and even symbols, in order to maintain or upgrade his privacy and security on his devices and accounts as much as possible with the help of his sixth sense leaving the deciphering particularly impossible for any other human being. The short story comes to a more interesting ending where all those clever tricks and techniques, and the energies used in it (making passwords) come to vain, when it comes to another person robbing him at the automated teller machine on a typical night. Park turns around through the ending of the short story along with some humor, reality, irony and surely, the painful…

    • 1975 Words
    • 8 Pages
    Superior Essays
  • Improved Essays

    Myris Research Papers

    • 760 Words
    • 4 Pages

    2a. The computer based innovation represented by my computational artifact is called Myris. Myris is a biometric security system that scans one’s iris to algorithmically process video images of the user’s eye signing them into secure websites, devices and other personal profiles. The intended purpose of Myris is to eliminate the utilization of standard passwords and to create a secure and foolproof method for accessing personal data. Simply put, “It lets anyone sign into accounts on websites or applications and unlock protected files with a quick glance into the mirror on its face” (http://dickinson.is/designing/eyelock/).…

    • 760 Words
    • 4 Pages
    Improved Essays
  • Improved Essays

    Question #1 1.1) According to Schrems (2014) vulnerability can mean many things, but one definition of vulnerability is when there is the potential for harm to occur without the ability to protect yourself. I would consider this family vulnerable, especially the new mother, Fatima. As she suffers from post traumatic stress disorder, and safety concerns both inside and outside the home. However, other characteristics or needs that would influence participation in the research study are cultural beliefs, such as a paternalistic household (Shami & Sheika, 2000), language barrier, no local family support, and Fatima’s distrust in medical professionals (Kaakinen, 2015).…

    • 571 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Title: Brute-forcing a Password Topic: The experiment will be used to determine the effectivity of several lengths and arrangements of encryptions. Introduction: In this age of revolutionary technologies, our lives are essentially saved to the Internet and upon electronic devices.…

    • 452 Words
    • 2 Pages
    Improved Essays
  • Improved Essays

    Thriller Film Analysis

    • 1196 Words
    • 5 Pages

    PASSWORD is an intriguing contained thriller. The script utilizes some of the techniques that make for a compelling thriller, such as a contained setting, isolation, cut off from communication, and the threat of harm or death. There’s a three-act structure. The opening sets up the idea of a home invasion. However, the opening with the police scanner is distracting and confusing.…

    • 1196 Words
    • 5 Pages
    Improved Essays
  • Superior Essays

    In Ian Urbina’s article, the connection between passwords utilized by people and how they can hold deep meanings delving into a persons’ emotions, thought processes, personal past experiences, and the very essence of who they are, is explored at length. Urbina runs a study to create his thesis that people primarily utilize “Keepsake” passwords through collecting people’s passwords (either current or past) and why those specific passwords were chosen, as a proof that there is a deep connection between the passwords, the maker and the memories these helped to cement for individuals. With the use of a very emotional event, the destruction of the twin towers, Urbina grabs the effectively reader’s attention in explaining the difficulties of Howard…

    • 1617 Words
    • 7 Pages
    Superior Essays
  • Improved Essays

    Security Domains and Strategist Multi-Layered Security Plan An Actionable Plan A sound security plan is the first step towards a multi-layered defense. To develop a plan, the company must assess its most important assets, identify vulnerabilities as well as the infrastructure and technology most appropriate for mitigating risk, then implement a strategy for putting the plan into action. Email is a prime example.…

    • 967 Words
    • 4 Pages
    Improved Essays
  • Great Essays

    Name: Jack Sheehan Student Number: 114564277 Lecturer: Bernadette Power Module Code: EC2017 Date Due: 30th of July 2015 Word Count: 1,040 A business strategy is hugely important in determining the strategic position of a firm.…

    • 1040 Words
    • 5 Pages
    Great Essays
  • Improved Essays

    Strategic planning is a development in a business that is comprised of goal planning that are short and long in term. The formality is incorporated when goal planning is developed with a set mission statement along…

    • 1170 Words
    • 5 Pages
    Improved Essays
  • Great Essays

    “What could it be?” I wondered, my 7 year old hands furiously typing on the keyboard. I had spent the course of several month putting in every password I could think to guess. Why I was doing all of this? To have unlimited access to video games, of course.…

    • 822 Words
    • 4 Pages
    Great Essays