11 Strengths And Weaknesses

Decent Essays
11.1
Weakness
Physical security should concern more on unauthorized access and misuse, besides the integrity and availability of the sites, system and network devices.

Terrorist Threat
11.2.1
Strength
To protect the company from terrorism, advice from the Federal agency is needed, thus 11.2.1 is essential for a company when making policies on terrorist threat.
11.2.2
Weakness
The internal procedures as well as external support and cooperation are both the support resource the Company should take advantage of when facing terrorist threat, since usually one company could not handle the terrorist threat by itself.
11.2.3
Weakness
11.2.3 is just one aspect that should be covered during the education of employees, which should not be kept in
…show more content…
11.3
Add-on
Restrictions on computer labeling should be made to give the ranks of the computer based on the information they store and process, so that important computers can have a higher priority of protection. This is added as 11.3.6.
11.3
Add-on
Restrictions on cleaning should be made, since there are several equipment in the computer room and cleaners may disconnect some equipment by mistake when they are doing cleaning and they might access some information that they should not have. This is added as 11.3.7.
11.3
Add-on
The Fire prevention systems should be non-water, since the equipment in the computer room could not stand with water as well. This is added as 11.3.8.
11.3
Add-on
Policies on test the fire prevention and other protection equipment should be made in periodically to make sure these protections are effective. This is added as 11.3.9.

Cabling
11.4.1
Strength
11.4.1should be kept to protect the physical secure state of the cable
11.4.2
Strength
11.4.2 should be kept to ensure that it is easy to manage the cables
11.4
…show more content…
12.2
Add-on
Security incidents should be defined in this part to make sure that employees have an idea of what incident could be, as a security incident that they should respond and handle. This is added in the revised document as 12.2.1.
12.2
Add-on
A policy in this part should ensure that the operational procedure would be established to guide the employee when they encounter a security incident. This is added in the revised document as 12.2.2.
12.2
Add-on
Employee should study the operational procedure of security incidents respond during their training period and be familiar with it so that they could report the incidents as quickly as possible. This is added in the revised document as 12.2.3.
12.2
Add-on
Company should maintain a database or records of handled security incidents for reference to respond the incidents as quickly as possible. This is added in the revised document as

Related Documents

  • Improved Essays

    Nt1330 Unit 2

    • 369 Words
    • 2 Pages

    The business requirements of the access control must be established and documented. Access control rules and rights for each user or group of users should be clearly stated in a policy statement about access All employees, contractors and third party users of information systems and services should be required to record and report any allegations or findings of security weaknesses in the system or the services. This aims to ensure that information security events and weaknesses detection of information security can be dealt with in a timely and…

    • 369 Words
    • 2 Pages
    Improved Essays
  • Decent Essays

    1. Message from Leadership: Acting Secretary of Army made emphasis on engaged leaders and proactive risk management provide the foundation to support safety and capability wherever the mission dictates. 2. Previous Safety Council Minutes: RTI Elevator…

    • 453 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Ba501 Week 1 Assignment

    • 740 Words
    • 3 Pages

    II Abstract Security is a need that is increasing at a rapid rate especially with a large organization and constant changes seem to be the norm.…

    • 740 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    The case study for unit three describes an incident in which two firefighters were riding on the turntable of their apparatus while going to a preplan. While riding on the turntable the two firefighters had to duck to avoid striking a bridge. An engine company was following behind the ladder truck and witnessed the incident occur and failed to take any actions to prevent or report it. An off-duty firefighter witnessed the incident and reported it to the chief. The department did have SOPs in place requiring all personnel to ride in the cab and to wear seatbelts while an apparatus is in motion.…

    • 630 Words
    • 3 Pages
    Improved Essays
  • Improved Essays

    Nt1310 Unit 9 Final Paper

    • 586 Words
    • 3 Pages

    Opening Statement Written policies provide a means of security within organization. It establishes the regulations that all faculty must adhere to in order to protect important company and client information. The organizational policies should be read by and signed by each employee as a consensus that all regulations will be followed once joining the organization. And, for those who are current employees, to keep abreast of any amendments made to current policy, so that all employees are in compliance. These policies should be kept in an accessible place for everyone to read, so no one will be left out of the loop.…

    • 586 Words
    • 3 Pages
    Improved Essays
  • Superior Essays

    Identify strategies to control and monitor each event to mitigate risk and minimize exposure Identify at least two types of security events and baseline anomalies that might indicate suspicious activity. One type of a security event that might indicate supicious activity is an authentication failures found in audit logs. Audit logs contain a high volume of events so particular attention on which events that should be specifically tracked and managed require consideration. An audit log can identify patterns of activity that can signal a security a potential breach. Whether the attack was successfull or not the audit information should be stored in a central respository for future forensic refernce if ever needed.…

    • 1084 Words
    • 5 Pages
    Superior Essays
  • Improved Essays

    1.1: The role of policies is to set out rules and directives in order to help staff in the setting to achieve their aims and objectives and are primarily there to assist them in making the right decisions. Policies will usually outline the requirements of what is necessary for staff to be aware of and what to abide by. They are also in keeping with the law and are set up in a way for both outside professional agencies and staff within the environment. They may also be there for parents to refer in order to keep themselves aware of the schools beliefs and values. Procedures on the other hand are the way these policies are carried out and they provide the staff with a guide of instructions based on how to go about their duties and be able to overcome certain issues.…

    • 670 Words
    • 3 Pages
    Improved Essays
  • Decent Essays

    It is important that when dealing with equipment that you take the correct action and fix the problem as quickly and safely as possible. If you follow the manufacturer's instructions then this will show you the best way to solve a problem and when the problem should be dealt with by a technician. If you do not follow these then you could cause more harm than good and further damage the equipment. If you have been found to do this then it might invalidate your warranty and you will have to pay for a replacement.…

    • 255 Words
    • 2 Pages
    Decent Essays
  • Improved Essays

    Task A Presentation - Power point uploades individualy Aiv A comparison of the differences in the main health and safety responsibilities of each of the following: a) Social care worker – Responsible for…

    • 1574 Words
    • 7 Pages
    Improved Essays
  • Superior Essays

    In addition to the medical package provided, employees have the option of adding dependents and spouses to their coverage plan. They are also eligible to register for life insurance if required. At this time, retirement packages are not available as our employee base will most likely be targeted towards youths and young adults. Holiday and Vacation pay Holidays and vacation pay will reflect the B.C Ministry of Labor legislation: Employees that have been working for the company for within a year, is entitled obtain vacation time: • Two weeks for the first 5 years of service • 3 weeks for the 6-10 years of service Vacation pay must be applied and submitted to payroll four weeks before the next fiscal pay period. It is the responsibility of staff…

    • 1362 Words
    • 6 Pages
    Superior Essays
  • Improved Essays

    JTF-W Compliance Report

    • 304 Words
    • 2 Pages

    Because of the threat of any incident, whether man made or natural, our organization needs to test its response capabilities to respond to those threats. This discussion based exercise is for JTF-W, and it will address the threat of an incident that affects the employees, essential functions, and mission with or without warning. JTF-W staff will become familiar with continuity policies and procedures. To test JTF-W’s COOP and OEP’s capabilities, functions, and essential mission in response to an incident.…

    • 304 Words
    • 2 Pages
    Improved Essays
  • Great Essays

    Complying With Statutory Regulations And Organisational Safety Requirements Describe the roles and responsibilities of themselves and others under the Health and Safety at Work Act and other current legislation(such as The Management of Health and Safety at Work Regulations, Workplace Health and Safety and Welfare Regulations, Personal Protective Equipment at Work Regulations, Manual Handling Operations Regulations, Provision and Use of Work Equipment Regulations, Display Screen at Work Regulations, Reporting of Injuries, Diseases and Dangerous Occurrences Regulations) The responsibilities I have as an employee means I have a duty to take care of my own health and safety and that of others who may be affected by my actions at work. I must…

    • 2328 Words
    • 10 Pages
    Great Essays
  • Improved Essays

    The movie Precious describes the life of a 16-year-old girl who is illiterate, lives in an abusive home, was raped by her father, and thus has one disabled child and is pregnant with her second. Although Precious was in a horrible situation, with the help of her social worker and her alternative school teacher, Precious escaped from her house and started a new life of her own. As a social work student, I can learn from Precious’s situation by comparing how the social worker in the movie helped Precious versus how I would have, had I been her social worker. By identifying the primary systems that affect Precious, some of her greatest strengths that helped her in overcoming her situation, and four interventions I would have implemented, I can…

    • 1287 Words
    • 6 Pages
    Improved Essays
  • Great Essays

    ication in HSC Task 1 Explore how communication skills are used in health and social care (L01) A1. Explain both incident in terms of humanistic, behaviourist and cognitive theories of communication. Humanistic theory is reflect in each individual as unique and is base on personal central approach which is putting the client at the first place in order to meet their needs effectively. Humanistic does not allow care workers to label or pratronise the client, although humanistic enables to follow the principles of care in order to maintain dignity, respect, promoting choice and independence, respecting privacy and rights.…

    • 1309 Words
    • 6 Pages
    Great Essays
  • Improved Essays

    I define leadership as the ability to influence others to accomplish commonly agreed upon goals. I have held several leadership roles throughout my academic career, but rarely analyzed my strengths and weaknesses. Through Dr. Courtright’s course “Leadership in Organizations,” I became aware of mistakes I have made while leading and may continue building a quality leadership methodology. In this essay, I will identify my key leadership strengths and weaknesses.…

    • 934 Words
    • 4 Pages
    Improved Essays