Premium Essay

Security Goals and Objectives

In:

Submitted By smithb47
Words 790
Pages 4
Goals and Objectives of a Security Organization
SEC 310
17 November 2013

Goals and Objectives of a Security Organization This paper will focus on major topics of a successful security organization. The first topic to be addressed is how each organization, both within industry or within the governmental realm must ascertain their goals and recognize the consequences of failing to achieve their objectives. This paper on will focus on business and in government operations. In either environment, goals and directives are critical to the success of the organization in itself. Second, this paper will touch upon some of the legal aspects which may arise during their course of duty. Third, this paper will seek to identify some influences, whether they be positive or negative that may affect the security organization. Last but certainly not least this paper will ascertain the value that private security management brings to both government and to industry. The goal of any security organization is to protect. This could be the protection of information, the protection of assets as well as the protection of people. A security organization could focus primarily all of these areas. One area, Information security, is particularly difficult. The protection of information technology, its working systems, and the platforms are continuously hindered and easily undermined by flaws in design, weak or non-existent passwords, social engineering and associated risks (Lacey, 2010). A successful security organization will be able to assess and understand the risks and vulnerabilities within an organization in order to adequately to protect sensitive information that, if revealed to competitors or to other countries, could very well compromise the overall integrity of the organization. Security personnel must be trained accordingly, to circumvent the spillage of sensitive

Similar Documents

Premium Essay

Goals and Objectives for a Security Organization

...Goals and Objectives for a Security Organization A company has many different sectors that all together create well maintained organization. Security is just a part of the organization. Some companies use Contract Security, which is where the role of security personnel is contracted out to a third party. Others use Proprietary Security, which is where the role of security personnel is hired from within the company. This would be a better choice for a long term security job. The security personnel are trained within the company and better know how to do the tasks placed at hand. A contracted security company would be a good choice if the organization was set up for such as a short term event, like a carnival or fair, public event involving high priority targets, or even for a large store chain hiring extra security for a parking lot sale. There are companies that use both types of security. The Proprietary security is in place to maintain classified tasks that an outside security personnel would not be privy to, as well instruct the contracted security to which tasks they are needed for. The contracted security is hired to do unclassified task such as walk the grounds, watch the monitors, as well as maintain entry points. The law places stipulations on everything in today’s world. Security management is to ensure the guidelines are followed as part of their job. Say a crime is committed that leaves a victim, criminal, and an offence. Security starts the moment the crime...

Words: 692 - Pages: 3

Premium Essay

Sec/310 Wk 1

...Security Organizations: Goals and Objectives Security companies and organizations develop and establish goals to aid and help them build a profitable and successful long-term business. The security market has a wide variety of activities from physical to information security. Even with the wide variety range, all of the objectives and goals are basically the same from company to company. An important way that a security operation or company establishes goals and objectives is through the relationship that it builds with its' customers. It also meets its goals and standards by the product it puts out to the people who have hired their services. The organizations must also focus on the type of tactics it uses for recruitment, as well as retentions practices to maintain quality employees. A vital element of security operations is confidentiality. Confidentiality is the backbone of security, without it then the operations are not secure. This is crucial for all employees and employers in the field of security due to the nature of the business. There are many legal aspects and issues that deal with organizational security. One of the major legal issues is the fragile information system used within the organizational companies. This could deal with personnel files, company policies, and even financial records dealing with the company or client. There must be preventative measure in place to guarantee the privacy of this information. In regards to this, there must be...

Words: 827 - Pages: 4

Premium Essay

Goals and Objectives

...Goals and Objectives for a Security Organization Security organizations play a major role in the daily functions in both business and government operations. These functions are multi-faceted and must achieve specific goals and objectives. Security organizations that effectively implement goals and objectives into their structure maintain superiority over others. This superiority not only demands for excellence in carrying out their goals and objectives but also tailoring these objectives to their specific clientele. The ability for security organizations to instruct the management team will provide an example for their employees. These implementations will not only create an organization that will maintain and gain more clients but will also maintain employees and their thrive to provide superior service. Security Organization Goals and their Implementation The goals that must be achieved in security organizations are extensive. These goals include: protecting people, developing expertise, implementing cost reduction initiatives, having the ability to provide proactive security, following standard operating procedures, the ability to audit, and adequately training its employees. (Ortmeier, 2000). The ability to protect people is one of a security organization’s most important interests. A person may entail an individual person, a group of individuals or a client. In protecting a person, there are certain goals that a security organization must have. They must know the importance...

Words: 1157 - Pages: 5

Premium Essay

Integrated Business Topics

...Plan Preferred Security is a security company that specializes in full home automation technology. We would like to provide a healthy, customer service atmosphere in the office as well as in the field with our technicians. Our goal is to assure that every customer have a piece of mind while having our products in their home. Business, Products, and Customers: Mission Statement Preferred Security is designated to service a variety of clientele including varying cultures, ethnicities, and religions all with the common goal of achieving a piece of mind while in their home. The main competition for Preferred Security will be other alarm companies such as Adt and Brinks. Customers have the choice between going to a larger alarm company such as Vivint or Adt paying more money for less equipment, with longer contract terms. Preferred Security offers less money for more equipment with shorter contract terms. This is how Preferred Security will create a niche for itself in the business market and become a huge competitor for alarm systems. The company will have a website whereas customers could interact with the products to see how each device functions, and its purpose in your home. Preferred Security mission statement is to provide the highest quality of products and services for customers to help them achieve that piece of mind that they have been searching for within their homes. Organization Vision The vision of Preferred Security is to provide the...

Words: 3987 - Pages: 16

Premium Essay

Cobit 4

...4.1 Excerpt Executive Summary Framework COBIT 4.1 The IT Governance Institute® The IT Governance Institute (ITGITM) (www.itgi.org) was established in 1998 to advance international thinking and standards in directing and controlling an enterprise’s information technology. Effective IT governance helps ensure that IT supports business goals, optimises business investment in IT, and appropriately manages IT-related risks and opportunities. ITGI offers original research, electronic resources and case studies to assist enterprise leaders and boards of directors in their IT governance responsibilities. Disclaimer ITGI (the “Owner”) has designed and created this publication, titled COBIT® 4.1 (the “Work”), primarily as an educational resource for chief information officers (CIOs), senior management, IT management and control professionals. The Owner makes no claim that use of any of the Work will assure a successful outcome. The Work should not be considered inclusive of any proper information, procedures and tests or exclusive of other information, procedures and tests that are reasonably directed to obtaining the same results. In determining the propriety of any specific information, procedure or test, CIOs, senior management, IT management and control professionals should apply their own professional judgement to the specific circumstances presented by the particular systems or IT environment. Disclosure © 1996-2007 IT Governance Institute. All rights reserved. No part of...

Words: 14485 - Pages: 58

Premium Essay

Giac

...simulations of bioterror and nuke attacks? New york and DC 4. What kind of facilities are specified in the physical security perimeter control? All information processing facilities 5. Which of the following best represents the principle of “economy of mechanism?” run only the services and applications necessary to perform the desired function 6. What is the primary goal of establishing incident management responsibilities and procedures? Ensuring an effective response to security investigations. 7. An organization has implemented a Windows environment with Active Directory. They have set up groups with limited access for each department, such as Human Resources and Accounting. Additional access rights needed for certain tasks within each department are assigned to specialized groups, such as Accounting_Payroll and Human Resources_Benefits. User accounts are added to the groups that have the appropriate access rights to meet their assigned responsibilities. What type of access control model is this organization using? Role Based Access Control 8. Why is it important to temper good intentions with knowledge with regard to employee awareness training? Clear and specific policies protect both the organization and the employees. 9. In addition to high-level policy, what is needed for explaining how to meet policy objectives? Specific operating procedures 10. From a security perspective, which of the following should be the most important prerequisite to posting new data on an existing...

Words: 1946 - Pages: 8

Free Essay

Firewalls

...Firewalls are essential security elements in any network. However, as with all aspects of network security, deploying firewalls is a complicated task. Many factors need to be considered, chief among them is cost and function. A dilemma faces all firewall administrators: what is the proper balance between firewall security and network usability. In other works, how can one make the network secure as possible with a firewall while maintaining ease of use and maintaining appropriate speed of the connections for the users? There is no one or easy answer to this question. Each network and organization is unique. I believe that fact is the key to a good answer. Since each organization has unique objectives and goals the firewall must protect those security elements that achieve those objectives and goals. To some extent, firewalls must be customized to meet the needs of the organization. I have read about the trade-offs of an out-of-the-box firewall versus a firewall that is built from scratch to meet the requirements of a particular network’s security. A do-it-yourself firewall has the advantage of being highly customized to the needs of the organization and an out-of-the-box firewall generally is more expensive. Does that make a do-it-yourself firewall the better choice? I think not. It seems to me that a pre-built firewall has one overriding advantage when compared to a do-it-yourself unit: documentation and support. What if the builder of that do-it-yourself firewall...

Words: 534 - Pages: 3

Premium Essay

America Against Threats

...Protecting the United States of America against threats is our government’s goal and duty. In order to protect our homeland there are a set National Security Goals which objective is not only to protect the United States from the enemies but to maintain a strong image of our country to the rest of the world. According to the Basic Combat Correspondent Course there many National security goals among which are the enhancement of security and promotion of democracy. With the objective of enhancing the country's protection many agencies like U.S Customs and Border Protection heightening their security even more everyday so terrorists and illegal weapons will not get to American soil. All security agencies have a common goal which is to detect and...

Words: 441 - Pages: 2

Premium Essay

Lala

...050- to 1,400-word paper explaining the role of a security manager within different organizations, including their role in achieving the larger organization’s goals. Describe how the security manager’s role is crucial to protecting the security needs of an organization. Identify key responsibilities and why they are vital. Use at least three references from the reading assignment, Internet articles, Electronic Reserve Readings articles, or industry journal articles to support your paper. Cite your sources. Explain 1. the role of a security manager 2. managers in different organizations 3. How security managers role is crucial to protect the organization 4. Identify key responsibilities 5. Why are their responsibilities vital? The role of a security manager within different organizations may differ in a few aspects, but all in all, that person’s role is extremely crucial and vital for the organization to maintain its objective and reach its goals. The end point of a security manager’s goal is ultimately to protect the security needs of the organization. We may see this in the role of the security manager of TSA (Transportation Safety Administration) as well as in the role of a private security firm such as Gaven de Becker & Associates. While the security manager of TSA has the responsibility of assuring the protection of the security of traveling citizens at airport terminals, the responsibility of a security manager at Gaven de Becker will be focused on a...

Words: 272 - Pages: 2

Free Essay

Frienship Letter

...What goals and Objectives does the company have in general in advertisement of Microsoft In the study of Hitesh () In Microsoft they have a strategies according to their goals and objectives, that help them in their advertisement of their products. Microsoft has an strategies, and the first is that Microsoft did is the network marketing their objectives is each of their products is compatible each other so that is easy to use. After this they came up to the idea to have an regular product launches because we know that Microsoft is use worldwide so since they have an many competitors launching product helps them to maintain their sales in the market and help them to the expansion of the Microsoft. The Microsoft Company wants their costumer to have a strong security because if you look at their old products you can see they have less security. Because of this they learn to improve this and adapt the environment so that they can provide the best security that the people want to get. The Microsoft focused on their customer because their goals is to satisfy the wants and needs of their customers the reason why the Microsoft focused on this because lots of customers have a problems in crashing their computers without any reason but because of this the consumer may able to fix it one of the major goals of the Microsoft is to make a product that can easy to used by oldest to youngest like their mobile phones, microsoftOS these are the product of Microsoft that easy to use and...

Words: 403 - Pages: 2

Premium Essay

The Goals and Objectives of Tsc

...Introduction 3 The Goals and objectives of TSC 4 History of TSC 4 Functional areas 4 Vision, mission and core values 5 Goals and objectives 5 Oman vision, goals and objectives 7 Oman 2015 objectives 9 Conclusion 12 Middle Management 13 Definition 13 Nature of management: 13 Levels of management: 13 The role of middle management in TSC (Commercial unit) 16 Recommendation 17 Communication 18 The elements of communication include 20 Communication skills 20 Communication and the impact 21 Interpersonal skills 21 Communication Barriers 26 Conclusion 30 The effect of Knowledge, Skills and Behavior on the managerial performance 31 Manager self assessment ………………………………………………………………………………………………………………..34 Personal development plan …………………………………………………………………………………………………………….39 References 40 “The future belongs to those who see possibilities before they become obvious” John Scully Introduction In our societies, towns, countries a massive number of organizations exist. But do we all know the purpose of their existence? Do we know why they are all out there? If we look closer inside some of these organizations we might even see that some of their members do not know the reason for their existence. Clearly setting a vision and mission statements clarify and communicate the purpose and the reason for that existence. A vision is the ideal picture an organization sees for its future and from that vision strategic plans, goals and objectives can be generated. ...

Words: 1526 - Pages: 7

Premium Essay

Jjjjjj

...Introduction to the Management of Information Security Chapter Overview The opening chapter establishes the foundation for understanding the field of Information Security. This is accomplished by explaining the importance of information technology and defining who is responsible for protecting an organization’s information assets. In this chapter the student will come to know and understand the definition and key characteristics of information security as well as the come to recognize the characteristics that differentiate information security management from general management. Chapter Objectives When you complete this chapter, you will be able to: • Recognize the importance of information technology and understand who is responsible for protecting an organization’s information assets • Know and understand the definition and key characteristics of information security • Know and understand the definition and key characteristics of leadership and management • Recognize the characteristics that differentiate information security management from general management INTRODUCTION Information technology is the vehicle that stores and transports information—a company’s most valuable resource—from one business unit to another. But what happens if the vehicle breaks down, even for a little while? As businesses have become more fluid, the concept of computer security has been replaced by the concept of information security. Because this new concept covers a...

Words: 2580 - Pages: 11

Premium Essay

Maintaining Information Systems Security

...Maintaining Information Systems Security Akilah S. Huggins University Of Phoenix CMGT/400 August 11, 2014 Maintaining Information Systems Security Introduction With the growing development of information systems and networks, security is a main concern of organizations today. The fundamental objectives of information systems security are privacy, integrity, and accessibility. The foundation of organization's security lies in planning, creating and actualizing proper information systems' frameworks' security strategy that adjusts security objectives with the organization's requirements. In this paper the objective is to describe the importance of policies and standards for maintaining information systems security. Specifically, the paper include the discussion of the role employees—and others working for the organization to maintain the information systems security. Also the position paper aim to examine the different levels of security and how an organization can provide the proper level of effort to meet each information security need and how this relates to what is in an organization’s information security policy. Thesis Statement The aim and objective of the underlying paper is to analyze and evaluate the phenomena of maintaining information system security. Importance of Policies and Standards for Maintaining Information Systems Security. Information system security policies primarily address threats. The...

Words: 1235 - Pages: 5

Premium Essay

Hr Assigment

...as your own. If plagiarism is detected, Zero (0) mark would be given. ASSIGNMENT QUESTION PURPOSE The purpose of this assignment is to develop students’ understanding on Human Resource Planning at organization and the ways to create and implement it. REQUIREMENT Assume yourself as a HR Manager of one of the newly formed organization at your place. You are required to create a HR planning for the particular organization based on the HR functions. Following are the guidelines Marking Scheme & Guidelines COMPONENTS | MARKS | 1. Introduction- Your understanding about HR planning | | 2. Company Background * Industry background * Reasons for choosing the organization / industry * HR department objectives and strategies | | 3. Environmental trend * Demographics characteristics * Technological aspect * Legal requirements | | 4. Recruitment * Recruitment process * Recruitment methods * Effectiveness of recruitment | | 5. Selection * Steps in selection * Effectiveness of selection process | | 6....

Words: 4835 - Pages: 20

Premium Essay

Sec 310 Security Manager Role

...Security Manger’s Role 2/8/14 SEC 310 Just as any other role in an organization, you need to set yourself goals and standards for yourself and your company. Without any of these, nothing can get accomplished. If you do not give yourself a bar to reach for, you are basically sitting in a stagnant place. A security manager, just like any other management position has objectives they must complete. Just as the title says, their main goal is to identify what the assets of the organization are and to form and develop a plan that will protect what is most valuable to their organization. Without any of this, their position would be pointless. This position can cover organizations of all sizes. From a small mom and pop organization to a large corporate worldwide organization, they still have the same goal in mind, and that is to keep the organizations assets protected. As a security manager there are levels below them that can help to address the issues such as loss prevention officers and a security risk department. The first goal for any organizations security manager would be to establish an organizational structure. Without the implementation of this then there would be no order of execution for getting tasks done (Ortmeier, P, 2013). Organizing things from the largest task to the smallest task would be a good start. Some of these tasks are going to be repetitive at times, and grouping some of the similar tasks together would be helpful to get things done...

Words: 1159 - Pages: 5