Tuesday, March 12, 2019

Security Monitoring

Security monitor Amy Smart CMGT/442 University of Phoenix Online Instructor James Summerlin April 15,2013 Security Monitoring In this paper we will be discussing security monitor techniques that give the sack and should be subprogramd within an government to service of process put together an unscathed action plan when there is an risk identified. For whatsoever business or organization to en certainly that they be conducting quality business to their customers as sound as achieving their business goals should consider risk management as an large part of their organization. Security Monitoring ProcessThe organization IT department and e- commerce applications be the ones that conduct security monitoring and measuring. Security monitoring is very classic, beca persona it is the make of preventing attacks and responding to threats that could happen in the future. An organizations can prevent small(a) risk from routine into a bigger and more expensive problem by pickings pre ventative steps. The IT department should be monitoring the schema at all times and it must be implemented twain externally and internally. still the first step each organization should take when starting the monitoring system is to first discuss what a potential risk is.For an organization to truly study an secure system they must determine an enumerate of risk. Businesses and organizations can use security monitoring to ensure some(prenominal) ace and confidentiality for sensitive information. As well as holding IT administrators responsible for retention their organizations sensitive and financial assets honorable and secure from unwanted eyes. Internal IT and secure Monitoring Processes The security monitoring activities that should be conducted in an organization with both internal IT payroll, human resources, inventory, general ledger, inventory monitoring.However these internal structures constantly commence and increase revenue and the possible risks are withal a lways exploitation and increasing. So for an organization to make sure that there information is safe and secure they will have to make sure that they have their meshwork secure. There are an number of tools an business or organization could use to help limit the network secure, but we will only be discussing a few. The first step would be to create an good an beardown(prenominal) password. The pros on having an password would be that it helps to protect unwanted users on their computers.However employees could eat up the password so the organization would have to decide if that was an problem whence they may want to have an only IT members knowing the password. therefore we would have to decide which network firewall would work best for their business. The network firewall is very important to have, because it protects the network from unwanted users and can be used from small lodge networks to large corporate system. Another great tool to use to obligate the organization n etwork secure internet filtering software and monitoring tools, which would be used to protect their employers from inappropriate usage from their employees.Lastly vulnerability assessment and brainstorm testing is an very great tool to use, because any company that does any business online should and needs to perform an regular vulnerability assessment on their network. The next step in keeping all the organization personal and financial information secure would be to set in attitude an antivirus protection. Antivirus is important to have because it will protect the computer and the information workshop in it safe from virus that can wreak havoc on your computer and the information store upon it as well.However antivirus cannot do it alone so by also making sure the organization computer are always up-to- succession and running properly is another step impendent to being fully protected. Some examples of Antivirus software would be Norton, AVG, Shield Deluxe, or Panda Antiviru s Pro, and all are very good antivirus software to use to keep their computers safe and secure. Data security is the next step in which an organization needs to take to make sure that their whole system is safe and secure from the inside out. Establishing an strong password is the first train of defense to keeping entropy secure.The next would be to make sure that there is an strong firewall, by having firewalls in place will help to keep the network properly protected from viruses and hackers. Data security is also achieved by having antivirus and anti- malware which is an systems last line of defense if everything else has failed. Having an organizations computer systems up to date and running properly is another great step to keeping their data safe, because if their computer software is not up to date then it wont be able to provide the upmost protection towards their personal data.Performing backups to the external stiff drive is the best way to insure that all the data is s tored safely. Then lastly is to have their IT department monitor diligently so that they can look for specific information coming out of their network. In remnant we have discussed the security monitoring activities that should be conducted in an organization with both internal IT payroll, human resources, inventory, general ledger, inventory monitoring. As well as how important each one of these activities are and how they help to monitor and keep their system safe and secure from unwanted eyes.

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.