Welcome to Scribd, the world's digital library. Read, publish, and share books and documents. See more
Download
Standard view
Full view
of .
Look up keyword
Like this
4Activity
0 of .
Results for:
No results containing your search query
P. 1
Security Management - S3CC

Security Management - S3CC

Ratings: (0)|Views: 226|Likes:
Published by Steve Strickland
Paper discussing security manage practices, controls, and methods that could be used at high level in an organization.
Paper discussing security manage practices, controls, and methods that could be used at high level in an organization.

More info:

Published by: Steve Strickland on May 25, 2011
Copyright:Attribution Non-commercial

Availability:

Read on Scribd mobile: iPhone, iPad and Android.
download as PDF, TXT or read online from Scribd
See more
See less

09/28/2013

pdf

text

original

 
 
1
 
Security ManagementSecurity ManagementSteve StricklandSteve Strickland Consultingwww.s3cc.net 
Steve Strickland Consulting (S3CC IT Consulting) specializes in outsourced IT/ComputerConsulting/Services. We specialize in the areas of managed IT & Computer Services (including repair),Network Security, Data Backup/Protection & Disaster Recovery, Document Management Solutions,Microsoft SharePoint Consulting, Hardware/Software sales, Computer Asset Management, PaperlessOffice Solutions, and Electronic Medical Records (EMR) Consulting. S3CC is a Certified Veteran-OwnedBusiness and Certified Small Business.All company names and dollar figures in this paper are fictitious and only used to illustrate theconcepts of the actual paper. This paper was originally created for a school project and could be useda template for others or reading/education.
 
 
2
 
Security Management
T
ABLE OF
C
ONTENTS
 
EXECUTIVE SUMMARY ............................................................................................................. 4O
RGANIZATION
D
ESCRIPTION
........................................................................................................ 4R
ISK
A
SSESSMENT
........................................................................................................................ 7
Asset Valuation ..................................................................................................................... 8 
 Intellectual Property (patents and copyrights) .................................................................. 8Trade Secrets ................................................................................................................. 10Accounts Receivable ...................................................................................................... 11
Risk Assessment Method ................................................................................................... 13 
 
Risk Management Strategies ............................................................................................. 14 
 
Assignment of Risks ........................................................................................................... 17 
 
Countermeasures ............................................................................................................... 18 
 
Incident handling policies ................................................................................................... 19 
 B
USINESS
C
ONTINUITY
................................................................................................................ 20
Change Controls and Disaster Recovery .......................................................................... 20 
 
Tools of the Trade .............................................................................................................. 21
 
Disaster Recovery Options ................................................................................................ 22 
 
Roles and Responsibilities ................................................................................................. 23 
 
Termination Procedures ..................................................................................................... 23 
 
Physical Security ................................................................................................................ 24 
 
Risk Management............................................................................................................... 26 
 L
EGAL AND
E
THICAL
C
ONSIDERATIONS
........................................................................................ 26
Current Legal and Regulatory Issues ................................................................................ 28 
 
 
 
3
 
Security Management
Impact of Security Controls ................................................................................................ 28 
 
Strategies............................................................................................................................ 29 
 
The Law and Ethics ............................................................................................................ 30 
 M
AINTENANCE
P
LAN
P
OLICIES
..................................................................................................... 30
Procedures ......................................................................................................................... 31
 
Standards and Guidelines .................................................................................................. 32 
 
Change Management ......................................................................................................... 32 
 
Hardware and Software Lifecycles .................................................................................... 33 
 
Awareness Training ............................................................................................................ 33 
 
Maintenance Implementation Plan ..................................................................................... 34 
 
Maintenance Plans ............................................................................................................. 35 
 C
ONCLUSION
............................................................................................................................... 35R
EFERENCES
.............................................................................................................................. 37T
ABLE OF
F
IGURES
...................................................................................................................... 38

Activity (4)

You've already reviewed this. Edit your review.
1 thousand reads
1 hundred reads
Ellizabeth Smith liked this
hassanard liked this

You're Reading a Free Preview

Download
scribd
/*********** DO NOT ALTER ANYTHING BELOW THIS LINE ! ************/ var s_code=s.t();if(s_code)document.write(s_code)//-->