You are on page 1of 4

1

Practical Connection Assignment

Student’s Name

Professor’s Name

Institutional Affiliations

Course

Due Date
2

Practical Connection Assignment

It would help if you were acquainted with our organization's security rules as an

information technology specialist. Employees and other organization people may contribute

to security events by their actions or inactions. Employees and other members of the

organization's staff, for example, may offer information that might be utilized in a social

engineering attack, fail to report suspicious activity, improperly access sensitive data

unrelated to the user's purpose, and so on. Consequently, organizations must develop a

security awareness program to ensure that workers understand the important nature of

protecting sensitive data, the steps they should take to secure data management, and the

dangers associated with wrong data handling. When it comes to the functioning of a business,

workers must be aware of the organizational and personal implications of misusing sensitive

information and the threats they face.

My current job title and responsibilities are system administrator, which means I'm in

charge of the security and upkeep of several systems throughout a company. As federal

workers, we must follow a slew of classified healthcare rules and procedures as part of our

job responsibilities. It is critical for my future professional advancement to clearly understand

the critical aspect of our organization's security policy. After completing this course, I will

have a better understanding of how to comply with security regulations. As a consequence of

the Advanced Computer Security program, we will better grasp how security threats are

created, establishing more effective strategies and security plans to protect our firm. The

abilities I learned in this course will help me in various situations, such as spotting threats,

managing risks, and rapidly recovering from disruptive occurrences in my future workplace,

among other things.

The company's security policy governs who has access to systems and data. To

safeguard the system and the data, it contains, a set of rules, regulations, and processes has
3

been developed. Depending on who you speak with, it may be referred to as an information

security policy or an information assurance policy. Excellent standards safeguard information

and technology and the privacy of individual employees and the corporation as a whole

(Wang, & Yang, 2017). It also serves as a conspicuous reminder to the rest of the world of

the organization's commitment to high levels of safety and security. In an ideal world,

computer-based systems would be safeguarded by a comprehensive set of security processes

that assured the confidentiality, integrity, and availability of the data they held. The ability of

a program to withstand a wide variety of assaults is known as the weak-link phenomenon,

and it is used to secure it. We cannot afford to neglect the confidentiality, integrity, or

availability of our data to meet the goals of our security policy.

Maintaining secrecy, for example, is critical to avoid password hacking. Passwords

are critical to a system's integrity because they control access and serve as a basis for

individual accountability. Confidentiality controls, a critical component of the system's

integrity, must be impenetrable to manipulation. This is a major concern since the system's

availability is jeopardized if administrators and maintenance personnel cannot handle

problems as quickly as feasible (Daimi et al., 2018). There are a variety of approaches that

may be utilized to establish and implement a security program, and they don't all have to be

one-size-fits-all. Because there is no other viable option and the crucial management control

concept of dividing jobs is necessary, divide and conquer is favored.


4

References

Daimi, K., Francia, G., Ertaul, L., Encinas, L. H., & El-sheikh, E. (Eds.). (2018). Computer

and network security essentials. Springer. https://link.springer.com/978-3-319-58424-

Wang, Y., & Yang, J. (2017, March). Ethical hacking and network defense: choose your best

network vulnerability scanning tool. In 2017 31st International Conference on

Advanced Information Networking and Applications Workshops (WAINA) (pp. 110-

113). IEEE. https://ieeexplore.ieee.org/abstract/document/7929663/

You might also like