1 / 10

Jodi Bouvin, Ben Bridges, Thomas Schaefer

Organizational Security Systems Journal of Information Assurance, Security, and Protection, December 2018. Jodi Bouvin, Ben Bridges, Thomas Schaefer. Overview. - Introduction / Overview - Traditional uses of Systems Security - Best Practices - Available Guidance and Resources

darrickm
Télécharger la présentation

Jodi Bouvin, Ben Bridges, Thomas Schaefer

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Organizational Security SystemsJournal of Information Assurance, Security, and Protection, December 2018 Jodi Bouvin, Ben Bridges, Thomas Schaefer

  2. Overview • - Introduction / Overview • - Traditional uses of Systems Security • - Best Practices • - Available Guidance and Resources • - Recommendations • - Conclusion / Recap

  3. Traditional and Worthwhile Considerations - Avoid placing files on an organizational system that are likely to be of interest to potential hackers. Items to protect might include trade secrets, folders of personnel files, and personnel information. - Ensure to remove vulnerabilities that potential hackers may utilize to gain access to the organization. A traditional good practice is to review updates from vendors, bulletins, news group updates, and important mailing list notes.

  4. Best Practices • - Consider avoiding nests or areas that intruders or hackers can use to establish a point of operations to attack your system. • - Intruders to your system may utilize another organizational system to attack your company and/or the next firm. • - Removing potential nesting areas will assist with maintaining healthy business operations.

  5. Best Practices (Continued) • Additional best practices are to establish potential locations that can guard systems and even assist with eliminating nesting activities of hackers before an organizational system, is compromised. • Those who manage security system activity within organizations can also utilize monitoring and reporting systems to keep a watchful eye on potential intruders to a corporation.

  6. Available Guidance and Resources - One potential resource is account reviews, possibly on a quarterly basis, and proven systems security practices. - An example of effective security system protocol is to maintain effective password management. - Implementing robust training systems can assist with promoting the importance of password utilization and choosing effective password choices when making changes as a program begins and as updates are required.

  7. Available Guidance and Resources (Continued) - Training programs can be initiated to share systems security best practices with all organizational stakeholders. - Training programs can occur during the initial hiring process of employees; during weekly, monthly, and quarterly updates to systems; and via annual reviews of systems and personnel. - Utilizing a robust systems security approach to organizational planning and operations can serve as a resource for managers. Business leaders can also build on established protocols; such as, passwords to develop lasting security measures.

  8. Recommendations • Avoid placing files on an organizational system that are likely to be of interest to potential hackers. Items to protect might include trade secrets, folders of personnel files, and personnel information. • Intruders to your system will often use a previous business environment to attack your organization and/or the next firm. • Removing potential nesting areas will assist with maintaining healthy business operations.

  9. Conclusion / Recap • - Introduction / Overview • - Traditional uses of Systems Security • - Best Practices • - Available Guidance and Resources • - Recommendations • - Conclusion / Recap

  10. Contacts • - Jodi Bouvin, jodi.bouvin@mycampus.apus.edu • - Ben Bridges, benjaminbridges.wayne@gmail.com • - Dr. Thomas Schaefer, TSchaefer@apus.edu

More Related