{"id":30518,"date":"2022-01-30T07:23:00","date_gmt":"2022-01-30T07:23:00","guid":{"rendered":"https:\/\/nursingstudybay.com\/?p=30518"},"modified":"2022-08-11T07:36:47","modified_gmt":"2022-08-11T07:36:47","slug":"approaches-to-security-implementation","status":"publish","type":"post","link":"https:\/\/www.essaybishops.com\/essays\/approaches-to-security-implementation\/","title":{"rendered":"Approaches to Security Implementation"},"content":{"rendered":"<p>Approaches to Security Implementation<br \/>\nEffective system security is dependent on developing a workplace environment and organizational structure where management comprehends and fully bolsters security efforts, and users are motivated to exercise caution (Sennewald, 2011). As a security manager, I lead this effort. Therefore, in formulating my initial 2 weeks on the job to be an effective manager, I need to begin by nurturing a security-conscious organizational culture. This is where I put emphasis on the need for employees to understand the importance of security and take all the necessary measures as described in the security policy to ensure that the company systems are safe. I will also need to develop tangible processes to support security, and manage the myriad of pieces making up the company\u2019s system. I will make sure that administration and personnel is aware of their security roles, support efforts of security, and are ready to tolerate the minor inconveniences that are unavoidably a part of system change and improvement. After all, if staff circumvent procedures of security (for example, share accounts, disable virus-checking software), they put the whole system at risk. To be an effective team member, I will be ready to listen and support the ideas of my colleagues whenever necessary. I will also make it a habit to communicate with them regularly and in a clear manner. This will serve to ensure that everyone knows what they are supposed to do to achieve the company\u2019s security goals. The critical priorities that I would follow include:<br \/>\n\u2022\tEnsure employees are well trained to identify and respond to threats-vital to ensure attacks to systems are kept at bay.<br \/>\n\u2022\tMonitor user activity to assess the implementation of security-vital to ensure security policy is adhered to.<br \/>\n\u2022\tCommunicate the importance of protecting the company\u2019s system-will motivate employees to play an active role in security.<br \/>\n\u2022\tPassword management policies-to ensure employees know and adhere to them as weak passwords are vulnerable to attacks.<br \/>\n\u2022\tProvide for suitable staff security training-to ensure staff is equipped to deal with security challenges.<\/p>\n<p>Reference<br \/>\nSennewald, C. A. (2011). Effective security management. Elsevier.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Approaches to Security Implementation Effective system security is dependent on developing a workplace environment and organizational structure where management comprehends and fully bolsters security efforts, and users are motivated to\u2026<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1387],"tags":[1612],"class_list":["post-30518","post","type-post","status-publish","format-standard","hentry","category-dissertation-writing-service","tag-approaches-to-security-implementation"],"_links":{"self":[{"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/posts\/30518","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/comments?post=30518"}],"version-history":[{"count":1,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/posts\/30518\/revisions"}],"predecessor-version":[{"id":30529,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/posts\/30518\/revisions\/30529"}],"wp:attachment":[{"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/media?parent=30518"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/categories?post=30518"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.essaybishops.com\/essays\/wp-json\/wp\/v2\/tags?post=30518"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}