SlideShare a Scribd company logo
Managing Vulnerability
SEC400 Managing Vulnerability
Name
Class
Date
Professor
Managing Vulnerability
When a natural or manmade disaster or a technological
threats occurs the effectiveness of the response will be crucial.
While the disaster itself cannot be prepared for security
personnel can have an effective response in place in the event a
disaster or a technological threat was to occur. In a disaster or
during technological threats security personnel fulfill the same
role as when things are safe and secure. There role is to secure
the person and property involved in the disaster or technological
threat and to prevent loss. In order for security personnel to be
effective in the event of a disaster there needs to be a disaster
preparedness plan in place that includes preparing for
technological threats as well as a disaster response plan in
place.
The role of security personnel at a facility is to ensure the
perimeter is properly secured and that there is no internal loss
as well as in the new information security personnel are
responsible for ensuring there are no security breaches to
private sensitive data. Security personnel are responsible for
patrolling the facility and protecting the people and the property
but they are also responsible for ensuring vulnerabilities are
minimized and in the event of a disaster or technological threat
there is a proper response. In order to be effectively prepared in
the event of a disaster or technological attack the security staff
must be proactive in reducing potential vulnerabilities and
managing the response.
The security personnel at a facility also have a responsibility
to respond to any disasters that occur. Security personnel are
responsible for securing the facility and guarding their property
as well as providing assistance to staff members in need and
support the responding agencies in any investigations. The
security personnel will be responsible for implementing any
emergency response plan and fulfilling the roles they have been
assigned in the event of a disaster as well as providing the
necessary assistance to responding agencies such as the police,
fire, and medical personnel.
Disaster management is the process of addressing an event
that has the potential to seriously disrupt the social fabric of the
community and create security threats (Moon, 2011). The
natural disaster can involve a hurricane, earthquake, flooding,
tornadoes, tsunamis, and wildfires. The manmade disaster can
evolve an event such as a nuclear accident or an act of violence
by a terrorist group while the technological threat involves
intrusion into the private information system of the government
or an organization which not only threatens the organization but
its employees and its customers. In order to manage the
vulnerabilities associated with these events the necessary plans
must be in place.
The disaster preparedness plan assists in creating a plan to
prevent the disaster or to limits impact while technological
threat preparedness’ plan ensure the organization or government
infrastructure is not vulnerable to these threats. The first step
for the organization, when creating the disaster preparedness
plan, is to appoint an Emergency Management Coordinator. The
Emergency Management Coordinator will lead the disaster
preparedness plan. After appointing a team to assist in the
emergency preparedness’ efforts the Emergency Management
Coordinator will conduct an assessment of the potential security
vulnerabilities faced by the facility in the event of a disaster to
ensure these vulnerabilities can be minimized. Once potential
vulnerabilities have been identified in the assessment the plan
will include intimating the necessary improvements to reduce
the security threat in the event of a disaster.
The emergency preparedness’ plan will include assigning the
necessary security personnel their role in the event of a disaster
and implementing the necessary drills and training to ensure
security personnel will be effective in their roles in the event of
a disaster. For example security personnel could be assignment
to automatically secure the perimeter while other security staff
members might be assigned to guarding sensitive information.
The emergency preparedness’ plan will also outline the
available resources and response agencies in the community that
must be contacted for assistance in the event of a disaster.
Due to the new information age and the sensitive
information that can be contained at a facility it is also essential
that the facility have a technological threat response plan in
order to protect sensitive data. The best way to protect sensitive
data from threats is to develop a data security plan which
includes first conducting an assessment of the information data
security needs. Once the security needs have been identified a
data security plan can be developed to ensure outside threats
can be detected and thwarted.
The data security plan will include appointing only
authorized personnel to access private company information and
taking the necessary steps to protect the private data including
the use of firewalls, implement network security with access
controls, and encrypting sensitive data. Communication between
remote users puts data at risk of being seen by outsiders
(Norman, 2010). It is also essential that the facility has the
necessary passwords and encryption software to prevent outside
threats. Other countermeasures that will need to be put in place
to prevent security threats are first ensuring that employees
have been informed of company security polices and are in
compliance with these policies.
When there is an emergency preparedness plan in place as
well as a disaster response plan in place the facility can be
better prepared in the event of a natural or manmade disaster or
a technological threat. The key to dealing with intrusion threat
actors is to detect them as early as possible and intercept them
with a superior response before they can make their way to their
intended target (Norman, 2010). The cost benefit of having
these responses in place is unlimited. If the facility were to be
destroyed by a natural disaster the financial burden could be in
the hundreds of thousands but if some of the damage can be
prevented due to emergency preparedness’ measures and an
effective sensitive data security plan the amount of the cost
incurred by the disaster could be limited.
The security countermeasures will ensure the facility is not
vulnerable to cyber attacks that can result in the loss of
sensitive information that includes the financial information of
the company and private information of customer and
employees. If the security at the facility is not able to ensure
these threats are prevented then the loss could be huge. When
information systems are intruded upon it could involve a
malicious attack that takes the facility out of operation or the
theft of sensitive information that could result in damage to the
company’s reputation. In the Information age it is essential that
security staff is capable of preventing technological attacks or
threats.
The securities counter measures that will be implemented in
the event of a natural disaster will ensure that the impact of the
disaster is limited in order to reduce the costs associated with
the event and will ensure that the appropriate response is in
place to minimize the damage to the facility and its personnel.
In the event of a disaster the facility and its property will be
vulnerable to loss or damage that can result in a huge expense
for the facility. The cost of implementing all of the necessary
security measures to reduce vulnerabilities in the event of a
disaster or technological threat will be less than $10,000 dollars
while the cost for not being adequately prepared are countless.
Disaster risk management is essential to the effective
response in any disaster. Sensible and cost effective risk
reduction programs, such as early warning systems,
strengthened building codes, and emergency preparedness
strategies, are the best defense against future catastrophes
(Moon, 2011). Since the attacks on 9/11 and the destruction
associated with hurricane Katrina disaster risk management has
become a common and necessary aspect for all organizations.
Recovery and operational backup plans will be developed in
the emergency response plan and will include storing sensitive
data in a separate secure location and storing physical assets in
a fire proof safe. This will ensure the company’s operational
systems are secure in the event of a disaster or an attack. In the
event the facility is physically damage the security personnel
will rely on the disaster response plan and wait for assistance
for local response agencies. The role of security will be to
secure the facility until help can arrive and provide support. The
facility will need to have notification strategies in place to alert
security staff of the disaster or the attack and establish a
communication plan for the customer.
It can be difficult to evaluate the effectiveness of the
security program for the disaster or the technological attack but
in order to be able to determine the program’s success there
must be an evaluation measure. In the natural or manmade
disaster employee will be subject to random, unannounced
security drills to ensure they are aware of the necessary
response required in the event this situation were to occur.
Information systems will be tested through the use of highly
skilled IT personal continuously monitoring and assessing the
effectiveness of the security measures.
References
McMillan, C. (2008). Natural Disasters: Prepare, Mitigate, And
Manage. Retrieved September 30,
2012 from
http://www.csa.com/discoveryguides/archives/ndht.php
Moon, B. (2011). What is Disaster Risk Reduction? Retrieved
September 30, 2012 from
http://www.unisdr.org/who-we-are/what-is-drr
Norman, T. (2010). Physical Security Risk and
Countermeasures: Effectiveness Metrics.
Retrieved September 30, 2012 from
http://www.csoonline.com/article/540063/physical-security-
risk-and-countermeasures
Managing Vulnerability     SEC400 Managing.docx

More Related Content

Similar to Managing Vulnerability SEC400 Managing.docx

DISASTER MITIGATION AND MANAGEMENT INTRODUCTION
DISASTER MITIGATION AND MANAGEMENT INTRODUCTIONDISASTER MITIGATION AND MANAGEMENT INTRODUCTION
DISASTER MITIGATION AND MANAGEMENT INTRODUCTION
Kavya Kusam
 
The Role and Evolution of Homeland Security | GQ Research
The Role and Evolution of Homeland Security | GQ ResearchThe Role and Evolution of Homeland Security | GQ Research
The Role and Evolution of Homeland Security | GQ Research
GQ Research
 
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docxCHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
christinemaritza
 
Crisis Management Enhanced by Advanced Software
Crisis Management Enhanced by Advanced SoftwareCrisis Management Enhanced by Advanced Software
Crisis Management Enhanced by Advanced Software
I-Pix Technologies
 
A Guide for Businesses.pdf
A Guide for Businesses.pdfA Guide for Businesses.pdf
A Guide for Businesses.pdf
DaviesParker
 
effective disaster management by efficient usage of resources
effective disaster management by efficient usage of resourceseffective disaster management by efficient usage of resources
effective disaster management by efficient usage of resources
INFOGAIN PUBLICATION
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
Mark John Lado, MIT
 
AssignmentWhen a traffic camera is installed in a designate.docx
AssignmentWhen a traffic camera is installed in a designate.docxAssignmentWhen a traffic camera is installed in a designate.docx
AssignmentWhen a traffic camera is installed in a designate.docx
normanibarber20063
 
Unified emergency management paper
Unified emergency management paperUnified emergency management paper
Unified emergency management paper
FPC Risk
 
Navigating the Landscape of Industries security in a Rapidly Changing World.pdf
Navigating the Landscape of Industries security in a Rapidly Changing World.pdfNavigating the Landscape of Industries security in a Rapidly Changing World.pdf
Navigating the Landscape of Industries security in a Rapidly Changing World.pdf
Guardian Eagle Security Inc
 
Security Precautions for the Hospitality Industry
Security Precautions for the Hospitality IndustrySecurity Precautions for the Hospitality Industry
Security Precautions for the Hospitality IndustryLawrence Nagazina
 
Preparing for future attacks. Solution Brief: Implementing the right securit...
Preparing for future attacks.  Solution Brief: Implementing the right securit...Preparing for future attacks.  Solution Brief: Implementing the right securit...
Preparing for future attacks. Solution Brief: Implementing the right securit...
Symantec
 
Automated Incident Handling Using SIM
Automated Incident Handling Using SIMAutomated Incident Handling Using SIM
Automated Incident Handling Using SIM
Anton Chuvakin
 
Integration of cyber security incident response with IMS -- an approach for E...
Integration of cyber security incident response with IMS -- an approach for E...Integration of cyber security incident response with IMS -- an approach for E...
Integration of cyber security incident response with IMS -- an approach for E...
David Sweigert
 
Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016Samuel Loomis
 
Empowering Resilience Through Effective Crisis Management
Empowering Resilience Through Effective Crisis ManagementEmpowering Resilience Through Effective Crisis Management
Empowering Resilience Through Effective Crisis Management
I-Pix Technologies
 
disaster management
disaster managementdisaster management
disaster management
VedikaAgrawal13
 
Incident Management for Ransomware Attacks Best Practices for Response and Re...
Incident Management for Ransomware Attacks Best Practices for Response and Re...Incident Management for Ransomware Attacks Best Practices for Response and Re...
Incident Management for Ransomware Attacks Best Practices for Response and Re...
Centextech
 
Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...
Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...
Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...
Ahad
 
Physical Security Plan1.Identify the role of environmental control.pdf
Physical Security Plan1.Identify the role of environmental control.pdfPhysical Security Plan1.Identify the role of environmental control.pdf
Physical Security Plan1.Identify the role of environmental control.pdf
feelingspaldi
 

Similar to Managing Vulnerability SEC400 Managing.docx (20)

DISASTER MITIGATION AND MANAGEMENT INTRODUCTION
DISASTER MITIGATION AND MANAGEMENT INTRODUCTIONDISASTER MITIGATION AND MANAGEMENT INTRODUCTION
DISASTER MITIGATION AND MANAGEMENT INTRODUCTION
 
The Role and Evolution of Homeland Security | GQ Research
The Role and Evolution of Homeland Security | GQ ResearchThe Role and Evolution of Homeland Security | GQ Research
The Role and Evolution of Homeland Security | GQ Research
 
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docxCHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
CHAPTER 7 Risk Assessment, Security Surveys, and PlanningLEARNIN.docx
 
Crisis Management Enhanced by Advanced Software
Crisis Management Enhanced by Advanced SoftwareCrisis Management Enhanced by Advanced Software
Crisis Management Enhanced by Advanced Software
 
A Guide for Businesses.pdf
A Guide for Businesses.pdfA Guide for Businesses.pdf
A Guide for Businesses.pdf
 
effective disaster management by efficient usage of resources
effective disaster management by efficient usage of resourceseffective disaster management by efficient usage of resources
effective disaster management by efficient usage of resources
 
IT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John LadoIT Security and Management - Semi Finals by Mark John Lado
IT Security and Management - Semi Finals by Mark John Lado
 
AssignmentWhen a traffic camera is installed in a designate.docx
AssignmentWhen a traffic camera is installed in a designate.docxAssignmentWhen a traffic camera is installed in a designate.docx
AssignmentWhen a traffic camera is installed in a designate.docx
 
Unified emergency management paper
Unified emergency management paperUnified emergency management paper
Unified emergency management paper
 
Navigating the Landscape of Industries security in a Rapidly Changing World.pdf
Navigating the Landscape of Industries security in a Rapidly Changing World.pdfNavigating the Landscape of Industries security in a Rapidly Changing World.pdf
Navigating the Landscape of Industries security in a Rapidly Changing World.pdf
 
Security Precautions for the Hospitality Industry
Security Precautions for the Hospitality IndustrySecurity Precautions for the Hospitality Industry
Security Precautions for the Hospitality Industry
 
Preparing for future attacks. Solution Brief: Implementing the right securit...
Preparing for future attacks.  Solution Brief: Implementing the right securit...Preparing for future attacks.  Solution Brief: Implementing the right securit...
Preparing for future attacks. Solution Brief: Implementing the right securit...
 
Automated Incident Handling Using SIM
Automated Incident Handling Using SIMAutomated Incident Handling Using SIM
Automated Incident Handling Using SIM
 
Integration of cyber security incident response with IMS -- an approach for E...
Integration of cyber security incident response with IMS -- an approach for E...Integration of cyber security incident response with IMS -- an approach for E...
Integration of cyber security incident response with IMS -- an approach for E...
 
Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016Generic_Sample_incidentresponseplanIRP_ISS_2016
Generic_Sample_incidentresponseplanIRP_ISS_2016
 
Empowering Resilience Through Effective Crisis Management
Empowering Resilience Through Effective Crisis ManagementEmpowering Resilience Through Effective Crisis Management
Empowering Resilience Through Effective Crisis Management
 
disaster management
disaster managementdisaster management
disaster management
 
Incident Management for Ransomware Attacks Best Practices for Response and Re...
Incident Management for Ransomware Attacks Best Practices for Response and Re...Incident Management for Ransomware Attacks Best Practices for Response and Re...
Incident Management for Ransomware Attacks Best Practices for Response and Re...
 
Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...
Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...
Tips to Make an Incident Response Plan to Tackle Cyber Threats and Safeguardi...
 
Physical Security Plan1.Identify the role of environmental control.pdf
Physical Security Plan1.Identify the role of environmental control.pdfPhysical Security Plan1.Identify the role of environmental control.pdf
Physical Security Plan1.Identify the role of environmental control.pdf
 

More from infantsuk

Please cite and include references- Broderick & Blewitt (2015) must.docx
Please cite and include references- Broderick & Blewitt (2015) must.docxPlease cite and include references- Broderick & Blewitt (2015) must.docx
Please cite and include references- Broderick & Blewitt (2015) must.docx
infantsuk
 
Please choose 1 of the 2 topics below for this weeks assignment.docx
Please choose 1 of the 2 topics below for this weeks assignment.docxPlease choose 1 of the 2 topics below for this weeks assignment.docx
Please choose 1 of the 2 topics below for this weeks assignment.docx
infantsuk
 
Please be advised that for the second writing assignment, the clas.docx
Please be advised that for the second writing assignment, the clas.docxPlease be advised that for the second writing assignment, the clas.docx
Please be advised that for the second writing assignment, the clas.docx
infantsuk
 
Please briefly describe cross cultural variations in Consumer Beha.docx
Please briefly describe cross cultural variations in Consumer Beha.docxPlease briefly describe cross cultural variations in Consumer Beha.docx
Please briefly describe cross cultural variations in Consumer Beha.docx
infantsuk
 
Please be sure to organize your report using section headers to clea.docx
Please be sure to organize your report using section headers to clea.docxPlease be sure to organize your report using section headers to clea.docx
Please be sure to organize your report using section headers to clea.docx
infantsuk
 
Please attach two different assignments. Please first provide the dr.docx
Please attach two different assignments. Please first provide the dr.docxPlease attach two different assignments. Please first provide the dr.docx
Please attach two different assignments. Please first provide the dr.docx
infantsuk
 
Please answers some questions below (attached references)  1.Wh.docx
Please answers some questions below (attached references)  1.Wh.docxPlease answers some questions below (attached references)  1.Wh.docx
Please answers some questions below (attached references)  1.Wh.docx
infantsuk
 
Please answer these discussion questions thoroughly.  Provide re.docx
Please answer these discussion questions thoroughly.  Provide re.docxPlease answer these discussion questions thoroughly.  Provide re.docx
Please answer these discussion questions thoroughly.  Provide re.docx
infantsuk
 
Please click on this link and follow the directions to complete the .docx
Please click on this link and follow the directions to complete the .docxPlease click on this link and follow the directions to complete the .docx
Please click on this link and follow the directions to complete the .docx
infantsuk
 
Please choose one of the following questions, and post your resp.docx
Please choose one of the following questions, and post your resp.docxPlease choose one of the following questions, and post your resp.docx
Please choose one of the following questions, and post your resp.docx
infantsuk
 
Please answer the questions in paragraphs containing at least fi.docx
Please answer the questions in paragraphs containing at least fi.docxPlease answer the questions in paragraphs containing at least fi.docx
Please answer the questions in paragraphs containing at least fi.docx
infantsuk
 
Please answer the following three questions in one to two paragraphs.docx
Please answer the following three questions in one to two paragraphs.docxPlease answer the following three questions in one to two paragraphs.docx
Please answer the following three questions in one to two paragraphs.docx
infantsuk
 
Please answer the following1.  Transformational leadership and .docx
Please answer the following1.  Transformational leadership and .docxPlease answer the following1.  Transformational leadership and .docx
Please answer the following1.  Transformational leadership and .docx
infantsuk
 
Please answer the below questionDescribe social bandwidth and s.docx
Please answer the below questionDescribe social bandwidth and s.docxPlease answer the below questionDescribe social bandwidth and s.docx
Please answer the below questionDescribe social bandwidth and s.docx
infantsuk
 
Please answer the following questions1.- Please name the fu.docx
Please answer the following questions1.- Please name the fu.docxPlease answer the following questions1.- Please name the fu.docx
Please answer the following questions1.- Please name the fu.docx
infantsuk
 
Please answer the following questions1.- Please name the follow.docx
Please answer the following questions1.- Please name the follow.docxPlease answer the following questions1.- Please name the follow.docx
Please answer the following questions1.- Please name the follow.docx
infantsuk
 
Please answer the following questions with supporting examples and f.docx
Please answer the following questions with supporting examples and f.docxPlease answer the following questions with supporting examples and f.docx
Please answer the following questions with supporting examples and f.docx
infantsuk
 
Please answer the following questions about air and water pollution .docx
Please answer the following questions about air and water pollution .docxPlease answer the following questions about air and water pollution .docx
Please answer the following questions about air and water pollution .docx
infantsuk
 
please answer the following 7 questions in its entirety.  #11.C.docx
please answer the following 7 questions in its entirety.  #11.C.docxplease answer the following 7 questions in its entirety.  #11.C.docx
please answer the following 7 questions in its entirety.  #11.C.docx
infantsuk
 
Please answer the questions listed below and submit in a word docume.docx
Please answer the questions listed below and submit in a word docume.docxPlease answer the questions listed below and submit in a word docume.docx
Please answer the questions listed below and submit in a word docume.docx
infantsuk
 

More from infantsuk (20)

Please cite and include references- Broderick & Blewitt (2015) must.docx
Please cite and include references- Broderick & Blewitt (2015) must.docxPlease cite and include references- Broderick & Blewitt (2015) must.docx
Please cite and include references- Broderick & Blewitt (2015) must.docx
 
Please choose 1 of the 2 topics below for this weeks assignment.docx
Please choose 1 of the 2 topics below for this weeks assignment.docxPlease choose 1 of the 2 topics below for this weeks assignment.docx
Please choose 1 of the 2 topics below for this weeks assignment.docx
 
Please be advised that for the second writing assignment, the clas.docx
Please be advised that for the second writing assignment, the clas.docxPlease be advised that for the second writing assignment, the clas.docx
Please be advised that for the second writing assignment, the clas.docx
 
Please briefly describe cross cultural variations in Consumer Beha.docx
Please briefly describe cross cultural variations in Consumer Beha.docxPlease briefly describe cross cultural variations in Consumer Beha.docx
Please briefly describe cross cultural variations in Consumer Beha.docx
 
Please be sure to organize your report using section headers to clea.docx
Please be sure to organize your report using section headers to clea.docxPlease be sure to organize your report using section headers to clea.docx
Please be sure to organize your report using section headers to clea.docx
 
Please attach two different assignments. Please first provide the dr.docx
Please attach two different assignments. Please first provide the dr.docxPlease attach two different assignments. Please first provide the dr.docx
Please attach two different assignments. Please first provide the dr.docx
 
Please answers some questions below (attached references)  1.Wh.docx
Please answers some questions below (attached references)  1.Wh.docxPlease answers some questions below (attached references)  1.Wh.docx
Please answers some questions below (attached references)  1.Wh.docx
 
Please answer these discussion questions thoroughly.  Provide re.docx
Please answer these discussion questions thoroughly.  Provide re.docxPlease answer these discussion questions thoroughly.  Provide re.docx
Please answer these discussion questions thoroughly.  Provide re.docx
 
Please click on this link and follow the directions to complete the .docx
Please click on this link and follow the directions to complete the .docxPlease click on this link and follow the directions to complete the .docx
Please click on this link and follow the directions to complete the .docx
 
Please choose one of the following questions, and post your resp.docx
Please choose one of the following questions, and post your resp.docxPlease choose one of the following questions, and post your resp.docx
Please choose one of the following questions, and post your resp.docx
 
Please answer the questions in paragraphs containing at least fi.docx
Please answer the questions in paragraphs containing at least fi.docxPlease answer the questions in paragraphs containing at least fi.docx
Please answer the questions in paragraphs containing at least fi.docx
 
Please answer the following three questions in one to two paragraphs.docx
Please answer the following three questions in one to two paragraphs.docxPlease answer the following three questions in one to two paragraphs.docx
Please answer the following three questions in one to two paragraphs.docx
 
Please answer the following1.  Transformational leadership and .docx
Please answer the following1.  Transformational leadership and .docxPlease answer the following1.  Transformational leadership and .docx
Please answer the following1.  Transformational leadership and .docx
 
Please answer the below questionDescribe social bandwidth and s.docx
Please answer the below questionDescribe social bandwidth and s.docxPlease answer the below questionDescribe social bandwidth and s.docx
Please answer the below questionDescribe social bandwidth and s.docx
 
Please answer the following questions1.- Please name the fu.docx
Please answer the following questions1.- Please name the fu.docxPlease answer the following questions1.- Please name the fu.docx
Please answer the following questions1.- Please name the fu.docx
 
Please answer the following questions1.- Please name the follow.docx
Please answer the following questions1.- Please name the follow.docxPlease answer the following questions1.- Please name the follow.docx
Please answer the following questions1.- Please name the follow.docx
 
Please answer the following questions with supporting examples and f.docx
Please answer the following questions with supporting examples and f.docxPlease answer the following questions with supporting examples and f.docx
Please answer the following questions with supporting examples and f.docx
 
Please answer the following questions about air and water pollution .docx
Please answer the following questions about air and water pollution .docxPlease answer the following questions about air and water pollution .docx
Please answer the following questions about air and water pollution .docx
 
please answer the following 7 questions in its entirety.  #11.C.docx
please answer the following 7 questions in its entirety.  #11.C.docxplease answer the following 7 questions in its entirety.  #11.C.docx
please answer the following 7 questions in its entirety.  #11.C.docx
 
Please answer the questions listed below and submit in a word docume.docx
Please answer the questions listed below and submit in a word docume.docxPlease answer the questions listed below and submit in a word docume.docx
Please answer the questions listed below and submit in a word docume.docx
 

Recently uploaded

TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
Tamralipta Mahavidyalaya
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
Ashokrao Mane college of Pharmacy Peth-Vadgaon
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 

Recently uploaded (20)

TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Home assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdfHome assignment II on Spectroscopy 2024 Answers.pdf
Home assignment II on Spectroscopy 2024 Answers.pdf
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.Biological Screening of Herbal Drugs in detailed.
Biological Screening of Herbal Drugs in detailed.
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 

Managing Vulnerability SEC400 Managing.docx

  • 1. Managing Vulnerability SEC400 Managing Vulnerability Name Class Date Professor Managing Vulnerability When a natural or manmade disaster or a technological threats occurs the effectiveness of the response will be crucial. While the disaster itself cannot be prepared for security personnel can have an effective response in place in the event a disaster or a technological threat was to occur. In a disaster or during technological threats security personnel fulfill the same
  • 2. role as when things are safe and secure. There role is to secure the person and property involved in the disaster or technological threat and to prevent loss. In order for security personnel to be effective in the event of a disaster there needs to be a disaster preparedness plan in place that includes preparing for technological threats as well as a disaster response plan in place. The role of security personnel at a facility is to ensure the perimeter is properly secured and that there is no internal loss as well as in the new information security personnel are responsible for ensuring there are no security breaches to private sensitive data. Security personnel are responsible for patrolling the facility and protecting the people and the property but they are also responsible for ensuring vulnerabilities are minimized and in the event of a disaster or technological threat there is a proper response. In order to be effectively prepared in the event of a disaster or technological attack the security staff must be proactive in reducing potential vulnerabilities and managing the response. The security personnel at a facility also have a responsibility to respond to any disasters that occur. Security personnel are responsible for securing the facility and guarding their property as well as providing assistance to staff members in need and support the responding agencies in any investigations. The security personnel will be responsible for implementing any emergency response plan and fulfilling the roles they have been assigned in the event of a disaster as well as providing the necessary assistance to responding agencies such as the police, fire, and medical personnel. Disaster management is the process of addressing an event that has the potential to seriously disrupt the social fabric of the community and create security threats (Moon, 2011). The natural disaster can involve a hurricane, earthquake, flooding, tornadoes, tsunamis, and wildfires. The manmade disaster can evolve an event such as a nuclear accident or an act of violence by a terrorist group while the technological threat involves
  • 3. intrusion into the private information system of the government or an organization which not only threatens the organization but its employees and its customers. In order to manage the vulnerabilities associated with these events the necessary plans must be in place. The disaster preparedness plan assists in creating a plan to prevent the disaster or to limits impact while technological threat preparedness’ plan ensure the organization or government infrastructure is not vulnerable to these threats. The first step for the organization, when creating the disaster preparedness plan, is to appoint an Emergency Management Coordinator. The Emergency Management Coordinator will lead the disaster preparedness plan. After appointing a team to assist in the emergency preparedness’ efforts the Emergency Management Coordinator will conduct an assessment of the potential security vulnerabilities faced by the facility in the event of a disaster to ensure these vulnerabilities can be minimized. Once potential vulnerabilities have been identified in the assessment the plan will include intimating the necessary improvements to reduce the security threat in the event of a disaster. The emergency preparedness’ plan will include assigning the necessary security personnel their role in the event of a disaster and implementing the necessary drills and training to ensure security personnel will be effective in their roles in the event of a disaster. For example security personnel could be assignment to automatically secure the perimeter while other security staff members might be assigned to guarding sensitive information. The emergency preparedness’ plan will also outline the available resources and response agencies in the community that must be contacted for assistance in the event of a disaster. Due to the new information age and the sensitive information that can be contained at a facility it is also essential that the facility have a technological threat response plan in order to protect sensitive data. The best way to protect sensitive data from threats is to develop a data security plan which includes first conducting an assessment of the information data
  • 4. security needs. Once the security needs have been identified a data security plan can be developed to ensure outside threats can be detected and thwarted. The data security plan will include appointing only authorized personnel to access private company information and taking the necessary steps to protect the private data including the use of firewalls, implement network security with access controls, and encrypting sensitive data. Communication between remote users puts data at risk of being seen by outsiders (Norman, 2010). It is also essential that the facility has the necessary passwords and encryption software to prevent outside threats. Other countermeasures that will need to be put in place to prevent security threats are first ensuring that employees have been informed of company security polices and are in compliance with these policies. When there is an emergency preparedness plan in place as well as a disaster response plan in place the facility can be better prepared in the event of a natural or manmade disaster or a technological threat. The key to dealing with intrusion threat actors is to detect them as early as possible and intercept them with a superior response before they can make their way to their intended target (Norman, 2010). The cost benefit of having these responses in place is unlimited. If the facility were to be destroyed by a natural disaster the financial burden could be in the hundreds of thousands but if some of the damage can be prevented due to emergency preparedness’ measures and an effective sensitive data security plan the amount of the cost incurred by the disaster could be limited. The security countermeasures will ensure the facility is not vulnerable to cyber attacks that can result in the loss of sensitive information that includes the financial information of the company and private information of customer and employees. If the security at the facility is not able to ensure these threats are prevented then the loss could be huge. When information systems are intruded upon it could involve a malicious attack that takes the facility out of operation or the
  • 5. theft of sensitive information that could result in damage to the company’s reputation. In the Information age it is essential that security staff is capable of preventing technological attacks or threats. The securities counter measures that will be implemented in the event of a natural disaster will ensure that the impact of the disaster is limited in order to reduce the costs associated with the event and will ensure that the appropriate response is in place to minimize the damage to the facility and its personnel. In the event of a disaster the facility and its property will be vulnerable to loss or damage that can result in a huge expense for the facility. The cost of implementing all of the necessary security measures to reduce vulnerabilities in the event of a disaster or technological threat will be less than $10,000 dollars while the cost for not being adequately prepared are countless. Disaster risk management is essential to the effective response in any disaster. Sensible and cost effective risk reduction programs, such as early warning systems, strengthened building codes, and emergency preparedness strategies, are the best defense against future catastrophes (Moon, 2011). Since the attacks on 9/11 and the destruction associated with hurricane Katrina disaster risk management has become a common and necessary aspect for all organizations. Recovery and operational backup plans will be developed in the emergency response plan and will include storing sensitive data in a separate secure location and storing physical assets in a fire proof safe. This will ensure the company’s operational systems are secure in the event of a disaster or an attack. In the event the facility is physically damage the security personnel will rely on the disaster response plan and wait for assistance for local response agencies. The role of security will be to secure the facility until help can arrive and provide support. The facility will need to have notification strategies in place to alert security staff of the disaster or the attack and establish a communication plan for the customer. It can be difficult to evaluate the effectiveness of the
  • 6. security program for the disaster or the technological attack but in order to be able to determine the program’s success there must be an evaluation measure. In the natural or manmade disaster employee will be subject to random, unannounced security drills to ensure they are aware of the necessary response required in the event this situation were to occur. Information systems will be tested through the use of highly skilled IT personal continuously monitoring and assessing the effectiveness of the security measures. References McMillan, C. (2008). Natural Disasters: Prepare, Mitigate, And Manage. Retrieved September 30, 2012 from http://www.csa.com/discoveryguides/archives/ndht.php Moon, B. (2011). What is Disaster Risk Reduction? Retrieved September 30, 2012 from http://www.unisdr.org/who-we-are/what-is-drr Norman, T. (2010). Physical Security Risk and Countermeasures: Effectiveness Metrics. Retrieved September 30, 2012 from http://www.csoonline.com/article/540063/physical-security- risk-and-countermeasures