SlideShare a Scribd company logo
1 of 2
Where do you draw the line between too much security in an organization and not enough? Give
and explain scenarios on both sides.
Solution
The line is drawn exactly in between excessive security and not enough security.
1)To much security:
excessive threats causes when we give extra privilages and high authorites to cutomers and
administrators
high and complex security architecture
It is incumbent on the information security professional to consider and prioritise the business
requirements.
The risk assessment and risk management process shouldn’t restrict the business from
achieving its objectives.
having more excwssive security makes things complicated
2)To less security:
weak and easily penetrable security system
weak foundational architecture
Where do you draw the line between too much security in an organizatio.docx

More Related Content

More from todd571

More from todd571 (20)

When equal moles of the following acids are dissolved in 1 L of H2O- w.docx
When equal moles of the following acids are dissolved in 1 L of H2O- w.docxWhen equal moles of the following acids are dissolved in 1 L of H2O- w.docx
When equal moles of the following acids are dissolved in 1 L of H2O- w.docx
 
When an organization starts to plan for business continuity and disast.docx
When an organization starts to plan for business continuity and disast.docxWhen an organization starts to plan for business continuity and disast.docx
When an organization starts to plan for business continuity and disast.docx
 
When discussing the security of SSO systems- which of the following is (2).docx
When discussing the security of SSO systems- which of the following is (2).docxWhen discussing the security of SSO systems- which of the following is (2).docx
When discussing the security of SSO systems- which of the following is (2).docx
 
When discussing the security of SSO systems- which of the following is (1).docx
When discussing the security of SSO systems- which of the following is (1).docxWhen discussing the security of SSO systems- which of the following is (1).docx
When discussing the security of SSO systems- which of the following is (1).docx
 
When an electron emits light energy and drops from the fourth to the t.docx
When an electron emits light energy and drops from the fourth to the t.docxWhen an electron emits light energy and drops from the fourth to the t.docx
When an electron emits light energy and drops from the fourth to the t.docx
 
When a liquid is placed in a sealed container- A) a set vapor pressure.docx
When a liquid is placed in a sealed container- A) a set vapor pressure.docxWhen a liquid is placed in a sealed container- A) a set vapor pressure.docx
When a liquid is placed in a sealed container- A) a set vapor pressure.docx
 
When a hydrate compound is heated- does the water get broken down into.docx
When a hydrate compound is heated- does the water get broken down into.docxWhen a hydrate compound is heated- does the water get broken down into.docx
When a hydrate compound is heated- does the water get broken down into.docx
 
What will happen to the Ksp value of Al(OH)3 when sodium hydroxide is.docx
What will happen to the Ksp value of Al(OH)3 when sodium hydroxide is.docxWhat will happen to the Ksp value of Al(OH)3 when sodium hydroxide is.docx
What will happen to the Ksp value of Al(OH)3 when sodium hydroxide is.docx
 
Which of the following can be used to create a VPN (Virtual Private Ne.docx
Which of the following can be used to create a VPN (Virtual Private Ne.docxWhich of the following can be used to create a VPN (Virtual Private Ne.docx
Which of the following can be used to create a VPN (Virtual Private Ne.docx
 
Which of the following are sources of lags in monetary policy- I- Con.docx
Which of the following are sources of lags in monetary policy-  I- Con.docxWhich of the following are sources of lags in monetary policy-  I- Con.docx
Which of the following are sources of lags in monetary policy- I- Con.docx
 
Which of the following are significant shortcomings with voluntary CSR.docx
Which of the following are significant shortcomings with voluntary CSR.docxWhich of the following are significant shortcomings with voluntary CSR.docx
Which of the following are significant shortcomings with voluntary CSR.docx
 
What various activities can be performed using IIS Manager-SolutionIIS.docx
What various activities can be performed using IIS Manager-SolutionIIS.docxWhat various activities can be performed using IIS Manager-SolutionIIS.docx
What various activities can be performed using IIS Manager-SolutionIIS.docx
 
What type(s) of bonding would be expected for each of the following ma.docx
What type(s) of bonding would be expected for each of the following ma.docxWhat type(s) of bonding would be expected for each of the following ma.docx
What type(s) of bonding would be expected for each of the following ma.docx
 
Which of the following are features of Btrfs- relocating files and sub.docx
Which of the following are features of Btrfs- relocating files and sub.docxWhich of the following are features of Btrfs- relocating files and sub.docx
Which of the following are features of Btrfs- relocating files and sub.docx
 
Which of the following accounting principles requires businesses to re.docx
Which of the following accounting principles requires businesses to re.docxWhich of the following accounting principles requires businesses to re.docx
Which of the following accounting principles requires businesses to re.docx
 
Which method would answer this question- To investigate if the use of.docx
Which method would answer this question- To investigate if the use of.docxWhich method would answer this question- To investigate if the use of.docx
Which method would answer this question- To investigate if the use of.docx
 
What type of intermolecular forces exist in NH3 and H2S- dispersion fo.docx
What type of intermolecular forces exist in NH3 and H2S- dispersion fo.docxWhat type of intermolecular forces exist in NH3 and H2S- dispersion fo.docx
What type of intermolecular forces exist in NH3 and H2S- dispersion fo.docx
 
Which method of evaluating capital investment proposals uses the conce.docx
Which method of evaluating capital investment proposals uses the conce.docxWhich method of evaluating capital investment proposals uses the conce.docx
Which method of evaluating capital investment proposals uses the conce.docx
 
Which molecule(s) will experience the London force- Select all that ap.docx
Which molecule(s) will experience the London force- Select all that ap.docxWhich molecule(s) will experience the London force- Select all that ap.docx
Which molecule(s) will experience the London force- Select all that ap.docx
 
Which metal is the stronger reducing agent- copper or zinc- iron or co.docx
Which metal is the stronger reducing agent- copper or zinc- iron or co.docxWhich metal is the stronger reducing agent- copper or zinc- iron or co.docx
Which metal is the stronger reducing agent- copper or zinc- iron or co.docx
 

Recently uploaded

Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
negromaestrong
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
Chris Hunter
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
QucHHunhnh
 

Recently uploaded (20)

Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Seal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptxSeal of Good Local Governance (SGLG) 2024Final.pptx
Seal of Good Local Governance (SGLG) 2024Final.pptx
 
Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104Nutritional Needs Presentation - HLTH 104
Nutritional Needs Presentation - HLTH 104
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Making and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdfMaking and Justifying Mathematical Decisions.pdf
Making and Justifying Mathematical Decisions.pdf
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
Mattingly "AI & Prompt Design: Structured Data, Assistants, & RAG"
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
Presentation by Andreas Schleicher Tackling the School Absenteeism Crisis 30 ...
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 

Where do you draw the line between too much security in an organizatio.docx

  • 1. Where do you draw the line between too much security in an organization and not enough? Give and explain scenarios on both sides. Solution The line is drawn exactly in between excessive security and not enough security. 1)To much security: excessive threats causes when we give extra privilages and high authorites to cutomers and administrators high and complex security architecture It is incumbent on the information security professional to consider and prioritise the business requirements. The risk assessment and risk management process shouldn’t restrict the business from achieving its objectives. having more excwssive security makes things complicated 2)To less security: weak and easily penetrable security system weak foundational architecture