e-STS : Search Here

Saturday, October 28, 2023

Cyber Security For Business

Need for Security

The Security investigation underlines the organization’s responsibility to develop and maintain a successful information security program that is to be executed in all levels of management  An Organization must understand that securing an asset is a continuous process rather than an event.

Two Types of Needs

There are two types of needs in securing an asset :

  • Business Need,
  • Technology Need.

Any organization will have confusion in deciding which of the above need should be compromised.  Business needs should always be given higher priority.  Compromising business needs for the sake of security may hinder the development of the organization. 

Business Need

The need for securing the information asset of an organization are listed below : 

  • Protects the organization’s ability to function,

  • Enables the safe operation of applications implemented on the organization’s IT Systems.

  • Protects the data the organization collects and users.

  • Safeguards the technology assets in use at the organization.
    Need for Cyber Security

Protecting Data

  • The most valu8able and non recoverable asset in an organization is data.

  • It is the most valuable asset and the most difficult one to secure.

  • Organization must ensure proper security to both data in motion and data in rest.

  • Without data, an organization loses its record of transactions and / or its ability to deliver value to its customers.

  • An effective information security program is essential to the protection of the integrity and value of the organization’s data.

  • Loss of confidential data may lead to great disasters which would pave way to framing of new security policy from the scratch.

  • Developing a new security policy after data loss would consume more resources.

Safeguarding Technology Assets

  • Technology assets are costly and its installation is also very expensive.

  • Organizations must have security infrastructure services based on the size and scope of the enterprise and the technologies they use.

  • Additional security services may have to be provided if needed.

  • More robust solutions may be needed to replace the out dated security programs.

  • PKI (Public Key Infrastructure) is one among the
    security measure that safeguards the data.

No comments:

Post a Comment

Most Recent