Topic > Security Management at the Tower - 615

My report will discuss and analyze the security management at the Tower. In part one I will provide a brief on cybersecurity at the tower and outline its expertise. In the second part I will discuss and analyze the safety management at the tower and finally add solutions, recommendations and conclude my report with conclusions and references. Over the past twenty years, nearly all businesses have become increasingly dependent on information security. The use of computer networks has also increased, not only within businesses but also between them, and between local businesses and international businesses around the world. The growing complexity of IT infrastructure means that businesses are now more vulnerable to technical failures, human errors, abuse, hackers and cyber malware. This growing complexity requires a consolidated management approach. Furthermore, safety management has an important relationship with business activities. The main purpose of security management is to provide a basic level of security, independent of external requirements. Security management is important to maintain the uninterrupted functioning of IT companies. It also expands information security service level management, as it is difficult to manage a large number of different SLAs versus a small number. Nowadays, many companies address information security at a strategic level in information policy and information plans, and at an operational level by purchasing materials and other security tools. Information security is not a goal in itself; is intended to help the interests of the company or companies. Furthermore, information security must be suited to the needs of the information. Effective information delivery, with enough information…half of the paper…needs and other things. 6- Risks such as resources, threat, vulnerability and combinations.7- Preference of action for any risk.8- Controls suggested by risk assessment” [2].According to the case study, I saw that there was no security plan. This thing increased the risk to the highest level. IT directors and IT staff should also take full responsibility for all vulnerabilities that occur in the system. This is my fourth case study and I hope you like it. Best regards Mohammed Almohdar References[1], [2]. Stallings, W., & Brown L. (2012). Cyber ​​security: principles and practice. Boston, MA: Prentice Hall. Raggad, B. (2010). Information security management: concepts and practice. Boca Raton, FL:CRC Press/Taylor & Francis.Tipton, H. & Nozaki, M. (2007). Information security management manual. Boca Raton: Auerbach Publications.