Achieving security objectives

What are people currently doing to achieve security objectives? Where do those security objectives originate? Who are the people who are engaged in security and what are their reasons for engagement?

find the cost of your paper

Sample Answer

There are a number of things that people are currently doing to achieve security objectives. These include:

  • Implementing security controls: Security controls are measures that are put in place to protect systems and data from unauthorized access, use, disclosure, disruption, modification, or destruction. Some common security controls include firewalls, intrusion detection systems, and access control lists.
  • Educating employees about security: Employees are often the weakest link in the security chain. By educating employees about security risks and best practices, organizations can help to protect their systems and data.
  • Monitoring for threats and vulnerabilities: Organizations need to continuously monitor their systems and data for threats and vulnerabilities. This can be done through a variety of methods, such as vulnerability scanning and penetration testing.
  • Responding to incidents: When a security incident occurs, organizations need to be able to respond quickly and effectively. This includes containing the incident, restoring systems and data, and investigating the incident to prevent it from happening again.

Full Answer Section

The security objectives of an organization can originate from a number of different places. These include:

  • Regulatory requirements: Organizations may be required to comply with certain security regulations, such as the General Data Protection Regulation (GDPR) or the Payment Card Industry Data Security Standard (PCI DSS).
  • Business requirements: Organizations may have security objectives that are specific to their business needs. For example, a financial institution may have a security objective to protect customer financial data.
  • Risk assessments: Organizations should conduct regular risk assessments to identify and assess the risks to their systems and data. These risks can then be used to develop security objectives that are appropriate for the organization.

The people who are engaged in security come from a variety of different backgrounds. These include:

  • Security professionals: Security professionals are responsible for designing, implementing, and managing security controls. They may have a variety of different technical skills, such as networking, systems administration, and programming.
  • Business leaders: Business leaders are responsible for setting the security objectives for their organization. They need to understand the security risks that their organization faces and ensure that the organization has the resources it needs to protect its systems and data.
  • Employees: All employees play a role in security. They need to be aware of security risks and best practices and take steps to protect their systems and data.

The reasons why people are engaged in security vary. Some people are motivated by a desire to protect their organization’s systems and data. Others are motivated by a desire to prevent crime or protect people’s privacy. Still others are motivated by a desire to challenge themselves and learn new things.

No matter what their reasons, the people who are engaged in security play an important role in protecting our systems and data.

This question has been answered.

Get Answer