Red Tape

Tue
22
Oct

Developing a Security Awareness Program

Contributed by Mark Heckle
In today’s environment, technology has become a way of doing business. Because of technology, information security has become a necessary factor in how we use technology in our companies. There are certainly ways to help protect the technology with additional hardware and software, but the human component plays a vital role in reducing security risks. It is necessary to make the employees more security aware by developing security awareness programs. This research will show how to develop a security awareness program for your organization. It will also present ways to engage employees in such a plan for your organization. The security awareness program is the first step in protecting your organization from such events as ransomware, phishing attacks, spam, and many more.
 
 
This document is in PDF format. To view it click here.

Wed
31
Jul

The Effectiveness of Governance and Regulatory Bodies in Protecting Information Security

Contributed by James Robinson
Appropriate and proper understanding and of IT security should be considered an essential and pertinent requirement within any modern business amongst its executives and employees. But, as we have seen throughout recent news, this has not been the case for many companies. This text explores the effectives of governance and regulations as it relates to protecting our information security. This text focuses on the different organizations’ businesses have implemented with hopes of increasing security standards. The articles, figures and tables used in this paper will further elaborate the importance of these organizations and practices within companies.
 
This document is in PDF format. To view it click here.

Tue
23
Jul

Information Security Management – Current Threats, Challenges, & Mitigations

Contributed by Mark E. Turner
Security threats continue to present challenges to both private and public sectors. Evidence of this problem is provided in daily news reports of data breaches involving private citizens data. Information security Management (ISM) has become the largest growing field within Information Technology (IT) as a result. With funding being increased for the sole purpose of addressing these threats and the challenges associated with mitigating them, it is important to maintain an up to date and relevant understanding of current trends within this field.

Wed
20
Feb

Role of Machine Learning in change of Identity and Access Management: A proposed design of IAM for University System

Contributed by Subhrodip Roy Chowdhury

Thu
27
Dec

Managing Access in an Enterprise Environment

Contributed by Marc Colonna
Access control starts with the front door to the organization, continues with appropriate security in and outside of the data center, and finishes with good user education. Strong and competent companies will employ the appropriate security standards deemed necessary for their organization. “If your data could be of any value to someone without proper authorization to access it, then your organization needs strong access control” (Martin, 2018). Physical security such as security cameras and security doors are only as functional as the habits of those who are using them. Control over network access and network resources must be suitable for the data it is protecting. Policies are required to keep these systems in balance and always improving as technology changes.
 
This document is in PDF format. To view it click here.

Pages

Subscribe to RSS - Red Tape