Security Needs and Objectives

You are a newly appointed security officer (SO). The chief information security officer (CISO) has given you 60 days to deliver a security policy plan to address the organizational growth that the company is anticipating. Note: You may create or make all necessary assumptions needed for the completion of this assignment.

Use the Internet to research the process that leads to the identification of security needs in an organization. Also, research an organization with a security policy in place, and review how this organization laid down the foundation for its security policy. Review the business requirements for the security project plan. You will be asked to describe the detailed project, including the scope of the project; possible security risks, constraints, and assumptions; integration with other systems and infrastructure; and relevant terms that were used throughout the security project.

Write a 3–4 page paper in which you:

Explain the process that leads to the identification of security needs and how those needs lay down a foundation for a policy.
Describe the details regarding the type of business in which the company you researched is engaged.
Provide a description about the current system requirements activities within the organization you researched.
Describe the types of data that the company you researched collects to support the business. The description should include the following:
Operational systems.
Analytics and interfaces.
Infrastructure and security.

Sample Solution

o inadvertently undermine the international human rights framework. For instance, R2P can allow for powerful countries to invade countries under the guise of humanitarian intervention. This is all at the expense of human protection and is justified under the pretext of ‘human security’. An example includes Libya, where military intervention was used in response to Gaddafi’s planned air strikes upon civilians (Kaldor, 2011). However, “having crippled Libyan air capabilities” NATO continued to aim at Gaddafi’s compound (Modeme, 2012) leading to critics saying that “the boundaries between protecting civilians and pursuing regime change became increasingly blurred” (Dembinski and Reinold, 2011). Though NATO won, it left the country in turmoil with no government and depriving Libyans of protection. Reports suggest that NATO was responsible for twice the amount of civilian deaths as Gaddafi (Ostroumova, 2012) suggesting how R2P can be more of a threat rather than serving as a protector. Human security was also used as a justification of the Iraq War (a now internationally criticised intervention). Mentan (2014) argues that “the association of human security with Western imperialism and overzealous military intervention (e.g. Iraq and arguably Libya) has provoked international apprehension towards further implementing it”. Therefore, powerful states inconsistency in its application of human security has rendered the practice ineffective as it deprives citizens of protection. This highlights how human security can be used by states, organisations and corporations as a tool to continue to violate individual rights. Critics have also expressed concerns that “[p]owerful states will determine whose human rights justify departure from the p

This question has been answered.

Get Answer
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, Welcome to Compliant Papers.