This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Camera

Why class is relevance to the security practitioner

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Why class is relevance to the security practitioner

Information security and risk management class are very relevant to the security practitioner. This is because it offers knowledge and skills that are relevant in security the business information, and data. The primary data that is provided on the class that entails better management of the business system through development and establishment rules and regulation help in creating an awareness to the business member on importance of remaining subjective to organizational security. The security practitioner will benefit from the class as they will be equipped with the tricks that are mostly used by the social engineers to access business information. Apart from informing the security practitioners on the information governance and standard, it serves as an eye-opener to them as it provides information on the method that should be used in the proper security functioning of the business organization. These include use of updated version, configuring the system and better application and installing of the anti-virus software. All these methods ensure the better utilization of the business system. As well the technique ensures that unauthoritative individual does not access the information and data stalled in the system.

More subject learned

The other more subject that we have learned in this class is information governance and risk management. Information governance is express as the critical method that ensure that business information and data is well secured against falling in the wrong hand. It involve development of the strong password that will hard for the social engineers to compromise the business operation. Information governance is acknowledged as a vital concept as it ensures that business websites and systems are well managed to inhibit the process of information dissemination from one medium to another. The management is called up to reveal their responsivities in educating and training employees on the means of controlling and managing information in the organization. Business data serve as a vital component for the growth and development of the company. It is through the use of the business organization that it is capable of identifying and examining the performance of the organization. The same data is used by the management in making decision. As such, there is a need for managing business security to ensure that is information is protected against loss. One the other hand, risk management has been express as very useful in the process of securing the business operation against cyber-threats..

Don't use plagiarised sources.Get your custom essay just from $11/page

Application of the above idea

The new concept that I learned in the class is the implementation of the business policies to manage risk in the organization. Business policies, at some point, appear like a neutral concept in risk management. However, when this concept is expressed from the perspective of cyber-security, it creates a sense. Business policies involve the formulation and making of the rules and regulations that govern the business operations. The concept can be applied in the field of securing business information and data. It is applicable in the process of securing the sensitives information in the organization. In the business environment it is recommendable to come up with rules and regulation that will govern business information. The first method of managing business risk is to come up with a policy that forbids employees from sharing information and data with third parties. It will play a critical role in ensuring that business privacy are secured and maintained. The second method would include better usage of the business system to ensure that the member does not turn to be reckless and careless in allowing the social engineer to access the information and data on the network.

Class challenges

The major challenge that is experienced during this class is the lack of enough content in expressing the entire concept of information security and risk management. The information that was presented make it hard for the me to comprehend the means of solving the issues within the organization as means of controlling and managing the organization risks. It researches further analysis and investigation of the context from the other research material to acquire the full idea behind the application of the information security to control the business information and data. Also, apart from the data from the content being insufficient, that method of delivering the entire content lack level of practicality. Information security and risk management concept is not a theoretical component but it is practical phenomena that require a lot of sense in delivering. However, the lecture did not demonstrate the actual part of the concept. For better comprehension, it would be recommendable to used practical application in teaching the idea. Also, it would be suitable to evaluate the content before delivering it to the learners.

Expectation

After completion of my course/class, I am looking forward to embracing the business risk with courage. The best means of facing the business risk, which include the cyber-risks is to apply the knowledge and skills acquired from the course to solve the issues of the business risks. The best method of solving the business risk to come up with program that will ensure business continuity even after the occurrence of the business crimes. Cyber-crimes, which are critical issues facing today’s organization will require better management of the business system to make it hard for the hacker to access the business information. In the business field, I will install a surveillance monitoring camera to detect any activities taking place in the organization. It will be one way to controlling business risks

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask