Need a perfect paper? Place your first order and save 5% with this code:   SAVE5NOW

Personal Security Evaluation

  1. Overview of the personal situation and the key risks that are present

My mobile (Samsung Galaxy S23 Ultra), Google Pixel Watch, Intel Arc A370M laptop, Canon PIXMA TR4520 Wireless, and a Google Home Speaker are the first things I will mention as the gadgets I use at home. These are the tools I use daily to process information in my life. All my data and information are kept in the Google Cloud, which I use as my storage. Numerous security-related hazards are inescapable when utilizing these devices and the networks to which they are connected. The processing of security policy-related risks, risks related to the security of personal information, risks related to the security of human resources, risks related to asset management, risks related to access control, risks related to operational security, and risks related to the physical and environmental environment are the main risk areas that are present in the system.

  1. Used normative model

Strategic control requires selecting controls that meet the normative model. This process sets the standard, making the entire operation practical. It improves workplace efficiency. Reevaluating the plan is one option. Operational control is also included in the method. This technique requires short-term decision-making. This decision-making procedure established mid-level management, which improved performance and cost. Considering the normative model, I apply AS ISO/IEC 27002:2015 (Information technology—security techniques—code of practice for information security instruments) at home and work. The report’s APPENDIX describes several AS ISO/IEC 27002:2015 control models I assess for the normative mode.

  • Management of removable data
  • Handling of assets
  • Mobile device and Teleworking
  • System and application access control
  • Disposal of Media
  • Protection from malware
  • Equipment maintenance
  • Clear desk and clear screen policy
  • Secure disposal or re-use of equipment
  • Installation of software on operational systems
  • Information backup
  • Restrictions on software installation
  • Management of technical vulnerabilities
  • Management of information security incidents and
  • Security of network services
  1. Summary of the tasks undertaken to complete the review

The review began with extensive secondary research. Early qualitative data collecting and analysis started. Research begins after background research and theory development. Reviewing the study will aid the operation when done professionally and with a defined ideology. Data computed in business process management has been found to improve data management, considered in data management operations. Operational software testing includes software sanity testing. Business process management includes interface testing. Selenium is a top testing tool. The testing procedure ensures consistency across browsers and platforms.

  1. Findings

The major finding of the review includes the likelihood that there are chances of several security-related issues that might take place and that there are security techniques as well that are to be considered in this section; thus, it is the main prospect that has been affecting the operational process project completion. It has been seen that the data that have been considered for the processing of the business have been helping in analyzing the actual data that have been collected; security issues that are to be considered if the security management process is also stated in the section. This case includes that the data management is performed in a better manner.

A more efficient data management performance like this aids in the division of labor within an organization. Data theft has been identified as one of the most prevalent forms of the security breach. Only a select few potential problems with the data analysis workflow need to be eradicated. One explanation is that fraudsters quickly adopt new technology, making it simpler to steal information or launch attacks (Soe et al., 2019). The potential for many users is also identified as a potential problem during the process. Data will be extracted repeatedly throughout the usage process, and this will cause ongoing problems. The complexity with which attacks are launched has made it simpler for fraudsters to profit from them. This superb tool will impact the primary operation. The evaluation of work processes is enhanced when malicious programs are integrated into the software. The outcomes of this procedure were used to evaluate its effectiveness. Phishing attacks can happen at the cores of the IT infrastructure.

Denial of service attacks may affect corporate management. Authorized users resolve data-accessing issues. This method prevents data retrieval, slowing business procedures for many firms. These are the most typical operational issues. This subsection mandates policy evaluation. We can ensure system stability by thoroughly evaluating the policy. Maintaining system stability allows data division. If the rules are followed, data breaches are less likely. Protecting company data is the next stage in system resilience. Data partitioning can improve firm management and organizational security (Liang et al., 2016).

In this process, mobile devices and teleworking sections are included. This inclusion helps in better processing the working process. After this aspect, human resource security is implemented. In the case of using a proposed teleworking environment, the issues that might take place in the organization can be eliminated by provisioning virtual desktops as per the processing and the security system. It has been seen that the management of unauthorized access to data in teleworking is also kept under a proper check; this check ensures that there is at least a data breach from the platform. Home private networks are mentioned. As seen, a home network can eliminate telecommuting. This case protects IP wisely.

Intellectual property protection has been playing an important role in maintaining the security of system software. Licensing programs are also considered to be important in case the software that is used is properly licensed. The entire working process gets highly authenticated. Even if there is a data breach from the licensed software, the software company will be responsible for fetching back the data, providing an additive security cushion as well (Dutton et al., 2017).

Firewalls protect the process. The firewall system will help business management avoid losses from harmful software. This section requires auditing and security monitoring. This part improves credit reviewing. Complying with application information security requirements is another way to improve process security. Operating process analysis includes contract points and resources. The operational process instinctively improves robustness. Again, asset management possibilities matter.

Property inventories are possible. Data security depends on correctly categorizing the object. The main benefit of periodic review and restriction is that acceptable policies are categorized and applied. Innovation improves work. This approach improved the functional process and security measurement system. Data processing is easier when categorized. A simple UI improves ratings. Consider that transparency itself may protect. Disclosure alters workflow briefly. This influence is the most promising. Strategic goals have led to better work methods.

Certain strategies and data are to be incorporated during the asset-handling process. In this case, the asset is handled so that proper data classification is provided. Maintaining a formal record of the authorized asset has been yet another security measurement process; this ensures that the protection form temporary and permanent copies can be made. This case ensures a proper assessment of the constant need for protection for the original data. The data are stored as per the manufactured information, increasing the platform’s robustness. State of the data as per the pre-generated receipt he is properly classifying data, and hence a better section of the business management is performed in the case. Media handling is yet another aspect to be considered in the section. This section includes the likes of preventing the contents from re-using. This section has ensured better management of the restriction in the re-use process. Manufacturing prospects are important in the functioning of full maintenance. Using the cryptographic technique in the process is useful in securing the data being transacted. Data registration has been considered one of the major prospects that provides a better segmentation of business management; this business management process will also benefit the working process. During the disposal community purpose, the main aspect considered in the process is that the sectioning of the sensitive items is performed differently; hence, the audit trial process is used. This audit trail process has increased the robustness of the media disposal process.

Certain issues are considered in the research paper. The issues generally include handling data, assets, and their translation methods. These issues are properly identified, and this identification process helps better section the business management process.

There is, indeed, some wiggle area for development. One area where the man might grow is his ability to provide a more convincing assessment of the job process. The process’s given elimination strategies aid in clarifying both the nature of the problem and its potential outcomes. Certain steps will be taken for proper assessment of the working process. This case includes the likes of adapting cyber security conscious culture. Another prospect considered in the process is that an effective security plan is implemented, and proper coordination will be made. This case ensures that there is a change in the decision-making process. Performing user training and awareness programs will be acting beneficial in these cases. The employees will be getting well aware of the entire wiring process. Another unique aspect of the section is that outsourcing the cyber security process can be performed. The same takes place on performing the outsourcing or the cyber security system updating, and hence the system’s robustness increases (Soe et al., 2019). Hence it is recommendable to outsource the cyber security system.

  1. Reflection of methodology

The Research methodology used in action is also considered; it improves the fact that the operational process gets aware of the requirement and ensures that it has been considered a major process of self-reflection. This introspection has been useful in enhancing the efficiency of the working process. It has been established that there are nine main considerations when conducting research. The productivity of the work process has improved thanks to these nine processes. The initial four steps include data comparison. Comparisons of acquired data with reference data are an integral part of his dating procedure, and as such, the data was crucial to the successful conclusion of the research project. Comparisons of obtained data based on their numerical value are also carried out. Since then, proper comparison measures based on the requirements have also been considered. The primary gain here is enhanced business management. Process evaluation is the method under consideration. The method takes into account the reviews. The improved ability to evaluate the working process is one factor. Better control of the working process is one of the benefits of this method of operation. One of the key reasons the data is kept so precise is that this procedure considers the results of a systematic review. Processing and analyzing source data sets per research needs. Because of the significance placed on the research questions in these articles, the underlying operational methods are effective. After analyzing research questions, the functioning method is one of the most valuable pieces of knowledge. The acquired data show that the operational procedure has been drastically altered; moreover, the collected feature data set is highly authenticated, increasing the data’s significance and usefulness. In order to get a clearer picture of the data segmentation process, I have been conducting a secondary research analysis. However, this has been challenging, as I have found that questions posed in journals are not always relevant to the case study, widening the gap between the two. This case is a crucial step in the research procedure and should be employed to ensure a successful outcome.

Bibliography

DUTTON, W. H., CREESE, S., SHILLER, R., BADA, M. & ROBERTS, T. 2017. Cyber Security Capacity: Does It Matter?

HEMAVATHI, S., NITHIYANANTHAN, K. J. A. I. N. & SCIENCES, A. 2017. Cloud computing and power systems applications an overview. 11118–125.

LIANG, W., LIAO, B., LONG, J., JIANG, Y., PENG, L. J. M. & MICROSYSTEMS 2016. Study on PUF-based secure protection for IC design. 4556–66.

SIGAMANI, R. M. S. 2020. Adoption of Machine Learning With Adaptive Approach for Securing CPS. Handbook of Research on Machine and Deep Learning Applications for Cyber Security. IGI Global.

SOE, Y. N., FENG, Y., SANTOSA, P. I., HARTANTO, R. & SAKURAI, K. A Sequential Scheme for Detecting Cyber Attacks in IoT Environment. 2019 IEEE Intl Conf on Dependable, Autonomic and Secure Computing, Intl Conf on Pervasive Intelligence and Computing, Intl Conf on Cloud and Big Data Computing, Intl Conf on Cyber Science and Technology Congress (DASC/PiCom/CBDCom/CyberSciTech), 2019. IEEE, 238–244.

STANDARD, A. 2015. ISO/IEC 27002. Information technology-security techniques-code of practice for information security controls (AS ISO/IEC 27002: 2015).

 

Don't have time to write this essay on your own?
Use our essay writing service and save your time. We guarantee high quality, on-time delivery and 100% confidentiality. All our papers are written from scratch according to your instructions and are plagiarism free.
Place an order

Cite This Work

To export a reference to this article please select a referencing style below:

APA
MLA
Harvard
Vancouver
Chicago
ASA
IEEE
AMA
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Copy to clipboard
Need a plagiarism free essay written by an educator?
Order it today

Popular Essay Topics