Wednesday, 18 December 2013

Security control measured by its pros and cons



Security is the power or degree of resistance to, or protection from, harm. It applies to any vulnerable and valuable asset which is very much important, such as a person, dwelling, community, nation, or organization or to some esteemed organization.Security details can befound more at our website.

There is a vast subject on the analysis and categorization of work on security. Part of this type ofcause is for this is that, in most security systems, the finding out of the weakest chain is the most important. The situation is very difficult since the protector must cover all points of attack while the attacker needs only to discover a single weak point upon which it needs to concentrate and focus.In the corporate world, various aspects of security were historically addressed separately - notably by distinct and often non communicating departments for IT security, physical security, and fraud prevention.  

In today’s world, there is a greater recognition of the interconnected nature of security requirements, an approach variously known as holistic security, management, and other terms, that we have to deal with.Security risk is mainly the breaking up of risk into a security silo, from the broader enterprise risk management framework for the purposes of isolating and analyzing unique events, calculation of outcomes and consequences.Security risk is often, quantitatively, represented as any event that compromises the assets, operations and objectives of an organization. 

The term event, in the security paradigm, comprises those undertaken by actors intentionally for purposes that adversely affect the organization.Security system controls are the protection measures or countermeasures to avoid, counteract or minimize securityrisks relating to personal property, or computer software. To help review or design security controls, they can be classified by several criteria, for example according to the time that they act, relative to a security incident. Before any incident, prevention controls are intended to prevent any event from occurring e.g. by locking out unauthorized intruders. During any incident, detective controls are intended to identify and characterize an incident in progress e.g. by sounding the intruder alarm and alerting the security guards or police. After the event, corrective controls are intended to limit the extent of any damage caused by the incident e.g. by recovering the organization to normal working status as efficiently as possible.

No comments:

Post a Comment