Disciplines
- MLA
- APA
- Master's
- Undergraduate
- High School
- PhD
- Harvard
- Biology
- Art
- Drama
- Movies
- Theatre
- Painting
- Music
- Architecture
- Dance
- Design
- History
- American History
- Asian History
- Literature
- Antique Literature
- American Literature
- Asian Literature
- Classic English Literature
- World Literature
- Creative Writing
- English
- Linguistics
- Law
- Criminal Justice
- Legal Issues
- Ethics
- Philosophy
- Religion
- Theology
- Anthropology
- Archaeology
- Economics
- Tourism
- Political Science
- World Affairs
- Psychology
- Sociology
- African-American Studies
- East European Studies
- Latin-American Studies
- Native-American Studies
- West European Studies
- Family and Consumer Science
- Social Issues
- Women and Gender Studies
- Social Work
- Natural Sciences
- Anatomy
- Zoology
- Ecology
- Chemistry
- Pharmacology
- Earth science
- Geography
- Geology
- Astronomy
- Physics
- Agriculture
- Agricultural Studies
- Computer Science
- Internet
- IT Management
- Web Design
- Mathematics
- Business
- Accounting
- Finance
- Investments
- Logistics
- Trade
- Management
- Marketing
- Engineering and Technology
- Engineering
- Technology
- Aeronautics
- Aviation
- Medicine and Health
- Alternative Medicine
- Healthcare
- Nursing
- Nutrition
- Communications and Media
- Advertising
- Communication Strategies
- Journalism
- Public Relations
- Education
- Educational Theories
- Pedagogy
- Teacher's Career
- Statistics
- Chicago/Turabian
- Nature
- Company Analysis
- Sport
- Paintings
- E-commerce
- Holocaust
- Education Theories
- Fashion
- Shakespeare
- Canadian Studies
- Science
- Food Safety
- Relation of Global Warming and Extreme Weather Condition
Paper Types
- Movie Review
- Essay
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- GCSE Coursework
- Grant Proposal
- Admission Essay
- Annotated Bibliography
- Application Essay
- Article
- Article Critique
- Article Review
- Article Writing
- Assessment
- Book Review
- Business Plan
- Business Proposal
- Capstone Project
- Case Study
- Coursework
- Cover Letter
- Creative Essay
- Dissertation
- Dissertation - Abstract
- Dissertation - Conclusion
- Dissertation - Discussion
- Dissertation - Hypothesis
- Dissertation - Introduction
- Dissertation - Literature
- Dissertation - Methodology
- Dissertation - Results
- Essay
- GCSE Coursework
- Grant Proposal
- Interview
- Lab Report
- Literature Review
- Marketing Plan
- Math Problem
- Movie Analysis
- Movie Review
- Multiple Choice Quiz
- Online Quiz
- Outline
- Personal Statement
- Poem
- Power Point Presentation
- Power Point Presentation With Speaker Notes
- Questionnaire
- Quiz
- Reaction Paper
- Research Paper
- Research Proposal
- Resume
- Speech
- Statistics problem
- SWOT analysis
- Term Paper
- Thesis Paper
- Accounting
- Advertising
- Aeronautics
- African-American Studies
- Agricultural Studies
- Agriculture
- Alternative Medicine
- American History
- American Literature
- Anatomy
- Anthropology
- Antique Literature
- APA
- Archaeology
- Architecture
- Art
- Asian History
- Asian Literature
- Astronomy
- Aviation
- Biology
- Business
- Canadian Studies
- Chemistry
- Chicago/Turabian
- Classic English Literature
- Communication Strategies
- Communications and Media
- Company Analysis
- Computer Science
- Creative Writing
- Criminal Justice
- Dance
- Design
- Drama
- E-commerce
- Earth science
- East European Studies
- Ecology
- Economics
- Education
- Education Theories
- Educational Theories
- Engineering
- Engineering and Technology
- English
- Ethics
- Family and Consumer Science
- Fashion
- Finance
- Food Safety
- Geography
- Geology
- Harvard
- Healthcare
- High School
- History
- Holocaust
- Internet
- Investments
- IT Management
- Journalism
- Latin-American Studies
- Law
- Legal Issues
- Linguistics
- Literature
- Logistics
- Management
- Marketing
- Master's
- Mathematics
- Medicine and Health
- MLA
- Movies
- Music
- Native-American Studies
- Natural Sciences
- Nature
- Nursing
- Nutrition
- Painting
- Paintings
- Pedagogy
- Pharmacology
- PhD
- Philosophy
- Physics
- Political Science
- Psychology
- Public Relations
- Relation of Global Warming and Extreme Weather Condition
- Religion
- Science
- Shakespeare
- Social Issues
- Social Work
- Sociology
- Sport
- Statistics
- Teacher's Career
- Technology
- Theatre
- Theology
- Tourism
- Trade
- Undergraduate
- Web Design
- West European Studies
- Women and Gender Studies
- World Affairs
- World Literature
- Zoology
The Security Training Module Section, Research Paper Example
Hire a Writer for Custom Research Paper
Use 10% Off Discount: "custom10" in 1 Click 👇
You are free to use it as an inspiration or a source for your own work.
Security Training Module
This Security Training Module will incorporate a number of aspects of the security management plan. The module will define all the roles of different personnel incorporated in the security management plan. The unit will also address a number of courses as well as workshops that are necessary in enhancing the security management plan when adopted by the employees. A matrix representing the organization’s training needs will be incorporated to offer a clear analysis of the training dynamics in the corporation in this module.
A training module is a document prepared to sensitize as well as raise awareness concerning an aspect the management of an organization considers being beneficial to be influenced through mobilization. In this instance, EM’s Bakery Limited found it necessary to mobilize its employees on the issue of system security; the company obtains its sales and revenue data on computer systems across different remote areas (Scambray, Shema, & Sima, 2006).
Roles list
System administrator- the system administrator is responsible for all the fixing as well as protection of the network. Moreover, they should be responsible for developing the IP scheme of a new network extension. It is pertinent to note that they should prepare regular reports on the performance of the system. Another responsibility is receiving reports on anomalies of the network.
System developer- this is the person tasked with modification as well as implementation of the different network scheme. They should document the development process of a software or system to be used in the organization. They should develop and integrate virtual firewalls and implement other security measures across the organization’s network.
Administration personnel- they are responsible of verifying the sales revenue report and have an access to the organizations databases.
Personnel working at the point of sales- report changes on order details to their supervisor as well as input sales details.
Clerical supervisors- report any anomalies in the system as well as implement changes in the sales and order databases.
Clerical- the responsibility of the clerical officers is to report any anomalies to the system administrator as noticed in their line of duty. They also input sales and revenue data into the system.
List of courses and workshops
- Securing networks with PIX and ASA
- Basics of network security.
- Information Security awareness
- Fundamentals of system security
- Electronic security
- Digital forensics
- System risk management
Personnel description | ||||
Course required
|
System administrator | Administrators | Clerical supervisors | Clerical staff |
Digital forensic | System risk management | Electronic security | Fundamentals of system security | |
Securing networks with PIX and ASA | Fundamentals of system security
|
Information Security awareness | Information Security awareness | |
System risk management | Fundamentals of system security | |||
Security needs met | Web applications security
|
Security against network vulnerability and scanning tools
|
Operating system security
Intranet security
|
Fundamental information of network attacks to all the employees using the system |
Web server as well as web application server security
|
Collection and preservation of information and evidence concerning digital crimes | Detection of system attacks and other digital crimes
|
||
Investigation and prevention techniques for digital crimes. |
The cross-reference matrix provides a clear visual representation of the different training needs of EM’s Bakery Limited. It is pertinent to note that the organization should match its training needs with the courses and workshops available to employees. There are a number of factors to be put into perspective which include the rank of the employee and the devices they interact with before a course is selected for them (Purser, 2004).
Network security and training needs
The operations of EM’s Bakery Limited form the basis for establishing the training needs of the organization at both the head office and the remote sales sites.
- Operating system security
- Web applications security
- Web server as well as web application server security
- Security against network vulnerability and scanning tools
- Fundamental information of network attacks to all the employees using the system.
- Intranet security
- Understanding the responsibilities across the network on information security
- Detection of system attacks and other digital crimes
- Collection and preservation of information and evidence concerning digital crimes
- Prevention of digital crimes
- Investigation techniques for digital crimes.
These training needs in the organization are necessary because the computer system should be flexible enough to serve the organization on remote locations; it should be secure enough to safeguard the critical information in the system databases. The interdependency of computer systems across different networks is the cause of security challenges in computer systems (Brooks, & Prowse, 2008).
The vulnerabilities and criminal attacks on a computer system can be reduced trough effective training of staff. Information assurance and security fundamentals form the first step of ensuring a secure network. Through the capability maturity and model integration, it is possible to identify which individual qualifies for which course or workshop. The significance of training whilst enhancing the security level in the organization’s computer systems is also identified. The distinct levels of maturity are instrumental in the management as well as optimal utilization of resources (Stallings, 2000).
References
Brooks, C. J., & Prowse, D. L. (2008). CompTIA A+: exams A+ essentials (220-601), 220-602, 220-603, 220-604. Indianapolis, Ind.?: Que Pub..
Purser, S. (2004). A practical guide to managing information security. Boston, MA: Artech House.
Scambray, J., Shema, M., & Sima, C. (2006). Hacking exposed: Web applications (2nd ed.). New York: McGraw-Hill.
Stallings, W. (2000). Network security essentials: applications and standards. Upper Saddle River, NJ: Prentice Hall.
Stuck with your Research Paper?
Get in touch with one of our experts for instant help!
Time is precious
don’t waste it!
writing help!
Plagiarism-free
guarantee
Privacy
guarantee
Secure
checkout
Money back
guarantee