Get Instant Help From 5000+ Experts For
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing:Proofread your work by experts and improve grade at Lowest cost

And Improve Your Grades
myassignmenthelp.com
loader
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Guaranteed Higher Grade!
Free Quote
wave

Importance of Security Plan in Securing Information Technology Environments

Question:

Discuss about The Fundamentals Of Information Securities.

A security plan of a system is the planning of any system for their security. It is a proposed plan that helps in the protection and management of the information system. This security plan even helps in creation of the security policy for any particular organization (Rhodes-Ousley 2013). The information technology environment or the organization gets utmost advantages or security for their organization. This security plan of the system is a specific formal plan, which eventually defines the activity plan for securing the information system or computer. It gives a proper and systematic approach for the protection of systems from being utilized by any kind of hackers or unauthorized users (Peltier 2016). Moreover, this plan even helps in securing from virus attacks, spoofing attack and sniffing attacks.

The following report outlines a brief description on the entire concept of security plan. An international retailer of supermarket has made a four level supermarket in Singapore. The head of Asia has hired a security expert for the super market (Vacca 2012). This report describes about a security plan that is practical, logical, rational as well as cost effective in nature. Probable causes for the threats in security of an organization and recommended measures are also given here. 

A popular or famous international retailer of supermarkets has made a supermarket. It is of four levels and it is assumed that it will remain open for twenty four hours in a day. The entire construction of the building is completed and now the project team is thinking of completing the cables, fittings and the infrastructure (Crossler et al. 2013). The Head of Asia operations in the main management of the supermarket in Singapore. However, he is not sure of the security plan of the supermarket. He have hired a security lead for the security operations in the supermarket and the security expert will have to make a plan for the security system. The supermarket is supposed to start in next three months.

The purpose of the security plan of the supermarket is to produce proper security to the information system and infrastructure of the supermarket (Andress 2014). The main aim is to provide significant and good security to all the persons working and the customers present. 

The security systems are the most important part of the entire security plan of the supermarket. These security systems are responsible for the perfect security of the infrastructure as well as the information systems present in the supermarket (Kroenke and Boyle 2015). The security systems of the supermarket are as follows:

Security Plan for a 4-level International Supermarket in Singapore

i) CCTV: The Closed Circuit Television or simply CCTV is the most basic, essential and the simplest form of security of any building, office, supermarket and house. Popularly known as the video surveillance, it is utilized for the security of any building (Aloul et al. 2012). This Closed Circuit Television or CCTV captures the video of all situations with clear sound. It helps in the prevention of any intruder to the building, where CCTV cameras are installed. It transmits a proper signal to any particular place, within a set of restricted number of monitors. A person who will be sitting in the security or the surveillance room, will be checking the complete video from the cameras (Chou 2013). This will be the best security system for the supermarket in Singapore. Moreover these are extremely cheap and easy to implement and thus the cost of the plan will not be exceeded.

ii) Intrusion Alarms: This is the second best security system for any supermarket. Intrusion alarms help in the detection of any intrusion in any building (Fragkiadakis, Tragos and Askoxylakis 2013). If anything is burning inside the building, an automatic alarm rings up and all the persons present in the building are alarmed. Moreover, this intrusion alarm also helps in detecting any type of policy violation. There is an inbuilt software that is present within the intrusion alarm and if anything is detected in the security policy, an intrusion alarm automatically blows up and all the persons are alarmed from this (Rhodes-Ousley 2013). Moreover, the security officers present in the surveillance room, check through the CCTV cameras and if they find out any type of threat they ring the intrusion alarms and notifies the other persons.

iii) Armed Security Guards: This is the third best way of securing any supermarket. The security guards with arms in the hand will be extremely secure for the supermarket in Singapore. The supermarket should have proper-trained security guards with arms (Kayworth and Whitten 2012). They will have the responsibility of the entire security of the supermarket. 

Maintenance and testing is the final part of any security plan. The entire plan is the responsibility of the security lead and security expert. The security systems should be eventually supported by all possible means of security (Aloul et al. 2012). All the information systems and security systems should be maintained with utmost security. The equipments of the security system should be updated monthly and should be checked regularly. This maintenance and testing are done with utmost care and a special security expert should be hired for this testing. His responsibility will be checking the versions of the systems and update them systematically and also test the new systems that are proposed by the security lead of the supermarket (Chou 2013). Moreover, regular maintenance and testing helps in reducing the regular problems in the security systems and thus changing of the security system is not required. This in turn, makes the entire plan extremely cost effective in nature.

Probable Causes for Security Threats and Recommended Measures

This entire above mentioned security plan will be extremely helpful for the security system of the supermarket in Singapore as it will be practical, logical, rational and cost effective.

The supermarket in Singapore can have various security threat or problems within it. The security systems should be protected in such a way that no intrusion can occur in their security system and information system (Rhodes-Ousley 2013). The probable causes of the security threats in any organization are as follows:

i) Intrusion: This is the most basic and significant cause for security threats in supermarket (Papp, Ma and Buttyan 2015). Intrusion here means the unauthorized access or unauthorized entry to the security system of the supermarket.

ii) Virus Attacks: This is the most vulnerable attack for any type of information system or security system for the supermarket (Chou 2013). These virus attacks are responsible for the vulnerabilities of the information system.

iii) Spoofing: This is the third probable cause for the security threat in the systems. Spoofing attacks occur when a malicious party takes the name of an authorized user and acts as him (Fragkiadakis, Tragos and Askoxylakis 2013). All the confidential data or information is lost due to this and thus security system is under stake. 

There are various ways for securing or preventing the losses of the security system. The measures for preventing the losses of the security system are as follows:

i) Establishment of Passwords: Strong passwords can usually secure the entire security plan or the information systems of the supermarket in Singapore (Kayworth and Whitten 2012). The passwords should be changed in smaller span of time and thus this cannot be easily hacked by the hackers or intruders.

ii) Firewalls: Strong firewalls are another important measure for securing the security systems or information systems of the supermarket (Aljawarneh 2012). The firewalls can easily detect and prevent any type of vulnerability or threat and thus the security system will be protected.

iii) Antivirus: Installation of antivirus programs is the third probable measure for any type of vulnerability or virus attacks (Papp, Ma and Buttyan 2015). Antivirus programs are extremely essential for any security systems.

iv) Regular Updates: The programs should be updated regularly and this regular updates will secure the systems with latest technologies.

The above mentioned measures are extremely useful and necessary for the supermarket in Singapore and can be easily undertaken without any complexities.

Conclusion

Security Systems for the Supermarket

Therefore, from the above discussion it can be concluded that, security plan is the most important security approach for any particular organization or information technology environment. The security plan is a proper and eventually a basic systematic approach that helps in securing the entire information system of a particular organization. It is initially implemented in the information technology environment of any organization. The security plan is always made by utilizing the security policy of the information technology environment as a specific benchmark. The above report has clearly defined the entire concept of a security plan for any particular organization. In this case, the organization is a supermarket in Singapore. The report has helped to understand the case study of the of a four level supermarket. They have hired a security plan for the successful implementation of the security plan in the organization. The report is the security plan, which is practical, logical, rational and as well as cost effective in nature. As the supermarket is brand new, the security plan is such made that it does not incur huge costs. There are various and several causes or reasons for the security threats in any security plan. These probable causes are also given in the report. Moreover, the report also comprises of all the possible measures that will help in the security of the organization.

References

Aljawarneh, S., 2012. Cloud security engineering: Avoiding security threats the right way. Cloud Comput. Adv. Des. Implementation, Technol., p.147.

Aloul, F., Al-Ali, A.R., Al-Dalky, R., Al-Mardini, M. and El-Hajj, W., 2012. Smart grid security: Threats, vulnerabilities and solutions. International Journal of Smart Grid and Clean Energy, 1(1), pp.1-6.

Andress, J., 2014. The basics of information security: understanding the fundamentals of InfoSec in theory and practice. Syngress.

Chou, T.S., 2013. Security threats on cloud computing vulnerabilities. International Journal of Computer Science & Information Technology, 5(3), p.79.

Crossler, R.E., Johnston, A.C., Lowry, P.B., Hu, Q., Warkentin, M. and Baskerville, R., 2013. Future directions for behavioral information security research. computers & security, 32, pp.90-101.

Fragkiadakis, A.G., Tragos, E.Z. and Askoxylakis, I.G., 2013. A survey on security threats Management and detection techniques in cognitive radio networks. IEEE Communications Surveys & Tutorials, 15(1), pp.428-445.

Kayworth, T. and Whitten, D., 2012. Effective information security requires a balance of social and technology factors.

Kroenke, D.M. and Boyle, R.J., 2015. Using Mis. Prentice Hall Press.

Papp, D., Ma, Z. and Buttyan, L., 2015, July. Embedded systems security: Threats, vulnerabilities, and attack taxonomy. In Privacy, Security and Trust (PST), 2015 13th Annual Conference on (pp. 145-152). IEEE.

Peltier, T.R., 2016. Information Security Policies, Procedures, and Standards: guidelines for effective information security management. CRC Press.

Rhodes-Ousley, M., 2013. Information security: the complete reference. McGraw Hill Education.

Vacca, J.R., 2012. Computer and information security handbook. Newnes.

Cite This Work

To export a reference to this article please select a referencing stye below:

My Assignment Help. (2019). Supermarket Security Plan: Practical, Logical, And Cost-Effective Essay.. Retrieved from https://myassignmenthelp.com/free-samples/the-fundamentals-of-information-securities.

"Supermarket Security Plan: Practical, Logical, And Cost-Effective Essay.." My Assignment Help, 2019, https://myassignmenthelp.com/free-samples/the-fundamentals-of-information-securities.

My Assignment Help (2019) Supermarket Security Plan: Practical, Logical, And Cost-Effective Essay. [Online]. Available from: https://myassignmenthelp.com/free-samples/the-fundamentals-of-information-securities
[Accessed 22 December 2024].

My Assignment Help. 'Supermarket Security Plan: Practical, Logical, And Cost-Effective Essay.' (My Assignment Help, 2019) <https://myassignmenthelp.com/free-samples/the-fundamentals-of-information-securities> accessed 22 December 2024.

My Assignment Help. Supermarket Security Plan: Practical, Logical, And Cost-Effective Essay. [Internet]. My Assignment Help. 2019 [cited 22 December 2024]. Available from: https://myassignmenthelp.com/free-samples/the-fundamentals-of-information-securities.

Get instant help from 5000+ experts for
question

Writing: Get your essay and assignment written from scratch by PhD expert

Rewriting: Paraphrase or rewrite your friend's essay with similar meaning at reduced cost

Editing: Proofread your work by experts and improve grade at Lowest cost

loader
250 words
Phone no. Missing!

Enter phone no. to receive critical updates and urgent messages !

Attach file

Error goes here

Files Missing!

Please upload all relevant files for quick & complete assistance.

Plagiarism checker
Verify originality of an essay
essay
Generate unique essays in a jiffy
Plagiarism checker
Cite sources with ease
support
close