MBA Alumni | MBA Students | MBA Aspirants | MBA Forums
--- MBA Home ---

CoolAvenues.com

offers
Advertising
Services

on the web  
 

Home     |    MBA Jobs      |     Knowledge Zone      |     Seminars      |     Placement Report      |     Admission Alert       |     café     |     Search

Technology Management | Enterprise Security Consultancy Market in India

Technology @ Knowledge Zone

 Home

 Knowledge Zone Home

 General Management

 Finance

 Marketing

 Human Resource

 System

 Operations

 Knowledge Seminar

 MBA Forums
 Search
 Join e-Communities
 Be a CoolAssociate
 Give Suggestions

 Company Search
 
 

Subscribe:
Seminar & MDP Alert
   To keep yourself updated with the latest Seminars & MDP happenings in the country, join Knowledge Seminar& MDP mailing lists.


Latest Management Discussion on CoolAvenues Forums



Enterprise Security Consultancy Market in India

by Prasun Goel *

Previous

Page - 3

Type of Security Problem No. of cases Percentage
  Equipment Misuse 23   31  
  Virus 17   23  
  Denial of Service 13   17  
  Unauthorized Access 10   13  
  System Penetration 4   5  
  Financial Fraud 2   3  
  Insider Abuse 2   3   
  Sabotage 2   3  
  Theft of Proprietary Information 2   3  
  Total 75   100  

Major Recommendations

  • Organizations need to train their employees to reduce problems arising out of Equipment misuse.

  • Antivirus / Firewall solutions should be updated regularly.

  • Acts of sabotage, frauds , information theft could be guarded only if proper Security Solutions are in place.

  • Enterprise Security Policy

    A well-planned security policy can control the chance of any security lapse considerably. In India today, even though most corporates are aware of the security issues, many of them do not have a formal security policy and do not provide any training or education on security policies to their employees. Organizations need to adopt effective Security Policies to fortify their information systems. An effective security policy needs to have some significant forward-looking policy directives, which will ensure a foolproof security planning. It needs to be a formal document, which clearly delineates areas of responsibility amongst the staff. It needs to provision for appropriate training of employees to make sure that the system remains foolproof and optimally tuned. Further, it needs to be constantly tested, upgraded and reviewed-so that it stays in line with the changing environmental dynamics. Implementation of the security policy leads to deployment of security solutions.

    Information Security begins with Vulnerability Scanning/Risk Assessment. An organization will form its security policy after analyzing the reports generated through system audits. While drafting a policy every enterprise will have its own security priorities largely based on its operating environment, requirements and perceived threats.

    Next


    * Contributed by: -
    Prasun Goel,
    PGDM (2nd Year)
    Symbiosis Centre for Management and Human Resource Development,
    SCMHRD, Pune


    Post Your Comments       |       E-mail to Friend       |       Want to Contribute

    Send this E-mail this Article

     

    MBA Jobs
    MBA Preparation
    B-Schools
    MBA Forums
    About CoolAvenues
    Senior Mgmt Jobs CAT / MAT/ CET Dean talk CAT Preparation Post a Job
    Finance Jobs Admission Alert B-School Profile Executive MBA Advertise with Us
    Marketing Jobs MBA Insider B-School Diary Career Help Contact us
    HR MBA Jobs MBA Admission Process Summer GMAT Privacy
    Operations MBA Jobs English Preparation MBA News Companies Copyrights
    IT MBA Jobs MBA Abroad MBA Events B-Schools About CoolAenues
    Consulting MBA Jobs CAT / MAT / CET test papers MBA Placements Summer Guidance
    Resume Design Tips MBA in India Summers Guide Classifieds

    © All Copyrights exclusive with Zebra Networks
    Part or full of the contents can not be published, copied or reproduced
    in any form without the prior written exclusive permission of Zebra Networks. Pls refer to CoolAvenues Copyright section.