We use cookies to give you the best experience possible. By continuing we’ll assume you’re on board with our cookie policy

Security Measures

essay
The whole doc is available only for registered users OPEN DOC

A limited time offer! Get a custom sample essay written according to your requirements urgent 3h delivery guaranteed

Order Now

When it comes to security and the protection of proprietary and sensitive information, there can be no excuse to not have the best available safeguards in place. Security breaches come in many different shapes and sizes. They can be orchestrated by massive units that aim at breaching sensitive information hubs and leaking that information to the public. An example of a malicious attack would be one committed by the group Anonymous. Defined as “any incident that results in unauthorized access of data, applications, services, networks and/or devices by bypassing their underlying security mechanism”, (Techopedia), a security breach can be internal or external. “Depending on the nature of the incident, a security breach can be anything from low-risk to highly critical”, (Techopedia). Both types of breaches can be just as dangerous and costly and affect a company in the same negative fashion, whether it be an accidental breach or a malicious attack. And both require extensive security measures to protect a company from such breaches.

There are numerous security measures that are already set in place and implemented at First Republic. When we break down the different levels of security, there are numerous fields that utilize different security measures. On the employee level there are absolutely no non-employees allowed on the floors on the Corporate Office. For an employee to gain access they have to wear two identity badges that also serve as their elevator pass and their door pass to their assigned floors. For personal privacy each employee has a desk with two drawers that lock that they are required to keep their personal belongings in and lock when away from their desk. When an employee is hired they are required to sign an addendum to the application stating that they will never divulge any internal information of FRB to anyone ever.

There are severe auditing rules and a strict structure of completion that we pride ourselves on as we are dealing with finances of individuals and companies. FRB has multiple contingency plans in place for each location in the event of a natural disaster or a catastrophe that limits the ability to work from our Corporate Headquarters. The most important safety measure that is employed on a daily basis is the computer software/network protection run by the IT department. It is essential in the line of work that FRB is in that all its devices are equipped with the top of the line anti-virus/hacking protection available. The typical security problems that could arise at FRB are persons attempting to gain access to unauthorized locations.

Or the constant threat of information being leaked or hacked via computer fraud. The control procedures that are already in place are that each and every email that is sent out from an FRB employee is automatically encrypted and the receiver has to navigate to a link via the email to retrieve their information. The ethical dilemmas that are faced when employing certain control mechanisms are that you can’t please everyone. There will always be someone who is negatively affected by a decision and the implementation of that decision. The recommendations that I have are that FRB needs to continue to pursue all forms of computer safety in regards to protecting the gathering and the flow of all internal and external information.

References
Security Breach. Techopedia. Retrieved 06/05/2013 from http://www.techopedia.com/definition/29060/security-breach

Related Topics

We can write a custom essay

According to Your Specific Requirements

Order an essay
Get Access To The Full Essay
icon
300+
Materials Daily
icon
100,000+ Subjects
2000+ Topics
icon
Free Plagiarism
Checker
icon
All Materials
are Cataloged Well

Sorry, but copying text is forbidden on this website. If you need this or any other sample, we can send it to you via email.

By clicking "SEND", you agree to our terms of service and privacy policy. We'll occasionally send you account related and promo emails.
Sorry, but only registered users have full access

How about getting this access
immediately?

Become a member

Your Answer Is Very Helpful For Us
Thank You A Lot!

logo

Emma Taylor

online

Hi there!
Would you like to get such a paper?
How about getting a customized one?

Can't find What you were Looking for?

Get access to our huge, continuously updated knowledge base

The next update will be in:
14 : 59 : 59
Become a Member