Here is the synopsis of our sample research paper on The Responsibilities of a Chief Security Officer. Have the paper e-mailed to you 24/7/365.
Essay / Research Paper Abstract
This is an 8 page paper that provides an overview of the role of a Chief Security Officer. Using a university as a hypothetical scenario, various aspects of the role are defined. Bibliography lists 6 sources.
Page Count:
8 pages (~225 words per page)
File: KW60_KFlaw014.doc
Buy This Term Paper »
 
Unformatted sample text from the term paper:
at airports, stemming from the shock of the terrorist attacks of September 11, 2001. However, there is another dimension to security that is equally important: cyber-security. As more and more
information, especially information of a vital private and personal nature such as banking information, medical histories, and so on, are stored on electronic devices, the possibility of those electronic devices
being hacked and the information exploited becomes more significant. For this reason, many modern universities have adopted new personnel as Chief Security Officers to manage electronic information security protocols. This
paper presents several dimensions of the responsibilities such officers hold. Plan Overview This section helps the student provide a broad overview of the program that will be
developed. In order to understand how a Chief Security Officer at a modern university would develop a comprehensive program for maintaining the security at that organization, one must understand the
necessary components of such a program. To begin with, it is necessary to recognize that there are three key components of modern security. The first component is deterrence, wherein one
actively works to prevent security breaches from happening in the first place. In the case of computer security issues, this stage of the plan necessarily involves developing an understanding of
recent security breach events at similar institutions, identifying the underlying causes and nature of those events, and then putting into place efforts to eradicate those underlying causes at ones own
institution. The second major component of a comprehensive security program is establishing a process for investigation. It is somewhat inevitable that in spite of the best deterrence policies, some
security-related events will actually occur at some point. When they do, it is critical that they are properly investigated in a timely fashion. Without the right investigation techniques, it is
...