Integrating Real Life Cases Into A Security System: Seven Checklists For Managers

Authors

  • Hossein Bidgoli California State University-Bakersfield

Keywords:

Management, Computer, Security System

Abstract

This paper examines seven recent real life cases related to computer and network security breaches, vulnerabilities, and successful security enforcements and then propose seven checklists for managers to consider when designing a security system. The checklists include (1) understanding the landscape of computer and network security, (2) putting together the basic safeguards, (3) identifying security threats, (4) identifying security measures and enforcement, (5) understanding the services of computer emergency response team, (6) preparing a comprehensive security system, and (7) the business continuity planning. If these checklists are followed they should increase the chances of success for designing and implementing a security system.

Downloads

Published

2016-12-06

How to Cite

Bidgoli, H. (2016). Integrating Real Life Cases Into A Security System: Seven Checklists For Managers. American Journal of Management, 16(4). Retrieved from https://mail.articlegateway.com/index.php/AJM/article/view/1860

Issue

Section

Articles