Compound Security Strategy (CSS)

August 27, 2015 | Views: 1146

Begin Learning Cyber Security for FREE Now!

FREE REGISTRATIONAlready a Member Login Here

Using the socratic method « knowledge is inside you », we will make this course not as a outpouring of knowledge but a process of queries and inquiries that lead to answers through the power of imagination and intuition. Think and grow wise thus unquoting Napoeleon HILL.

Any effective CSS must have these very three interrelated elements :
Each person much show a certin amount of dedication to the good of the company to abide by laws and regulations pertaining to security
Sense of belonging or ownership
The more people who have the ownership of an entity or have the sense of belonging for an entity( stock options, shares, bonds…) , the more people will be willing to sacrifice to make the entity move ahead
The more people are motivated (reward, award, sanctions) to dedicate their skills , time and energy for an entity the more the entity will move safely forward in security or adversely move backward.

1. Management
There is a need to have a management that has the necessary attention and quality to work for the good of the company, to make room, to abide fully and be fully aware of the necessary security measures that must be implemented and ensure that those measures are duly implemented without fear or favor.

2. Rank and file
The must be a set of policies and procedures to help each and every staffer of the entity to get promoted, to be given responsibility within the system and be acknowledged in whatever steps taken to make the company better and more secure.
The must be a culture of healthy competition for the advancement of the entity. And steps must be taken to empower whoever want to make the entity better.

3. Structure
Due measures and actions should be taken regarding the safety and security of the building sheltering and safeguarding the other assets of the entity. Due procedures must be followed in having multiple security access points and to prevent the single point of failure threat ( building (hot site, cold site warm site) hvac system.

4. Data (back ups system(full, incremental, differential, copy )) the back up must follow the criteria of best method , available technology , qualitative technology and best cost and quality ratio.

5. Control
There is a need of a certain amount of control that allows creativity

6. Think tank
Everybody should be encouraged to have disruptive creative thinking

7. Training (initial, ongoing ,differential, creative)
There is a need for continuous and constant training of the company staff at all levels to keep up with the security current standards. The training is scheduled based on ( availability quality and cost of training called for)
(minimum IT, communication, management, kaizen skills required for the rank and files, Basic social engineering phishing, Basic smartphones, pc, ipad, iphone usage, CCTV, HVAC )

8. Work and life balance
Never work the work that is not needed
Never live the life that is not worth Glabrio glass

9. Self –awareness
What is self awareness ? That is the question.

Share with Friends
Use Cybytes and
Tip the Author!
Share with Friends
Ready to share your knowledge and expertise?
Comment on This

You must be logged in to post a comment.

Our Revolution

We believe Cyber Security training should be free, for everyone, FOREVER. Everyone, everywhere, deserves the OPPORTUNITY to learn, begin and grow a career in this fascinating field. Therefore, Cybrary is a free community where people, companies and training come together to give everyone the ability to collaborate in an open source way that is revolutionizing the cyber security educational experience.

Support Cybrary

Donate Here to Get This Month's Donor Badge


We recommend always using caution when following any link

Are you sure you want to continue?