Module 7 - Corporate Security Management

OBJECTIVES:

The objective of this module is to introduce students to the basic concepts of managing a corporate level security pro¬gram, including planning and implementation. All students should know at least a few of the basic methods included here.

LEARNING OBJECTIVES:

Upon completion of this module, the student should be able to:

  • Identify the objectives of developing a corporate security program.
  • Identify the major components of a corporate security plan.
  • Identify the responsibilities of different levels of the corporate structure for a corporate security plan.
  • Discuss the security considerations of computer connectivity and different organizational structures.
  • Identify the rationale for risk analysis.
  • Define contingency planning and describe its place in corporate security management.
  • List and discuss the legal issues associated with corporate security management.
  • Define system validation and verification.
  • Discuss the role of the Information systems audit function and how it fits into corporate security management.

PREREQUISITES

Students should have completed the following classes or their equivalent. Principles of Management, Organizational Behavior, and Introduction to Computer Information Systems. Business Policy would be of benefit either as a pre- or as a co-requisite.

Topic Outline: Corporate Security Management

  1. Overview

    1 Hour
  2. Development Of Security Program

    3 Hours
    1. Objectives
    2. Policies
    3. Connectivity, Corporate Structure, And Security
      1. Connectivity Defined
      2. Affect On Corporate Structure
      3. Security Considerations
    4. Plans
    5. Responsibilities
  3. Risk Analysis

    2 Hour
  4. Contingency Planning

    3 Hour
  5. Legal Issues For Managers

    1 Hour
    1. Licenses
    2. Fraud/Misuse
    3. Privacy
    4. Copyright
    5. Trade Secrets
    6. Employee Agreements
  6. System Validation & Verification (Accreditation)

    1 Hour
  7. Information Systems Audit

    1 Hour
  8. Computer Security Checklist

    5 Hours
    1. General Information
    2. General Security
    3. Fire Risk And Water Damage Analysis
    4. Air Conditioning Systems
    5. Electrical System
    6. Natural Disasters
    7. Backup Systems
    8. Access Control
    9. System Utilization
    10. System Operation
    11. Software
    12. Hardware
    13. File Security
    14. Data File Standards
    15. Shared Resource Systems Security