Sign In
Not register? Register Now!
Pages:
5 pages/β‰ˆ1375 words
Sources:
4 Sources
Style:
APA
Subject:
Management
Type:
Essay
Language:
English (U.S.)
Document:
MS Word
Date:
Total cost:
$ 24.3
Topic:

Security Investment in Small Business and Decision-Making Process of Risk Management

Essay Instructions:

Instructions
Answer the following questions:
1. What would be effective results of a security investment for small business and how does it compare to large corporations? Should it include important concepts from government and public/private sectors?
2. Should external stakeholders been involved in decision-making process of risk management plans? Explain how various decisions makers have different responsibilities and necessities for the inputs and outputs within an organization?
3. What are some of the key roles and responsibilities of government, industry, academia, and other non-governmental organizations with respect to critical infrastructure risk?
Technical Requirements
. Your paper must be at a minimum of 5pages, with each question being at least 1-2 pages ( the Title and Reference pages do not count towards the minimum limit ).
. Use headings to differentiate each answer.
. Scholarly and credible references should be used. A good rule of thumb is at least 2 scholarly sources per page of content. Scholarly sources include peer reviewed articles, government publications, and academic texts.
. Type in Times New Roman, 12 point and double space.
. Students will follow the current APA style as the sole citation and reference style used in written work submitted as part of coursework.
. Points will be deducted for the use of Wikipedia or encyclopedic type sources. It is highly advised to utilize books, peer-reviewed journals, articles, archived documents, etc.
. All submission will be graded using the assignment rubric.

Essay Sample Content Preview:

Security Risk Management
Student’s Name
Professor’s Name
Institutional Affiliations
Course Name and Number
Due Date
Security Risk Management
Effective Results of a Security Investment for Small Business and How It Compares to Large Corporations
The digitization of businesses presents diverse opportunities and risks that require all firms to invest in appropriate security measures irrespective of their size. Lloyd (2020) reveals the fundamental nature of cyber security for SMEs because of the increasing internal and external threats that could trigger data breaches, operation disruption, or prompt expensive regulatory fines. Ursillo and Arnold (2019) also acknowledge that large corporations and SMEs require appropriate security investments, with the variation occurring in the complexity and size of the financing. This consideration is critical because it facilitates uninterrupted innovations and protects sensitive business and customer data.
Integrating an appropriate security program in an SME enables the firm to focus on innovations, leading to revenue generation and growth. Failure to implement these initiatives derails progress due to the varied cyber-related attacks. For instance, Lloyd (2020) notes that 71% of senior management interviewed in a Cisco study confessed that they derailed in the innovation niche due to unending concerns about cyber security. Such worries weaken a firm’s productivity, demonstrating the need for security investment. In this context, small and mega-corporations should invest in security approaches to consumer needs. Thus, while the former will consider adequate but less complex methods, the latter uses sophisticated measures. These approaches ensure each enterprise has adequate protection from threats to benefit from business tranquility and spur innovations.
A robust security investment guarantees the protection of sensitive business and customer data. Ursillo and Arnold (2019) emphasize that no business is exempt from data-related breaches. The authors indicate that prioritizing updated and advanced firewalls, anti-phishing and anti-spam software, and malware protection averts potential data breaches. Lloyd (2020) supports this argument by indicating that such strategies enabled businesses to retain their customers and maintain their reputations. The only difference between SMEs and large corporations in this aspect is the level of investment, with the latter investing more resources and expertise because of the large data they handle. However, they all benefit from safety against data breaches when they invest in security.
For SMEs to strategically position themselves as secure institutions, they must borrow critical concepts employed by public/private sectors and the government because of the protection they promote. For instance, Lloyd (2020) highlights the need to embrace a culture of cyber readiness through long-term and sustained investment in the security realm. Such an aspect constitutes integrating IT policies and procedures, policies for system use, and routine hardware and software maintenance to remain updated with emerging security features. These strategies are commonplace in government facilities due to recognizing the ever-changi...
Updated on
Get the Whole Paper!
Not exactly what you need?
Do you need a custom essay? Order right now:

πŸ‘€ Other Visitors are Viewing These APA Essay Samples:

HIRE A WRITER FROM $11.95 / PAGE
ORDER WITH 15% DISCOUNT!