Search icone
Search and publish your papers

Information security system management for Swift Courier Company

Or download with : a doc exchange

About the author

General public

About the document

Published date
documents in English
40 pages
General public
0 times
Validated by
0 Comment
Rate this document
  1. Reason for RFP
  2. Overview of Swift Courier
  3. Contingency planning
  4. Disaster Recovery Plan
  5. Disaster Recovery Team and Responsibilities
  6. Business Continuity Plan
  7. Information Security
  8. The Issuance of the specific security policies (ISSP)
  9. Information Security Awareness
  10. Risk Management

This paper focuses on the information security management of Swift Courier. Swift Courier is a relatively small company deals in courier services involving the delivery of various goods and services. The company is based in Abu Dhabi and has clients across the United Arab Emirates (UAE). The company interfaces with other international couriers to a great extent. It has been providing services that are specifically aimed at filling the existing gap between freight carriers and national packages, as well as unpredictable and local delivery services. Collectively, the company management team has at least 50 years of experience in areas like transportation planning, logistics, operations, routing, as well as the managing mail/postage delivery. They together ensure that clients receive services that creative, professional, and practical. The company's operations managers ensure that they are always close to the customers. They are also available for any issue requiring immediate attention.

[...] He or she should also establish and enforce any other related security policy for the benefit of the company (Alshboul, 2010). The Issuance of the specific security policies (ISSP) Swift Courier will need a number of ISSP. The main ones include: i. SCADA Access allowing only a few IT and management staff ii. Remote access for secure connection iii. Video surveillance to monitor the IT department all time iv. Personal verification that include the use of ID cards to confirm staff identity v. Firewalls to protect all network traffics vi. [...]

[...] One of the risk treatment methods is removing the risk source and ensuring that the cause is properly handled. In addition, the risk can also be taken or increased to pursue another opportunity that may be beneficial to the company. Changing the likelihood and consequences of the risks is also another method of ensuring that the risks are functionally treated and is responsible for ensuring that the company does not face any loss as a result of the risks (Baskerville, 1991). [...]

[...] This officer should report the case to the security office in the IT department, which should then refer to emergency contact list held by the It department. In case another department in the company is affected, it should forward the contact list to the IT department. If this incidence is associated with a threat to a system server of the department, the IT department would have to establish the IP address of the intruder, the name if available, time of access, possible contact information such as address, nature of the access, the device used, its exact location, the way the incidence was detected, and when the access attempt was first detected. [...]

[...] In table 5 above, the order of events has been prioritized, which in the case of Swift Courier, it would be beneficial for its business activities restoration. Swift Courier should start by restoring the business process that have the greatest financial and operational impact Incident Response Plan Incident response plan is typically an organized approach to the management and the addressing of a security attack or breach aftermath. The Swift Courier IT department should essentially has this incident response plan at any cost due to its importance. [...]

[...] The ISMS manager is responsible for ensuring that the methodology applied is up to date to meet the different changes in the systems and the company. The IT division head on the other hand is responsible for approving the methodology that has been drafted by the ISMS manager since the ISMS is under the Information Technology department. The employees provide information for risk assessment as required by the company since they are in most cases working with the systems and monitoring how the systems work Overview of Risk Management Risk management involves the procedures for risk assessment and the risk mitigation methods that are applied by the company. [...]

Similar documents you may be interested in reading.

A closer look at transportation in India

 Business & market   |  Business strategy   |  Term papers   |  03/30/2009   |   .doc   |   25 pages

Examining e - banking

 Economics & finance   |  Finance   |  Term papers   |  04/02/2009   |   .doc   |   33 pages

Top sold for management

Merger and acquisition - Buffett's bid for Media General's newspapers

 Business & market   |  Management   |  Case study   |  12/21/2017   |   .doc   |   21 pages

Case analysis - Ust Inc. Debt Policy

 Business & market   |  Management   |  Case study   |  01/09/2017   |   .doc   |   10 pages