Order for this Paper or similar Assignment Help Service

Fill the order form in 3 easy steps - Less than 5 mins.

Posted: July 1st, 2022

Three Levels of Security Compliance

Three Levels of Security Compliance
Killmeyer, Chapter 6, focuses on 3 levels of security compliance. Develop a 3 page paper covering the importance of this topic as it relates to the 3 security compliance levels:
Level One Compliance – the Component Owner – importance and function.
Level Two Compliance – Audit Function – importance and function.
Level Three Compliance – the Security Team – importance and function

Three Levels of Security Compliance
Level One Compliance – the Component Owner – importance and function.
Organizations have individuals and departments responsible for compliance from the lowest point to the highest. Network and application managers are at the lowest level for observing compliance within any network security sector. They play a very important role by enforcing policies, procedures, and standards that govern the network unit. Security compliance is quite sensitive hence the need for coordinators to focus on each department, business model, and location. Through this, the component owners portray their importance as they focus deeply on the business processes alongside IT compliance to ensure that the network is compliant and users can access the network safely. Coordinators are important since they focus on maintaining continued business for organizations through appropriate access (Killmeyer, 2006). Through the roles they play, they can ensure that user security is held sacred as they are responsible for the network and application operation.
The functions of network and application coordinators are many to ensure that appropriate access is maintained. One of the functions includes ensuring that network and application users within departments are aware of security risks and how to respond to security issues. This is a very important function since most computer users are unaware of what user security entails. It is, therefore, vital to train users from the early stages of what is expected of them while on the network. Moreover, these coordinators are expected to monitor the specific employees with access to ensure that their authority is terminated in case they leave the department. Coordinators also partner with security officers to ensure that they work together to combat security-related matters. The physical layer of networks and applications is as important as the logical layer hence the need to include the security personnel on the ground.

Level Two Compliance – Audit Function – importance and function.
The audit function in compliance is important since it captures internal control features to ensure the functionality of an organization while at the same time observing the necessary laws and procedures. Through the audit function, the processes regarded important by the stakeholders, staff, board of directors, and management are considered. Another importance of this level is that it focuses on the risk assessment of the processes that achieve organizational goals. Moreover, the audit layer also employs the act of monitoring activities through supervision (Killmeyer, 2006). This is important to the success of any organization since some employees may decide to deviate from the required standards and procedures. Maintaining the vitality of the audit function gives an organization the certainty it needs to trust its processes confidently. It is also important since it controls how duties are divide, the protection of assets, and the procedures behind authorization. These important aspects maintain the functionality of an organization since the processes are streamlined and rechecked periodically.
Through the auditing of the computer controls, level two compliance can achieve completeness, accuracy, restricted access, and validity of data. Through completeness, audit functions include checking whether the updated files are correct and complete. All records within the organization need to be up to date and saved in case they are needed. The function of accuracy ensures that the data stored within the files resemble the real transactions that took place. Moreover, the function of restricted access grants authority to specified personnel to control the number and level of individuals accessing a file. The aspect of validity ensures that the data stored is relevant to the client it represents. These are the functions that take place during a level two compliance.

Level Three Compliance – the Security Team – importance and function.
The security team is important to compliance as it takes up the responsibility of ensuring that security is upheld all over the organization. They make sure that the security architecture is observed by considering its policies and regulations. This level is also vital to the technological advancement of an organization as it ensures that the changes made following upgrading systems or integration with emerging tech comply with the interconnecting security agreements (ISA). This level is important because it alleviates the burdens of performing a full assessment of an organization. This is because the security team conducts security audits to the components and makes appropriate changes if necessary (Killmeyer, 2006). Hence, the security team suggests the necessary procedures when implementing new technologies based on their assessment of components. This is important since the security team considers both existing and new technology within an organization.
The functions vital to level three compliance involve the security team liaising with level two and one, reviewing results, and investigating security issues. Through collaboration with coordinators and audit functions, the security team can make more informed decisions regarding the compliance of the information system. Moreover, the results given by the coordinators and audits help the security team understand how effective the security controls in place are. This collaboration is improving the function of level three compliance as they decide on the implementation of policies and procedures. Through assessing the results, they may be able to give reason based on the present policies and procedures. The security team is liable for incidents and breaches in security as they are liable to improve the strengths and weaknesses of the system. It is up to the security team to effect the necessary changes that help prevent or mitigate incidents.

References
Killmeyer, J. (2006). Information Security Architecture: An Integral Approach to Security in the Organisation (p.153-159), 2nd ed. CRC Press

Order | Check Discount

Tags: 150-200 words discussion with a scholarly reference, 200-300 words response to classmate discussion question, 250 word analysis essay, bachelor of nursing assignments, case study, essay bishops website

Assignment Help For You!

Special Offer! Get 20-30% Off on Every Order!

Why Seek Our Custom Writing Services

Every Student Wants Quality and That’s What We Deliver

Graduate Essay Writers

Only the finest writers are selected to be a part of our team, with each possessing specialized knowledge in specific subjects and a background in academic writing..

Affordable Prices

We balance affordability with exceptional writing standards by offering student-friendly prices that are competitive and reasonable compared to other writing services.

100% Plagiarism-Free

We write all our papers from scratch thus 0% similarity index. We scan every final draft before submitting it to a customer.

How it works

When you opt to place an order with Nursing StudyBay, here is what happens:

Fill the Order Form

You will complete our order form, filling in all of the fields and giving us as much instructions detail as possible.

Assignment of Writer

We assess your order and pair it with a custom writer who possesses the specific qualifications for that subject. They then start the research/write from scratch.

Order in Progress and Delivery

You and the assigned writer have direct communication throughout the process. Upon receiving the final draft, you can either approve it or request revisions.

Giving us Feedback (and other options)

We seek to understand your experience. You can also peruse testimonials from other clients. From several options, you can select your preferred writer.

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00