Interviews, background checks, and in the case of non-employee contractors and some employment scenarios, employment contracts are all used to identify new employees and contractors that have minimal risks to information security. An organization’s information security department will work with human resources to develop the policies and guidelines that will assist in the hiring selection process.
The need for Information Security in Hiring
“People are often described as the weakest link in any security system” ("Human Resources Security (ISO 8) - Information Security Guide - Internet2 Wiki", n.d.). This quote sums up the importance of verifying a candidate’s risk level prior to hiring. An organization’s information assets are critical to the organization’s operation and security. In addition to validating a candidate’s legitimacy, the interviewers and hiring managers must be careful to not divulge too much information during the hiring process that may put the organization’s syst...
... middle of paper ...
...cess, information security must be continuously communicated to employees through standard communication channels as well as ongoing training. By using these tools, an organization can prevent the hire of potential threats to its information and physical assets.
Human Resources Security (ISO 8) - Information Security Guide - Internet2 Wiki. (n.d.). Retrieved April 10, 2014, from https://wiki.internet2.edu/confluence/display/itsg2/Human+Resources+Security+(ISO+8)
Nixon, W. B., & Kerr, K. M. (2008). Background screening and investigations: Managing hiring risk from the HR and security perspectives. Amsterdam: Butterworth-Heinemann.
PCI quick reference guide. (2009). Retrieved from https://www.pcisecuritystandards.org/pdfs/pci_ssc_quick_guide.pdf
Whitman, M. E., & Mattord, H. J. (2011). Principles of information security. Boston, Mass: Thomson Course Technology.
Need Writing Help?
Get feedback on grammar, clarity, concision and logic instantly.Check your paper »
- In the scenario, “Diary of a Troubled Onboarding Process”, there needs to be an evaluation and review of how this medical center prepares and welcomes new hires because the process that was outlined in this scenario was ineffective and caused a lot of valuable work time for this new hire. Onboarding is the process of preparing a new hire and their work environment for their new job at your facility, often times there is a pre-start preparation to do list, an orientation that familiarizes the new employee of benefits, policies and standard practices expected from employees and meeting their supervisor, if they have not already done so in the interviewing process.... [tags: preparing the department for new employees]
1163 words (3.3 pages)
- NEW ORIENTATION Slide 3 New hire orientation is a training program provided to all new employees to an organization or new department within an organization. The New hire orientation is the process of providing the employees with the necessary skills, knowledge, and behaviors to effectively transition into their role within the organization. It is important for organizations to provide new hire orientation as it is the foundation for the new employee’s career with in the organization and department.... [tags: Skill, Training, Employment, Practice]
807 words (2.3 pages)
- The responsibility of supervising employees may often prove to be a daunting task. If those being supervised are nurses, who are responsible for the care of vulnerable patients, the task must be managed with a strong knowledge and philosophy of not only nursing, but also the principles of leadership and management. This paper will examine the challenges of a nurse manager who is faced with a problematic new hire as described in case study two. A description of Margaret Johnson, LPN, leaves the impression that she is a marginal employee, who often fails to meet the basic standards of care, is not a team player, and whose behavior is destructive to the unit and potentially dangerous to the pat... [tags: nursing, management, effectiveness, performance]
1622 words (4.6 pages)
- Not only Ashley Madison, but most of the high profile companies reported data breach in recent years. For instance, in March, health care insurance provider Premera Blue Cross reported the hack which had compromised 11 million customer details including financial information such as bank account. Even in the case of Ashley Madison the motivation was different but eventually data, credit card information was compromised. After reviewing the case of Ashley Madison, Here are some of the recommendations gathered from online and text book.... [tags: Computer security, Information security, Security]
723 words (2.1 pages)
- In 2003, I was recruited to setup and lead a new cyber security initiative for the Army Materiel Command (AMC), a 53 Billion dollar year logistics command that serves as the army version of amazon for the army’s current inventory of weapons, supplies and vehicles. AMC, at this time, had over a 100k workforce spread across 140 locations worldwide. During this timeframe, the Department of Defense was still trying to define Cyber Security and mature the process they had in place. DOD was a large target and AMC ranked high due to the research we performed for Army and the DoD.... [tags: Security, Computer security, Information security]
719 words (2.1 pages)
- Introduction The state of the United States today is in many ways similar to what it was following the Vietnam War. Then as is now, there are concerns over the misuse and overreaching of military force. As well, today’s economic dispair mimics that of the inflation that gripped the nation in the 1970’s and 1980’s (Snow, 2014, p. 5). Left unidentified is a comprehensive strategy for United States national security. What are the priorities for American national security today, and how can they effectively be met.... [tags: Viertnam war, national security]
1482 words (4.2 pages)
- The country’s recently heightened airport security measures have become a source of controversy and debate across the Nation. Due to a recent attempted act of terrorism, where a man on an international flight to Detroit attempted to blow up the plane using a bomb, the department of homeland security has taken new measures to ensure national security in the form of new high- tech full-body scans and pat down procedures in airports. The new body scanning machines create images of people without their clothing, and the new pat down procedure is generally considered too personal.... [tags: National Security]
2045 words (5.8 pages)
- Security has been an important component of ensuring the crime remains at a low level. The development of security systems and protection began in England. Due to the social revolution that increased the urbanization of villages, the population increased out of control. The wave of people moving to make a better living only lead to the creation of widespread poverty due to the lack of jobs available many turned to crime. Most of the crime was turned into forceful crime or crime of opportunity. During this time there was no established public security that could control the rapidly increasing crime in the area.... [tags: Security guard, Security, Security police]
1767 words (5 pages)
- The implementation phases seen in figure instead represented a flow of activities in the security program. The security program cycle involves in establishing information security requirements, taming the employee to know their responsibility by the requirements, built the authority structures to ensure Program compliance, and monitor and reporting of growth. This cycle helps in implementing the security program. 4.1 Intentional Goals for Security Program Implementation The goals for security program implementation are as follows Goal 1: Approve, Develop, and Promote of security Collaboration with many organizations will lead to approve, develop and promote the security policies of i... [tags: Security, Information security, Computer security]
2015 words (5.8 pages)
- Denial of service (DoS)- This type of attack occurs when a hacker overloads a server or network device with numerous IMCP (Internet Control Message Protocol) ping requests, such that it is unable to respond to valid requests. By updating to the latest service pack and applying security patches, you can minimize the threat of DoS attacks by reducing the vulnerabilities in the TCP/IP network protocol. Although disabling ICMP can remove valuable troubleshooting tools, it can effectively remove the possibility of DoS attacks.... [tags: Cyber-security, Enterprise Security]
3468 words (9.9 pages)