Вы находитесь на странице: 1из 7

ABSTRACT

This report is based on exploration of several ideas which are related with identifying the
success factors used in organizations for implementation of security in Oman. The plan of
security is to observe in organizations where there is need to implement practices where the
concern of this research is to identify and analyse the factors which are necessary for
successful implementation of information security systems especially in workplaces in Oman.
This study aims to explore several concepts related with maintaining security in workplace
and management of organization so that the potential problems in workplace are handled well
and encourage safe and secure behaviour in workplace over handling the information security
policy which is regarded to be one of the essential measures that helps in identification of the
information assets which have been used to encourage safe and secure work environment in
Oman.
1.0. Introduction

Information is a valuable asset in organization and is considered to have specific, relevant


information which makes up the massive development in protecting the workplace efficiency.
The current global situations in the world state that there is much information to be observed
which is collected, shared, sold and also exchanged in workplace which is done without the
awareness of the owner (Britiz, 2009). This creates a need in workplace that the distributed
information in organization should be secure enough from the natural as well as physical
threats in workplace and organizations are able to define these threats or vulnerabilities in
firms to ensure that there is integrity, confidentiality as well as availability of the mentioned
information in Oman.

Information security in workplace is related with the aspect that comprises of an array of
actions in order to protect the personal information systems in Oman. However, the
information security system does not comprise of the cover information which comprises of
the use of facilities the security system and also the infrastructure needs to be designed in
such a way that it is facilitative in use. This includes the presence of hardware, software,
threats, security physically and the human factors which are one of the essential components
in workplace. The information security system plays an eminent role in handling the
workplace situations in the age of technology. The organization system in Oman should
enable to handle better security concerns in order to stay accessible over handling
information systems. The hardware and software systems have been a major threat over the
physical security of assets and human factors are another emerging component in workplace
scenarios.

This report is based on evaluation of information security concerns which play a major role in
the digital age of technology in Oman. The concern of this essay is to increase the
accessibility of information as there is greater concern over handling the hazards and security
to be strong in workplaces.

2.0. Emerging Technology

The changes in global era have made internet to be accessible everywhere and to everyone
which makes it to be a useful source for handling the online services. The past few years have
revealed that there are many educational as well as information provisions as the sharing
purposes facilitate the business in Oman. The current scenario reveal that the application is
necessary to involve the essentials of daily activities in a community over handling the
services and the community should apply the internet which encourages the use of computer
services and assist in improving the communication and interactions with citizens, business
and ministries (Kraemer-Mbula et al, 2013).

The recent changes in technological revolution have provided impressive opportunities in


different industries with the motive to improve the quality of products and services.
Cybercrime is increasing over the rapid time as the hackers are able to use their skills and
comprise the organizations protection online which has threatened the security and also
boosted vast number of invaluable product developments in Oman. Cybercrime is one of the
major challenges in workplace and this type of activities should be combated with great
intellect as the home and property security as well as technological development is increasing
these activities with an alarming rate in Oman.

ACCESS CONTROL SYSTEMS


The modern access control systems which are being used in workplace are quite complex and
also they are designed for effective workplace and home properties in Oman. The workplace
in Oman access control systems should grant access to properties and the grant access during
the workplace sessions over generating the workplace processes and to analyse the access
controls and to generate the detailed report systems which offer the access to the described
the control system and improve the movement The systems in Oman have installed in such a
way that email to somebody in the workforce in order to leave the doors to be open in
premises. The intelligent systems help to secure the information knowledge which has logged
in effective monitoring skills (Macket et al, 2011).

AUTOMATIC GATE ACCESS


The majority of criminals have the mere opportunities which consider the target to be an easy
option while the security concerns being an intelligent option to be popular and become
technology oriented. This allows to be one of the convenient sources of being popular in
technology use and also to study the homeownership which has allowed job to be more
convenient in handling the security concerns over handling the vehicle identification in Oman
(Martin et al, 2011).

CCTV
There are improved technologies used in CCTV cameras so that criminals have not been
hiding from being recognized in Oman. The pictures have been less grainy while the cameras
have been one of the flexible option and advances in technology have allowed perfection for
people who intend to use CCTV. There are many situations in home and business when
cameras have been installed and converted to CCTC while in many cases the business owners
intend to use the cameras so that they can be more deterrent and make-up for adaptation in
order to validate the essential in avoiding the issues in Oman.

ALARMS
The development in technology across the borders have provided better and cost-effective
alarms which are being used as a wider part of security system in order to implement such
plans and the alarms are a major source to be used as a solution in implementation of security
systems in Oman. The alarms are not able to standalone as a solution while in order to work
effectively there is need to have security solutions so that the alarms act as detection system
in order to monitor the access points. The alarm systems provide 24/7 receiving centre which
operates worldwide and to contact with police and manage the intruders which uses the
traditional approach in order to have a loud local alarm (Choo, 2011).

3.0. Issues and Solutions

Information system faces major security threats which should be handled with care and there
is gap identified between the perception of manager and information systems and security
threats act as countermeasures which are adapted by the firms in order to collect empirical
data in Oman. The analysis of responses suggested that there is scope of handling the
countermeasures which should be adapted and handle the severity over handling the
perceived threat in workplace and manage the protection level and to handle the personnel as
well as administrative issues (Moore, 2010).

The identified threats have been stated to be according to the information systems which
make the assets to be affected and also the categories such as: data, software, hardware,
personnel, administration, physical and network in Oman. There are rough information
presented by the system threats and also the data processing errors, network breakdowns,
viruses and software breakdown and handling the viruses. Viruses are one of the common
threats which damage the information systems in computer. This makes the computer viruses
to be installed in every program and causes major infection.
There are situations when many viruses exist and these viruses exist as follows:

Malicious Codes/programs and backdoors: The malicious codes are associated with virus
(to reproduce the attack done by another program), worm (to offer independent program
which reproduces and copies itself or is from one system to another and usually over a wide
network). Trojan programs are independent program which appear to perform as basic
function so that the unauthorized program hidden inside is handled well in Oman. The
infected machine allows attacker to control the network of machine (Jang-Jaccard et al,
2014). The presence of malicious code causes major security breaches such as jeopardize and
also the presence of information once file gets infected are not easy to handle the corruption
plan in order to be inaccessible in Oman. The Trojan program acts as a major source which
while installing PC allows an intruder to get access to all information in PC and to modify the
information in the PC while the software configuration of a computer should bring change
over intrusions.

Software – The user entrance and log systems and recovery where the multi-user system and
automatic debug approach along with the test and access control in program act as a major
source to handle the modified system over several channels when there is Trojan code in
Oman.

Hardware – The remote monitoring system and surveillance system makes use of entrance
and there is limitation over the uninterruptable power supplies along with difficulty in
periodical disk checking (Shariff, 2009).

Data – The backup data and information systems causes data access control and user access
to follow the right path in logging the information handling procedures where the
management is concerned with removal of media as well as disposal of media in Oman.

Network – the antivirus software encryption and user authentication along with instruction
detection systems and firewalls have been a major issue where the digital signature and
limited time of connection in Oman.

Unsecured Windows file Sharing. – This is one of the major concerns that the File and print
sharing enables a person to have share level access and causing the security concern. The
Windows operating systems have flaws in unsecured windows which should be shred over
exploited intruder and the automated practice where large number of Windows has been
based over the Internet being attacked by the computer system. These tools have been one of
the major issues and flaw which attacks the DOS system and causes Windows to face
difficulty in handling password for sharing the file in Oman.

4.0. Recommendations

The following recommendations should be followed which will help to get a safe and secure
information system:

1. There should be spa, and virus protection services used and a Web filter as well as
endpoint security to be handled well in Oman
2. The password systems should be changed frequently and the password should be
changed regularly so that it will stay safe from intruders in Oman
3. The password should be stronger and there is need to use upper and lower case letters
which will be done by use of symbols and numbers to handle it in a better manner
which will be difficult to guess by others.
4. There should be different types of passwords used which will help to maintain the
outline in safer manner (Jewkes et al, 2013)
5. There should be no TMI used on social media and also the arm hackers with the
detailed information and to have social engineer to manage the past security concerns.
The information systems and sales of security while connection with friends
especially on Facebook should be protected in Oman
6. There should be periodic tests conducted in order to test the security concerns. There
should be professional firm used for conducted in order to manage the security audit
while this should always handle the workplace security and password needs to be
tested over the ambiguous work environment and handle it with high degree of
intellect in Oman.

3.0. Conclusion

The information security concerns are increasing while the password handling is not easy and
file sharing is something not to access the protected shared driving in Oman. The presence of
password and first character have caused major problem and also there is need to handle the
issue and special program should be written with ease and manage the exploited problem
which already have been circulating over internet and many abuses are by intruders
worldwide in Oman. The emerging trends in network security threats is one of the leading
problems and should be exercised over the increasing need for pro-active situations and use
intrusion and prevention system which has the capacity to handle the work capabilities in
Oman. The goal of security program is to help use cost effective measures in order to
overcome the situation with high degree of intellect.

References

Britz, M.T., 2009. Computer Forensics and Cyber Crime: An Introduction, 2/E. Pearson
Education India.

Choo, K.K.R., 2011. The cyber threat landscape: Challenges and future research
directions. Computers & Security, 30(8), pp.719-731.

Jang-Jaccard, J. and Nepal, S., 2014. A survey of emerging threats in cybersecurity. Journal


of Computer and System Sciences, 80(5), pp.973-993.

Jewkes, Y. and Yar, M. eds., 2013. Handbook of Internet crime. Routledge.

Kraemer-Mbula, E., Tang, P. and Rush, H., 2013. The cybercrime ecosystem: Online
innovation in the shadows?. Technological Forecasting and Social Change, 80(3), pp.541-
555.

Mackey, T.K. and Liang, B.A., 2011. The global counterfeit drug trade: patient safety and
public health risks. Journal of pharmaceutical sciences, 100(11), pp.4571-4579.

Martin, N. and Rice, J., 2011. Cybercrime: Understanding and addressing the concerns of
stakeholders. Computers & Security, 30(8), pp.803-814.

Moore, R., 2010. Cybercrime: Investigating high-technology computer crime. Routledge.

Shariff, S., 2009. Confronting Cyber-Bullying: What Schools Need to Know to Control


Misconduct and Avoid Legal Consequences. Cambridge University Press. 32 Avenue of the
Americas, New York, NY 10013.

Вам также может понравиться