1,776
25
Proposal Essay, 2 pages (450 words)

Good security plan and implementation memo research proposal example

Return On Investment (ROI)This is the expected return under a normal network state. ROI (Gain by investing – Cost of investing)/ Cost of the InvestmentROI = ($40, 000 – $25, 700) / $25, 700 * 100% = 55. 64%Retina scanners This is a security technology that uses the iris scan technique, to scans for retina properties of desired individuals. It does this by scanning on unique eye properties such as the eye properties, and blood vessels, which are is registered on that particular device. It scans using light and is commonly used for identification and authentication purposes (Newman, 2010). Return on InvestmentAccess control device CostIris recognition access control system $15, 000Deployment cost $1000This is the expected return under normal access to premisesROI (Gain by investing – Cost of investing)/ Cost of the InvestmentROI = ($20, 000 – $16, 000) / $16, 000 * 100% = 25%Smartcards These are smart cards, of relative size to an ATM or credit card that is used to store security data as pertains access to a given place. It contains some metallic component that contains data of an individual, in which the individual taps on an access device, reads the information and grants or denies the person access to the premises (Honey, 2000).
Return On InvestmentAccess control device CostSmart card access control system $10, 000Deployment cost $2000This is the expected return under normal access to premisesROI (Gain by investing – Cost of investing)/ Cost of the InvestmentROI = ($20, 000 – $12, 000) / $12, 000 = $66. 67%

Significant sizes in terms of the role played by the security devices

Risk mitigation: This is an approach that is used to manage the likelihood and impact of future related risks (Menoni & Margottini, 2011). This is achieved by carrying out a study on the current situation, and including the missing items in order to contain any future potential hazard. In order to mitigate the risks, the security department will update the Chief Information Officer on the progress of the deployed devices. This will facilitate internal reviews aimed at finding vulnerabilities, upon assessment in order to prevent potential network breaches. Barriers to success These are factors that may hinder the success of the planned inclusion and deployment of these security technologies. These factors will hinder the success in the adoption of these gadgets, especially when it is internal. When an organization is not fully involved and committed to the technologies. There are inadequate funds set aside, annually to review all security measures, technologies in order to facilitate upgrades, in case of inefficiency.

References

Honey, G. (2000). Electronic access control. Oxford: Newnes.
Komar, B., Beekelaar, R., & Wettern, J. (2003). Firewalls for dummies. New York: Wiley Pub.
Menoni, S., & Margottini, C. (2011). Inside risk: A strategy for sustainable risk mitigation. Milan: Springer.
Newman, R. (2010). Security and access control using biometric technologies. Boston, Mass: Course Technology.
Friedlob, G. T., & Plewa, F. J. (1996). Understanding return on investment. New York: Wiley.

Thank's for Your Vote!
Good security plan and implementation memo research proposal example. Page 1
Good security plan and implementation memo research proposal example. Page 2
Good security plan and implementation memo research proposal example. Page 3
Good security plan and implementation memo research proposal example. Page 4

This work, titled "Good security plan and implementation memo research proposal example" was written and willingly shared by a fellow student. This sample can be utilized as a research and reference resource to aid in the writing of your own work. Any use of the work that does not include an appropriate citation is banned.

If you are the owner of this work and don’t want it to be published on AssignBuster, request its removal.

Request Removal
Cite this Proposal Essay

References

AssignBuster. (2021) 'Good security plan and implementation memo research proposal example'. 14 November.

Reference

AssignBuster. (2021, November 14). Good security plan and implementation memo research proposal example. Retrieved from https://assignbuster.com/good-security-plan-and-implementation-memo-research-proposal-example/

References

AssignBuster. 2021. "Good security plan and implementation memo research proposal example." November 14, 2021. https://assignbuster.com/good-security-plan-and-implementation-memo-research-proposal-example/.

1. AssignBuster. "Good security plan and implementation memo research proposal example." November 14, 2021. https://assignbuster.com/good-security-plan-and-implementation-memo-research-proposal-example/.


Bibliography


AssignBuster. "Good security plan and implementation memo research proposal example." November 14, 2021. https://assignbuster.com/good-security-plan-and-implementation-memo-research-proposal-example/.

Work Cited

"Good security plan and implementation memo research proposal example." AssignBuster, 14 Nov. 2021, assignbuster.com/good-security-plan-and-implementation-memo-research-proposal-example/.

Get in Touch

Please, let us know if you have any ideas on improving Good security plan and implementation memo research proposal example, or our service. We will be happy to hear what you think: [email protected]