Lea Paliwanag
Lea Paliwanag
Lea Paliwanag
This component focuses sa pag identify at pag aasses ng mga potential threats,
vulnerabilities, and security risks that could impact the organization’s operations, assets,
or personnel. Kabilang dito ang pagsasagawa ng comprehensive risk assessments
upang ievaluate ang likelihood and potential impact of various threats, including natural
disasters, technological failures, security breaches, or other disruptive events.
4. The strategic
Mayroon tayong ability to lead ourselves, our teams and our
organizations, in a way that advances the organizations missions and
goals and creates advantage for the long term.
5. Long term objectives of the organization
Usually include specific improvements in the organization’s competitive
position, technology leadership, profitability, return on investment,
employee relations and productivity, and corporate image.
CONTROL
This component involves implementing controls and measures to mitigate identified
risks and vulnerabilities and enhance the organization’s resilience to potential threats.
Yan ay Safeguards designed to protect against identified risks and ensure the
organization’s ability to continue operating effectively.
Security controls are measures or safeguards implemented to manage and mitigate
security risks and protect assets, information, and resources from unauthorized access,
misuse, or harm. Ang controls ay essential component of any security management
system and are designed to enforce security policies, reduce vulnerabilities, and
enhance the overall security posture of an organization.
Organizations can establish a comprehensive security framework to protect against a
wide range of security threats and risks. These controls should be tailored to the
specific needs, risks, and regulatory requirements of the organization and regularly
reviewed and updated to address emerging threats and vulnerabilities.
Ilan sa example of security control ay
Physical protection measures kagaya ng light, fences, CCtV, barriers etc
Then introduction of security procedures like ID checking, access control, mail
screening etc.
Next is intelligence networking like local social/political leaders or intelligence providers
Then electronic security like encryption, password protection at iba pa.
Resourcing include security personnel, equipment etc.
Lastly integration or corporate social responsibility programs