Essay on Security Communication Plan
Number of words: 1276
Information plays a very critical role in an organization’s management and among. The report gives valuable knowledge since it gets passed to where the information is needed at the required time. When the info is passed effectively to organization members, trust is built amongst the involved individuals in the information transfer. Creating a proper communication plan that guarantees that information is given in an organization is accurate and correct (Romano, 2017) is essential. With an appropriate security method, information retrieval becomes more straightforward. A proper security plan has several benefits to the organization’s wellbeing, with a unified plan as one of the benefits attracted by the organization. As we try making a proper security plan, there are we will carefully examine the sender of the message and the mediums in which they use to convey their information to the recipient. Once the recipient has received the sender’s information, how do they respond to the data since upon receiving information, feedback is expected? This review will also examine the ways through which the recipient chooses to give feedback. Once a proper security plan is established in an organization, it becomes confident that all its sensitive information that wishes not to reach the public is maintained in-house.
First, there are archiving procedures that need to be followed in ensuring secure communication. Organizations have different types of data such as relational, object-relational, or object-oriented, some of which are frequently used, and others rarely used. There is the need to separate the ones that are used frequently and once barely used arises so that they can be stored for use once they are needed; this process aids in ensuring that data that was stored since it was not helpful now is found once its use arises (Romano, 2017). Organizational data is archived in four ways which include pre-processing, writing, deletion, and post-processing. Pre-processing is where any indicator to the specific information is entirely deleted from the system to allow room for data in use. Underwriting, any data that is selected for archiving is written down in the file containing all archived data, such as the UNIX server. Another way is through deletion, where the file containing all the archived written data is first backed up in the organization’s portal as evidence of the archived written document. The backed-up copy is then given an allowance of some days before it is deleted (Silverstone, 2017). Lastly, the Post-processing process is where all secondary indexes for the archived written data are deleted from the FI Document and moved to the QM-Control.
Additionally, the communication process is also a crucial aspect to consider when making a secure communication plan. Communication deals with sending a piece of information received by a recipient who then gives back the feedback to the sender in an organization (Silverstone, 2017). For communication to occur, two parties are involved, which are the sender and the recipient. Information can be communicated through various steps; the first step is through creation. The essential thing in information transmitting is that the sender must be sure about the information they want to be communicated. First, the sender must select the suitable medium for sending the information they intend to send, whether verbal, written, or visual, depending on what they think best suits the information they want to be communicated. Secondly, there is data transmission where the sender identifies how the information they are passing can get to their recipient. If the sender decides to use a written medium, be it a letter, memo, or an advert, they must note down the information and email it or personally hand it to the recipient. The third step is the reception of information, and here the recipient has received the sender’s information. The recipient will only receive the sender’s information according to the sender’s desired medium of transmission. The fourth step is the translation of knowledge; information is obtained, the recipient is now left to analyze the information, either written or orally, delivered by the sender. In this step, the recipient measure of understanding the sent data is gauged, and finally, the response to the information. In this step, the recipient of the information is expected to respond to the information passed from the sender (Silverstone, 2017). The feedback given by the recipient is as per their desired medium between the parties involved, both the sender and recipient. This process of passing information is a two-way traffic where the sender passes the data to a recipient expecting feedback upon receiving and analyzing the message given to the recipient through preferred medium channels by the parties involved.
Furthermore, Legal and regulatory requirements are the required laws that ensure the organization’s information stays without being leaked to the outside party. The rules monitor the flow of data from the sender to the recipient of the data until when the recipient of the information gives feedback to the sender. A safer storage arrangement of the transmitted data from the sender to the recipient and input from the recipient to the sender is determined. How the information shared can be secured is covered by the legal and regulatory requirements. Another aspect is the levels of security in an organization’s informational transfer system and is developed to ensure that immediate action is taken upon receiving a security threat. Organizations use several terms to indicate the magnitude of the danger noted. For example, in case of a failure in the organization’s security, it is treated as a severe risk. Another example is, in case the activities performed do not get successful, the risk is saved as an error in their systems, and in case the system experiences some problems, then a warning message is sent to notify the one using or conveying information in the design. The one using the plan seeks to eliminate errors in or malfunctions so that they can send data to either the recipient or sender then a configuration message is displayed in their systems.
There are two key areas under security that include security message display and conveying the information. Security systems of organizations display various messages to their users. The sender or recipient of the information conveyed gives directional messages to guide the one reading the information conveyed to achieve the intended goal from the use of the system. Security systems also offer confirmational notifications when the information shared confirms their performance action in the design and displaying warning messages to users who use the system without understanding the demands they key into the system. Another message displayed by the security system shows new idea messages to bring to the attention of the additional user information to what the user was interested in. Reframing messages to the users to enable the user to access information that they did not see previously, and also display informational messages to indicated that the user has completed the task required of them (Silverstone, 2017). On the other hand, under conveying the information, the sender is the source of information, who has the desire to transfer the information to the recipient. The sender encodes the data into a symbol that can be understood by the recipient through different channels of communication such as verbal, written, or visual. Once the recipient gets the information, he or she decodes the information into a feedback message that the sender can understand and transfers it back to the sender. In this way, data is securely transferred to members of the organization.
Romano, A. C. (2017). U.S. Patent No. 9,762,404. Washington, DC: U.S. Patent and Trademark Office. Silverstone, R. (Ed.). (2017).
Media, technology and everyday life in Europe: From information to communication. Routledge.