473,583 Members | 2,875 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Why would management prefer poor internal security to professional outsourcing?

1 New Member
Hi,

So im working on this really really annoying essay. I just kind find any sources on the web that explain: "Why would management prefer substandard internal security to professional outsourcing"
I've searched all over the damn net for some sites that might be useful, but i cant find any.

Please please help me, any articles, sites or anything would be very much appreaciated.

thanks in advance,
damebec
Mar 3 '07 #1
3 2902
DeMan
1,806 Top Contributor
I can't point you offhand to any articles, however here are some of my own ideas on the topic....
Substandard Internal security is probably cheaper.
There is a percieved security threat in outsourcing anything (especailly security)
People are probably comfortable/oblivious to the fact tat there internal security is substandard
Management tend to be (yes I know, I;m stereotyping) skeptical (sceptical?) about claims that someone else will do a better job than their own internal people (ironically, they often seem happy to tell their employees the opposite).
Mar 4 '07 #2
sicarie
4,677 Recognized Expert Moderator Specialist
I can't point you offhand to any articles, however here are some of my own ideas on the topic....
Substandard Internal security is probably cheaper.
There is a percieved security threat in outsourcing anything (especailly security)
People are probably comfortable/oblivious to the fact tat there internal security is substandard
Management tend to be (yes I know, I;m stereotyping) skeptical (sceptical?) about claims that someone else will do a better job than their own internal people (ironically, they often seem happy to tell their employees the opposite).
Yeah, a lot of decisions tend to be made around the mindset of a known evil to an unknown evil. You know what you are going to get with internal security, but what if you outsource to the wrong person?

I would also suggest culpability as an outline point - there is someone in the company that they can blame and fire if something goes wrong, whereas with an outsourced security company, there is no control over hiring, over best practice, etc... and while you can refuse to pay and go to another vendor, the person who chose to go to that vendor will most likely be fired... (a high-level firing as opposed to a lower level firing).
Mar 5 '07 #3
AricC
1,892 Recognized Expert Top Contributor
Hi,

So im working on this really really annoying essay. I just kind find any sources on the web that explain: "Why would management prefer substandard internal security to professional outsourcing"
I've searched all over the damn net for some sites that might be useful, but i cant find any.

Please please help me, any articles, sites or anything would be very much appreaciated.

thanks in advance,
damebec
Most likely because outsourcing consultants can be very very very expensive.
Mar 8 '07 #4

Sign in to post your reply or Sign up for a free account.

Similar topics

12
3180
by: jonathan.beckett | last post by:
Hi All, For the past few months I have been working on an open source Apache/PHP/MySQL content management system - and have recently made it available for download. It's still very much a work in progress (current release version is 0.4.6), but you should get a very good idea of what it's about by visiting the site (which uses it,...
0
2301
by: jonathan.beckett | last post by:
Hi All, I have just made version 0.4.8 of the PluggedOut CMS Content Management System available for download - it's free, and covered by the GPL. It's still very much a work in progress (current release version is 0.4.8), but you should get a very good idea of what it's about by visiting the site (which uses it, funnily enough), or...
2
1223
by: John Bailo | last post by:
Are there any Indian companies that specialize in Management Outsourcing where managers would be hired for a few hours a week at low rates to replace costly overpaid managers?
44
4198
by: craig | last post by:
I am wondering if there are some best practices for determining a strategy for using try/catch blocks within an application. My current thoughts are: 1. The code the initiates any high-level user tasks should always be included in a try/catch block that actually handles any exceptions that occur (log the exception, display a message box,...
8
9997
by: Rod | last post by:
I have been working with ASP.NET 1.1 for quite a while now. For some reason, opening some ASP.NET applications we wrote is producing the following error message: "The Web server reported the following error when attempting to create or open the Web project located at the following URL: 'http://localhost/WebApplication1'. 'HTTP/1.1 500...
3
2310
by: Michael Glaesemann | last post by:
Hello all, Recently I've been thinking about different methods of managing users that log into a PostgreSQL-backed application. The users I'm thinking of are not necessarily DBAs: they're application users that really shouldn't even be aware that they are being served by the world's most advanced open source database server. I appreciate...
4
6197
by: jf li | last post by:
I have a Asp.net web application and a Asp.net Web service application. The Web application is using HtmlInputFile to get a 50M size of file selected by end user, read the data of this file and pass the data to the web service. I already modified both web.config files and changed maxRequestLength to 60000(kb). When I debug the upload process,...
4
1832
by: Learner | last post by:
we can download the Management Studio Express for free from MS website. I did the same thing on my personal laptop. But can we develop applications using free downloaded Management Studio and deploy later on with the free stuff at work? Or else may i want to get it off Sql server 2005 that we got when we bought the software.
27
2579
by: Scott | last post by:
I've been trying to come up with a way to ensure user input is coming from the form on my site, and not auto-submitted from elsewhere, and I don't want to use the "enter the code shown in the image" method. I know the $_SERVER contents can be spoofed, so I thought of doing something similar to this: <?php session_start(); $code =...
0
7811
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language...
0
8159
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. ...
0
8185
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the...
1
5689
isladogs
by: isladogs | last post by:
The next Access Europe User Group meeting will be on Wednesday 1 May 2024 starting at 18:00 UK time (6PM UTC+1) and finishing by 19:30 (7.30PM). In this session, we are pleased to welcome a new presenter, Adolph Dupré who will be discussing some powerful techniques for using class modules. He will explain when you may want to use classes...
0
5366
by: conductexam | last post by:
I have .net C# application in which I am extracting data from word file and save it in database particularly. To store word all data as it is I am converting the whole word file firstly in HTML and then checking html paragraph one by one. At the time of converting from word file to html my equations which are in the word document file was convert...
0
3811
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in...
1
2317
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
1
1416
muto222
by: muto222 | last post by:
How can i add a mobile payment intergratation into php mysql website.
0
1147
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.