Free Essay

Security

In:

Submitted By fadil
Words 2837
Pages 12
Pengembalian Dimensi Vertikal Menggunakan Gigi Tiruan Sebagian Akrilik Dan Resin Komposit

(Laporan Kasus)

Sunny Indriani Kurnia (1106125412)

PEMBIMBING : drg. Sitti Fardaniah Sp. Pros (K)

PPDGS Prostodonsia
Fakultas Kedokteran Gigi
Universitas Indonesia
2013
Pendahuluan

Dimensi vertikal merupakan pengukuran vertikal antara dua buah titik pada wajah. Pada individu bergigi, dimensi vertikal oklusi (DVO) ditentukan oleh gigi-gigi yang beroklusi. Oleh karena itu, kehilangan jaringan gigi seperti pada keausan gigi yang menyeluruh akan mempengaruhi DVO, dan pada akhirnya menyebabkan perubahan pada morfologi wajah, fungsi, kenyamanan, dan estetik.1,2,3,4,5

Keausan gigi pada umumnya dapat disebabkan oleh atrisi, abrasi, dan erosi. Atrisi merupakan proses kehilangan jaringan gigi yang melibatkan dua permukaan gigi. Abrasi merupakan proses kehilangan jaringan gigi akibat partikel atau benda yang berkontak dengan gigi. Sedangkan erosi merupakan proses kehilangan gigi akibat larutnya struktur mineral gigi oleh asam. Selain ketiga hal tersebut, keausan gigi dapat diperparah oleh adanya kelainan kongenital seperti amelogenesis imperfekta dan dentinogenesis imperfekta, kebiasaan parafungsional seperti bruxism, dan kehilangan gigi posterior.4,6

Walaupun penurunan DVO sering dijumpai secara klinis, namun penurunan DVO tidak selalu ditemukan pada individu dengan keausan pada jaringan gigi-gigi yang beroklusi karena adanya mekanisme kompensasi dentoalvelolar yang menyebabkan erupsi gigi-gigi yang mengalami keausan. Pengembalian DVO pada kasus keausan gigi yang parah akan sangat menguntungkan untuk dilakukan karena pengembalian DVO dapat memberikan ruang untuk bahan restorasi, meningkatkan estetika gigi, memperbaiki hubungan gigi anterior, memungkinkan terjadinya oklusi fisiologis, dan meminimalisir prosedur klinis yang lebih invasif seperti crown lengthening surgery dan prosedur intentional endodontic.1,2,3,4,5,6

Pengembalian DVO pada umumnya dilakukan untuk memperbaiki tampilan wajah pasien, untuk mencegah kehilangan jaringan gigi lebih lanjut, dan untuk meningkatkan fungsi mastikasi. Perawatan restoratif definitif untuk kasus keausan gigi yang sedang sampai parah pada umumnya dilakukan dengan menggunakan gigi tiruan lepasan dan atau gigi tiruan cekat seperti mahkota tiruan dan gigi tiruan jembatan. Perawatan tersebut pada umumnya cenderung kompleks, sangat invasif, dan memerlukan biaya yang tinggi, sehingga tidak semua pasien sanggup untuk menjalani perawatan.2,3,4,6,7 Penggunaan resin komposit dalam merehabilitasi fungsi dan estetik pada pasien dengan kondisi ronga mulut yang baik, dapat menjadi alternatif restorasi provisional jangka sedang atau panjang dalam merehabilitasi keausan gigi pada pasien dengan sosial ekonomi menegah ke bawah. 6,7
Tinjauan Pustaka

Dimensi Vertikal
Dimensi vertikal (DV) merupakan pengukuran vertikal antara dua buah titik pada wajah. Umumnya kedua buah titik tersebut digambarkan pada hidung dan dagu pasien. Dimensi vertikal dapat dibedakan menjadi dimensi vertikal fisiologis dan DVO. DVO (DVO) diperoleh ketika gigi atas dan bawah berkontak pada posisi interkuspasi maksimum. Sedangkan DV fisiologis diperoleh ketika pasien berada dalam posisi tegak dan dalam kondisi rileks. Pada posisi istirahat fisiologis gigi rahang atas dan rahang bawah tidak berkontak, sehingga menghasilkan jarak yang disebut sebagai interocclusal rest space. Interocclusal rest space umumnya berkisar antara 2 sampai 4 mm, dan diperoleh dari selisih antara DV fisiologis dengan DVO.1,2,3,5

DVO ditentukan oleh pertumbuhan maksila dan mandibula, pertumbuhan tulang alveolar, serta erupsi gigi. Ketiga hal ini merupakan dasar dari kompensasi dentoalveolar yang menyebabkan penurunan DVO tidak selalu ditemukan pada individu dengan keausan gigi-geligi. Mekanisme kompensasi dentoalvelolar memungkinkan erupsi gigi-gigi yang mengalami keausan untuk menyesuaikan oklusi. Namun pada individu tertentu kompensasi dento alveolar tidak seimbang dengan derajat keausan gigi sehingga dapat menyebabkan penurunan DVO pada individu yang bersangkutan. Keausan pada gigi yang menyebabkan penurunan DVO pada akhirnya akan mempengaruhi fungsi, kenyamanan, serta estetik pada pasien. 2,3,5,6,7

Evaluasi DVO
Tidak seluruh pasien dengan keausan gigi akan mengalami penurunan DVO, oleh karena itu penting bagi klinisi untuk melakukan evaluasi terhadap DVO pasien sebelum melakukan perawatan untuk mengembalikan DVO. Evaluasi DVO dapat dilakukan dengan menggunakan berbagai tehnik, antara lain evaluasi fonetik, evaluasi jarak interoklusal, dan evaluasi tampilan wajah pasien.1,4

Evaluasi fonetik dapat dilakukan dengan menerapkan konsep closest speaking space yang dipopulerkan oleh Pound dan Silverman. Metode ini merupakan salah satu cara yang umum digunakan dalam menentukan DVO pada pasien gigi tiruan penuh. Tehnik ini didasari posisi tepi insisal gigi insisif mandibula ketika melafalkan bunyi ‘s’ akan berada 1 mm lebih inferior dan lingual dari tepi insisal gigi insisif maksila. Jarak veretikal yang melebihi 1 mm dapat merupakan indikasi penurunan DVO. Namun hal ini tidak dapat diterapkan pada pasien kelas II dan III Angle.1,4

Pengukuran jarak interoklusal dapat digunakan sebagai metode diagnostik tambahan dan sebagai panduan untuk mengembalikan kehilangan DVO. Metode ini dipopulerkan oleh Niswonger (1934) berdasarkan penelitiannya mengenai interocclusal rest space. Pada metode ini, DVO diperoleh dari selisih DV fisiologis dengan interocclusal rest space (2-4mm).1,4,5

Berkurangnya kontur fasial, menipisnya bibir dan vermillion border, serta menurunnya commisure bibir dapat diasosiasikan dengan over closure akibat penurunan DVO. Namun penurunan kontur fasial dan timbulnya keriput akibat proses menua yang normal dan harus dapat dibedakan dengan penurunan kontur fasial dan timbulnya keriput akibat penurunan DVO.4

Pengembalian DVO pada Rekonstruksi Oklusal
Pengembalian DVO pada umumnya dilakukan untuk memperbaiki tampilan wajah pasien, untuk mencegah kehilangan jaringan gigi lebih lanjut, dan untuk meningkatkan fungsi mastikasi. Perawatan restoratif definitif untuk kasus keausan gigi yang sedang sampai parah pada umumnya dilakukan dengan menggunakan gigi tiruan lepasan dan atau gigi tiruan cekat seperti mahkota tiruan dan gigi tiruan jembatan untuk mengembalikan bentuk dan fungsi gigi (Thongthammachat-Thavornthanasarn 2007).6 Perawatan tersebut pada umumnya cenderung kompleks, sangat invasif, dan memerlukan biaya yang tinggi, sehingga tidak semua pasien sanggup untuk menjalani perawatan dan memilih untuk menunda perawatan. Hal ini menyebabkan keausan gigi semakin parah dan pada akhirnya dapat mengurangi keberhasilan perawatan.

Seiring dengan perkembangan material kedokteran gigi, restorasi konservatif menggunakan direct adhesive restorative material seperti resin komposit dapat dipertimbangkan dalam merehabilitasi keausan gigi. Material dan tehnik perawatan yang terus berkembang memungkinkan rehabilitasi keausan gigi menjadi lebih mudah, lebih terjangkau, dan lebih menarik baik bagi pasien maupun dokter gigi, sehingga perawatan restoratif dapat dilakukan pada tahap awal keausan gigi dan mencegah keausan gigi yang lebih lanjut. Penggunaan resin komposit dalam merehabilitasi fungsi dan estetik pada pasien dengan kondisi ronga mulut yang baik, dapat menjadi pilhan restoratif jangka panjang dalam merehabilitasi keausan gigi karena keberhasilan jangka panjang restorasi menggunakan resin komposit sangat bergantung pada perawatan rongga mulut pasien. Restorasi menggunakan resin komposit pada kasus keausan gigi dapat dikategorikan sebagai restorasi provisional jangka sedang atau panjang pada pasien dengan sosial ekonomi menegah ke bawah. Pada umumnya pasien menunjukkan kepuasaan terhadap restorasi resin komposit dengan perkiraan usia restorasi antara 5-10 tahun (Schimidlin 2009).6,7

Penggunaan resin komposit dalam merehabilitasi keausan gigi memungkinkan pasien untuk memiliki berbagai alternatif perawatan. Pasien dapat mempertahankan dan menjaga restorasi resin komposit, dan seriring dengan berjalannya waktu jika diperlukan dapat dilakukan perbaikan terhadap restorasi yang rusak. Sedangkan pada pasien yang tidak dapat beradaptasi dengan perubahan pada dimensi vertikal atau merasa tidak puas dengan hasil perawatan, maka restorasi dapat disesuaikan, dikurangi, atau dihilangkan. Pasien juga dapat mengganti restorasi dengan mahkota tiruan secara bertahap, sehingga biaya yang dikeluarkan dapat dibagi secara bertahap dibandingkan jika pasien harus membuat seluruh mahkota tiruan dalam waktu yang bersamaan. Alternatif lain yang dimiliki pasien setelah proses adaptasi dengan resin komposit adalah membuat mahkota tiruan pada gigi-gigi yang direstorasi secara bersamaan atau pada salah satu rahang terlebih dahulu.6

Sebelum menggunakan teknik restorasi indirect seperti mahkota tiruan dan gigi tiruan jembatan, penggunaan restorasi resin komposit memungkinkan tersedianya waktu untuk menstabilkan keausan gigi atau ketidakseimbangan pada lingkungan rongga mulut. Pemahaman pasien terhadap kondisi rongga mulut dan pengontrolan yang baik terhadap proses patologis di dalam rongga mulut memungkinkan penggantian restorasi resin komposit dengan restorasi prostodonti cekat definitif jika diperlukan.6

Laporan Kasus

Pasien pria, 33 tahun datang ke Klinik Spesialis Prostodonsia RSGMP FKG UI untuk dibuatkan gigi palsu dengan tujuan untuk memperbaiki penampilan. Pasien belum pernah menggunakan gigi tiruan sebelumnya.

Pemeriksaan Ekstraoral
a. Muka : persegi , simetris
b. Profil : lurus
c. Pupil : sama tinggi
d. Tragus : sama tinggi
e. Hidung : simetris dan bernafas melalui hidung lancar
f. Rima oris : normal
g. Bibir atas : normal tipis simetris
h. Bibir bawah : normal, tipis simetris
i. Kelenjar getah bening
- submandibularis kanan : tidak sakit, tidak teraba
- submandibularis kiri : tidak sakit, tidak teraba
- sublingualis : tidak sakit, tidak teraba
j. Sendi rahang
- kiri : tidak bunyi
- kanan : tidak bunyi
- buka mulut : tidak ada deviasi dan tidak trismus
k. Kelainan lain : TAK

Pemeriksaan intra oral
a. Oral hygiene : baik
b. Kalkulus : tidak ada
c. Stain : tidak ada
d. Saliva : kuantitas dan konsistensi normal
e. Ukuran lidah : ukuran normal, posisi wrigth kelas I mobilitas normal
f. Refleks muntah : rendah
g. Mukosa mulut : sehat
h. Gigitan : ada dan stabil
i. Artikulasi : group function, terdapat blocking
j. Daya kunyah : normal
k. Kebiasaan buruk : bekertak gigi

Pemeriksaan Radiografis Dari foto panoramik diketahui gigi 17 ekstrusi; gigi 53, 52, 63, 72, 71, 81 persistensi; agenesis gigi 14, 13, 12, 22, 23, 35, 32, 31, 41, 42, 47

Pemeriksaan Gigi Geligi dan Tulang Alveolar

Pemeriksaan lain
a. Vestibulum rahang atas rahang bawah
• posterior kiri : sedang sedang
• posterior kanan : sedang sedang
• anterior : dalam dangkal
b. Prosesus alveolaris :
Post kiri Post kanan Anterior rahang atas
• Bentuk oval oval oval
• Ketinggian sedang sedang tinggi
• tahanan jaringan rendah rendah rendah
• bentuk permukaan tidak rata tidak rata tidak rata rahang bawah
• Bentuk oval oval
• Ketinggian sedang sedang rendah
• tahanan jaringan rendah rendah rendah
• bentuk permukaan rata tidak rata
c. Relasi rahang : normal
d. Frenulum
• labialis superior : tinggi
• labialis inferior : sedang
• bukalis rahang atas kiri : sedang
• bukalis rahang atas kanan : rendah
• bukalis rahang bawah kiri : sedang
• bukalis rahang bawah kanan : rendah
• lingualis : sedang
e. Palatum : oval, kedalaman sedang, palatum molle hause kelas 1
f. Ruang retromilohioid : dalam
g. Bentuk lengkung rahang
• rahang atas : segitiga
• rahang bawah : oval

h. Ruang protesa :
• jarak mesio distal regio 12, 13, 14= 20 mm; regio 22, 23= 12 mm; regio 35= 7 mm; regio 32, 31, 41, 42= 18 mm.
• tinggi serviko oklusal 1-3 mm
i. Perlekatan dasar mulut : normal
j. Lain – lain : TAK

Sikap mental : filosofis

Kumpulan Data Utama
Pasien pria usia 34 tahun datang ke RSGMP FKG UI untuk dibuatkan gigi tiruan untuk memperbaiki penampilan. Pada pemeriksaan diketahui vestibulum posterior kiri atas dan bawah sedang; vestibulum posterior kanan atas dan bawah sedang; vestibulum anterior atas dalam, anterior bawah dangkal. Residual ridge posterior kiri RA bentuk oval, ketinggian sedang, tahanan jaringan rendah, bentuk permukaan tidak rata; residual ridge posterior kanan rahang atas bentuk oval, ketinggian sedang, tahanan jaringan rendah, bentuk permukaan tidak rata. Residual ridge anterior rahang atas bentuk oval, ketinggian tinggi, tahanan jaringan rendah, permukaan tidak rata; Residual ridge posterior kiri rahang bawah bentuk oval, ketinggian sedang, tahanan jaringan rendah, permukaan rata; residual ridge posterior kanan rahang bawah bentuk oval, ketinggian sedang, tahanan jaringan rendah, permukaan tidak rata; Residual ridge anterior rahang bawah bentuk oval, ketinggian rendah, tahanan jaringan rendah, permukaan tidak rata. Frenulum labialis inferior, bukalis rahang atas kiri, bukalis rahang bawah kiri, dan lingualis sedang; frenulum bukalis rahang atas kanan rendah. Relasi rahang normal. Palatum oval, kedalaman sedang, palatum molle House kelas 1. Terdapat undercut pada rahang atas dan rahang bawah. Ruang retromilohioid kiri dan kanan sedang. Bentuk lengkung rahan rahang atas segitiga; rahang bawah oval. Jarak mesio distal ruang protesa regio 12-14: 20 mm; regio 12-13: 12 mm; regio 35: 17 mm; regio 32-42: 18 mm; tinggi serviko oklusal 1-3 mm. Perlekatan dasar mulut normal. Sikap mental filosfis.

Diagnosis
Bentuk kasus kehilangan gigi 14, 13, 12, 22, 23, 35, 32, 31, 41, 42, 47 memerlukan rehabilitasi dengan gigi tiruan sebagian lepasan akrilik pada rahang atas dan rahang bawah disertai dengan peninggian pada gigi 16, 15, 25, 26, 27, 37, 36, 46 menggunakan resin komposit.

Rencana Perawatan
Gigi tiruan lepas rahang atas sebagian, elemen: 14, 13, 12, 22, 23
Gigi tiruan lepas rahang bawah sebagian, elemen: 35, 32, 31, 41, 42
Perawatan pra prostodontik :
a. Rekonturing : Pengasahan gigi 17, 33 dan 43
b. Lain-lain : Peninggian gigi 16, 15, 24, 25, 26, 27, 37, 36, 35, 34, 44, 45, 46, serta penutupan diastema sentral gigi 11 dan 21 menggunakan resin komposit.

Desain

Urutan perawatan pasien ini adalah sebagai berikut:
Kunjungan Klinis Laboratorium
1 Pemeriksaan klinis ekstraoral dan intraoral Pencetakan pendahuluan Model studi
Galangan gigit Rahang atas dan rahang bawah
2 Penentuan Dimensi Vertikal
Rekonturing gigi 33,43, 17 Penanaman model di artikulator rata-rata

Penyusunan gigi tiruan malam RA dan RB
3 Pencobaan gigi tiruan malam dan peninggian gigi posterior RB menggunakan resin komposit Pembuatan gigi tiruan akrilik RA dan RB
4 Insersi GTS Akrilik

Peninggian gigi posterior RA 5 Perbaikan Kontak oklusal pada peninggian gigi posterior RA dan RB 6 Penutupan diastema sentral 7 Kontrol 1 8 Kontrol 2
9 Kontrol 3

Diskusi

Jumlah gigi yang ada di dalam rongga mulut suatu individu akan sangat mempengaruhi oklusi. Ekfeldt et al. (1990) dan Johansson (1992) menemukan bahwa semakin berkurangnya jumlah gigi maka keausan gigi akan meningkat. Hal ini kemungkinan besar disebabkan area yang menerima tekanan fungsional semakin sedikit, sehingga gaya yang diterima oleh gigi yang ada menjadi lebih besar dan pada akhirnya menyebabkan keausan gigi.6 Pada kasus ini, pasien kehilangan gigi 14, 13, 12, 22, 23, 35, 32, 31, 41, 42, dan 47. Oklusi hanya berlangsung pada gigi 16, 15, 25, 26, 27, 37, 36, 46 dan pada gigi-gigi tersebut ditemukan faset keausan yang menyebabkan hilangnya cusp gigi. Keausan pada gigi-gigi yang beroklusi meyebabkan penurunan pada DVO pasien sehingga tidak terdapat jarak interoklusal yang memadai untuk ruang protesa pada regio 13, 23, 32, 31, 41, 42.

Pada kasus ini, pengembalian DVO dilakukan untuk memperbaiki tampilan wajah pasien, mencegah kehilangan jaringan gigi lebih lanjut, meningkatkan fungsi mastikasi, dan memperoleh ruang serviko-oklusal untuk protesa. Perawatan restoratif definitif untuk kasus keausan gigi yang sedang sampai parah pada umumnya dilakukan dengan menggunakan gigi tiruan lepasan dan atau gigi tiruan cekat seperti mahkota tiruan dan gigi tiruan jembatan.6 Namun perawatan menggunakan gigi tiruan cekat cenderung kompleks, invasif, memerlukan waktu cukup panjang dan biaya yang tinggi.6,7 Pasien meminta agar gigi palsunya selesai dalam jangka waktu kurang dari 1,5 bulan yaitu sebelum pasien menikah, dan pasien juga meminta alternatif perawatan yang lebih murah mengingat besarnya pengeluaran pasien menjelang pernikahan. Restorasi menggunakan resin komposit pada kasus keausan gigi dapat dikategorikan sebagai restorasi provisional jangka sedang atau panjang pada pasien dengan biaya yang lebih terjangkau. Oleh karena itu kombinasi resin komposit dan gigi tiruan sebagian akrilik dalam merehabilitasi fungsi dan estetik pada pasien menjadi alternatif perawatan untuk merehabilitasi keausan gigi pada pasien sehingga biaya perawatan lebih terjangkau dan durasi perawatan dapat menjadi lebih singkat.
Pada pasien ini, DVO awal dan akhir dievaluasi dengan menggunakan evaluasi fonetik, jarak interoklusal, dan kontur fasial pasien. Pada evaluasi jarak interoklusal ditemukan free way space sebesar 6 mm sehingga pengembalian DVO dapat dilakukan dengan menyisakan free way space sebesar 2 mm. Pada evaluasi fonetik pasien diminta mengucapkan huruf ‘S’ dan bunyi yang dihasilkan terdengar berdesis. Evaluasi fonetik setelah pengembalian DVO menghasilkan bunyi ‘S’ yang tidak berdesis dan ketika menghasilkan bunyi ‘S’ terdapat jarak sebesar 1 mm antara tepi insisif rahang atas dan rahang bawah.

Kesimpulan

Perubahan pada morfologi gigi akibat keausan gigi, baik pada permukaan oklusal gigi posterior dan palatal gigi anterior akan diimbangi dengan kompensasi dentoalveolar yang bervariasi pada setiap individu. Keausan gigi yang parah dan tidak berimbang dengan laju kompensasi dentoalveolar dapat menyebabkan peningkatan interocclusal space. Pada beberapa kasus keausan gigi ditemukan bahwa kompensasi dentoalveolar dapat menjaga DVO realtif stabil dan bahkan meningkat. Hal tersebut menyebabkan pengembalian dimensi vertikal tidak perlu dilakukan pada rekonstruksi oklusal. Namun pada kasus tertentu yang memerlukan restorasi dan ruang interocclusal yang tersedia tidak mencukupi untuk melakukan restorasi baik dari segi biomekanis atau estetis, maka pengembalian dimensi vertikal dapat diindikasikan. 2,3,5,6,7

Kombinasi antara GTSL akrilik dan resin komposit dapat menjadi alternatif perawatan yang lebih terjangkau dan dengan durasi yang lebih singkat dalam merehabilitasi fungsi dan estetik pada kasus keausan gigi. GTSL akrilik dan resin komposit dapat dikategorikan sebagai restorasi provisional jangka sedang atau panjang pada pasien.1,6 Oleh karena itu jika pasien telah beradaptasi dan telah siap secara finansial, maka GTSL akrilik dan resin komposit dapat diganti dengan perawatan definitif berupa pembuatan gigi tiruan sebagian kerangka logam yang dikombinasikan dengan gigi tiruan cekat.

Daftar Pustaka

1. Phoenix RD, Cagna DR, DeFreest CF. Stewart’s Clincical Removable Partial Prosthodontics-3rd ed. Illinois: Quintessence Publishing. 2003. 367-70.
2. Hobkirk JA. Loss of the vertical dimension of occlusion and its management implications. The International Journal of Prosthodontics 2009; Vol 22 No5: 520.
3. Abduo J, Lyons K. Clinical consideratons for increasing occlusal vertical dimension: a review. Australian Dental Journal 2012;57:2-10.
4. Krishna MG, Rao KS, Goyal K. Prosthodontic management of severely worn dentition: including review of literature related to physiology and pathology of increased vertical dimension of occlusion. The Journal of indian Prosthodontic Society 2005; Vol 5 Issue 2: 89-93.
5. Abduo J. Safety of increasing vertical dimension of occlusion: a systematic review. Quintessence International 2012; Vol 43 No5: 369-79.
6. Khan F, Young WG. Toothwear the ABC of the Worn Dentition. John Wiley & Sons Ltd. 2011. 1, 188-202.
7. Dietschi D, Argente A. A Comprehensive and Conservative Approach for the Restoration of Abrasion and Erosion Part II: Clinical Procedures and case Report. Eur J Esthet Dent 2011;6: 142-159.

Similar Documents

Free Essay

Security

...Assignment 1 Lee Holland Identify what you see as the main purpose of security management and discuss what is meant by the statement that ‘security measures must be commensurate with the threat’. Within this essay I seek to break down the main assignment into the two phases that are within the title, the first being; What is the main purpose of security management? a role that to some would be undervalued, inconvenient, poorly funded and a hindrance, where to others, it is an effective, well-co-ordinated and highly desirable position, which when funded correctly, will have a positive effect on an organisations financial goals in the aid of preventing the loss of their assets through ways that were not before protected, this both in the corporate business and the commercial world. A reliable and effective security function is an asset to any organisation wishing to protect their tangible and intangible assets from compromise. In the second phase I will discuss what is meant by the statement that “security measures must be commensurate with the threat” In a world where the threats are changing daily, it is imperative that security procedures, policies and counter measures are kept up to date, and in line with the current rules and regulations of the security industry, they must also work within the National law within the county that they might be operating in. With financial constrictions and fierce competition within the business world it is only natural that an organisation...

Words: 685 - Pages: 3

Premium Essay

Security

...the CSO or Chief Security Officer. The CSO reports to the Board of Directors directly, hence cannot be influenced by the CEO or the CFO. According to the guideline by ASIS, this is the best model for a position that is as critical as the Chief Security Officer. Our CSO has been trying to add security to the culture of the company, and so far, it has been working. Being that the department is very new (about 1 year old), the security policies are now part of the human resources new hire packet. During their orientation, every new employee has to listen in on about 30 minutes of presentation that is security related, in addition to the normal company and culture orientation. The policies and procedures are now also embedded in the company intranet, and everyone has to sign a letter that says they read everything about the company’s security policies and procedures. This part also complies with the ASIS CSO guideline of bringing security into the company culture. According to the guideline, there is physical security that is handled by the CSO through his Facilities Director, as well as information security that is handled by the Information Security Director. They both report to the CSO (although the facilities director also reports to the Vice President of Human Resources). The company also has a Legal General Council, but this position reports directly to the CEO. The CSO regularly liaises with the General Council on all legal matters relating to the security department. Since...

Words: 561 - Pages: 3

Premium Essay

Security

...Security policy & standards Name Institution Course Instructor Date Part A In the current system, the following would be threats to the various components. THREATS TO SERVER Hacker Hacker is a general term that has truly been utilized to portray a machine programming master. All the more as of late, this term is regularly utilized as a part of a negative approach to depict a person who endeavors to increase unapproved access to system assets with pernicious plan. Black hat Black is an alternate term for people who utilize their insight into machine frameworks to break into frameworks or systems that they are not approved to utilize. Port Redirection Port redirection assaults are a kind of trust misuse assault that uses a bargained host to pass movement through a firewall that would overall be dropped. Consider a firewall with three interfaces and a host on every interface. The host on the outside can achieve the host on people in general administrations section, however not the host within. This openly open fragment is normally alluded to as a neutral ground (DMZ). The host on people in general administrations fragment can achieve the host on both the outside and within. In the event that programmers had the capacity bargain people in general administrations fragment host Theft of Service The likelihood of maverick utilization of a system association. Numerous hosts run the Dynamic Host Configuration Protocol (DHCP), by which...

Words: 1684 - Pages: 7

Free Essay

Security

...In this age where everything is computerized and or internet based, people spend more time on their pc’s than ever. You can pay your bills, email, perform financial transactions with the bank, social network, shop, get a degree, and the list goes on. These activities involve the transmission of sensitive data over the network and open the door for criminals to steal your valuable personal information. Knowing how to stop these thieves is important. The purpose of this report is to address a few of these security issues and discuss ways to prevent attacks from occurring. Users pose the largest security threat to a pc. Users go out on the internet, haphazardly clicking away on links that could open their pc for an attack. Malware, phishing scams, bot herding, viruses, and worms are just a few of the ways that your pc can be attacked. First and foremost is the user needs to understand that they must use caution when accessing the network. Follow sensible rules such as, don’t open email from strangers, don’t click on strange links, and don’t walk away from the pc without logging out. Never give out passwords, and change passwords often. Every 30-90 days is good and make sure you create strong passwords. As a rule of thumb, only give users access to the specific files and folders that they need. Use common sense when you are on the network and you can prevent malicious attack on your pc and protect sensitive information. Another way to protect your pc from malicious attack...

Words: 693 - Pages: 3

Premium Essay

Securities

...SECURITIES What is meant by ‘Securities’? The definition of ‘Securities’ as per the Securities Contracts Regulation Act (SCRA), 1956, includes instruments such as shares, bonds, scrips, stocks or other marketable securities of similar nature in or of any incorporate company or body corporate, government securities, derivatives of securities, units of collective investment scheme, interest and rights in securities, security receipt or any other instruments so declared by the Central Government. What is the function of Securities Market? Securities Markets is a place where buyers and sellers of securities can enter into transactions to purchase and sell shares, bonds, debentures etc. Further, it performs an important role of enabling corporates, entrepreneurs to raise resources for their companies and business ventures through public issues. Transfer of resources from those having idle resources (investors) to others who have a need for them (corporates) is most efficiently achieved through the securities market. Stated formally, securities markets provide channels for reallocation of savings to investments and entrepreneurship. Savings are linked to investments by a variety of intermediaries, through a range of financial products, called ‘Securities’. Which are the securities one can invest in? Shares Government Securities Derivative products Units of Mutual Funds etc., are some of the securities investors in the securities market can invest in...

Words: 710 - Pages: 3

Premium Essay

Security

...Kudler Fine Foods IT Security Report Area of System | Threat | Potential Vulnerability | IT System | Targeted Attacks – specifically designed to penetrate a particular organization, and focus on gathering specific information. | Used to gather information with monetary value for example, customers personal information. Name, address, phone numbers, and social security numbers. | | Privacy Threats - That puts both personal data at risk and raises bigger questions about the proper use of aggregated data companies use for promotional purposes. | The internet allows users to bank, shop, and socialize online which requires users to disclose customer information putting personal data at risk | | Fake Security Certificates - cybercriminals have been able to issue fake certificates for their malware using so-called self-signed certificates, and they have also been able to successfully breach the systems of various CAs and use stolen certificates to sign their code. | Make a fake website seem like it is a legit service | | Mobile Malware – about 90% of mobile malware is targeted toward Android based devices. Android is widely used, easy to develop for, and users of Android are able to download apps from anywhere they choose. On the other hand, iOS is a closed file system, allowing the download and use of apps from just a single source, the App Store. | Customer using their mobile devices to store their loyalty card must be aware that mobile phones are also targets for...

Words: 327 - Pages: 2

Premium Essay

Security

...Security Students Name Institutions Name How to resolve a security issue in a situation where the need for security is great but the available funds are limited Community participation is a very important aspect in enhancing security. Through the community’s leaders individuals can be sensitized on the need to protect each other and also help them to create a ‘we’ feeling in the management of the important resources in a region. This will enable the community members to identify with the resources and wealth of a region and hence strive to protect it by all means. Governments and administrative officials should also involve the locals in making of decisions that are of utmost importance to the people’s welfare (Bakari, Magnusson, Tarimo, & Yngström, 2006). The benefits if personnel in security management develop skills as educators for their organization's security Having high skilled employees who are given the potential to grow their expertise is a great benefit to any organization. An organizations success can often be attributed to individual expertise and skills of its employees. The benefits are as follows: 1. Cuts on the costs of hiring external consultants; many organizations spend a lot of money in hiring third party consultants to cover essential tasks within the organization such as periodic network vulnerability scans and developing security programs. The cost of sending employees to the requisite training may be relatively cheaper (McCoy & Fowler...

Words: 1066 - Pages: 5

Premium Essay

Security

...Security is an intentional process of securing anything from expected jeopardy. It is a condition in result of various protective measures. There are different aspects of security that ranges from personal life to national security. This is a separate department in large managements.   This is a condition that prevents unauthorized information or people from having access to confidential or personal areas. Writing on this subject matter might not be difficult but writing well is surely. It’s not simple to comprehend a professional paper on such a diverse subject. It has various categories and concepts which need to be researched and studied properly to write an ample document.   Our company has been writing security term papers since long and it has experienced writers who know their job very well. Physical security, information security, computing security, financial security, human security or food security, writers at our company are skilled enough to produce highly authentic term papers on any one of these categories of security. No matter how difficult topic you have for your term paper we guarantee you quality in any case.   Writers at our company follow your given specifications keenly to produce desired papers. With us you don’t need to worry about the quality of your term paper because excellence is never compromised at our company. Just place your order with us and experience it yourself.   Services provided by our company include:   ...

Words: 295 - Pages: 2

Premium Essay

Security

...White Paper IT Security Risk Management By Mark Gerschefske Risk Analysis How do you predict the total cost of a threat? Is it only the cost to restore the comprised system and lost productivity? Or does it include lost revenue, customer confidence, and trust of investors? This paper provides an overview of the risk management process and its benefits. Risk management is a much talked about, but little understood area of the IT Security industry. While risk management has been practiced by other industries for hundreds of years, little historical data exists to support qualitative analysis in the IT environment.1 The industry approach has been to buy technology without really understanding the potential underlying risks. To further complicate matters, new government regulations create additional pressure to ensure sensitive data is protected from compromise and disclosure. Processes need to be developed that not only identify the sensitive data, but also identify the level of risk posed due to noncompliance of corporate security policies. Verizon has developed security procedures based on industry standards that evaluate and mitigate areas deemed not compliant to internal security policies and standards. Through the use of quantitative analysis, Verizon is able to determine areas that present the greatest risk, which allows for identification and prioritization of security investments. Risk Mitigation Process The Risk Mitigation Process (RMP) is a part of risk management...

Words: 2021 - Pages: 9

Premium Essay

Security

...above to submit your assignment. Term Paper: Chief Security Officer Due Week 10 and worth 200 points You have been hired as the Chief Security Officer for a local University. For this role you will be responsible for establishing and maintaining an enterprise wide information security program to ensure that all information and data assets are not compromised. Knowing the concepts that are presented in the course, you will develop a plan to carry out a security program that deters computer crimes, establishes a process for investigation and outlines which laws are applicable for possible offenders. Write a 8-10 page paper in which you: Research the Internet for recent computer hacker attacks or other crimes that have been committed against higher educational institutions. Analyze the processes put in place by other higher education institutions in order to prevent these crimes from reoccurring. Recommend processes, methodologies, or technology that can be purchased to lower computer crime threats. Include specifics on pricing and the level of support and maintenance that would be required. Research the Internet for current laws and government agencies that exist in your region that address the threat of computer cyber-crimes. Identify the laws that would be effective to convict offenders. Determine what computer crime fighting government programs exist within your region that can complement your security operations. Research the internet for computer forensics...

Words: 317 - Pages: 2

Free Essay

Security

...Raymond D. Jambalos BSIT Physical Security measures every organization should take Lock up the server room Even before you lock down the servers, in fact, before you even turn them on for the first time, you should ensure that there are good locks on the server room door. Of course, the best lock in the world does no good if it isn’t used, so you also need policies requiring that those doors be locked any time the room is unoccupied, and the policies should set out who has the key or keycode to get in. Set up surveillance Locking the door to the server room is a good first step, but someone could break in, or someone who has authorized access could misuse that authority. You need a way to know who goes in and out and when. A log book for signing in and out is the most elemental way to accomplish this, but it has a lot of drawbacks. A person with malicious intent is likely to just bypass it. A better solution than the log book is an authentication system incorporated into the locking devices, so that a smart card, token, or biometric scan is required to unlock the doors, and a record is made of the identity of each person who enters. A video surveillance camera, placed in a location that makes it difficult to tamper with or disable (or even to find) but gives a good view of persons entering and leaving should supplement the log book or electronic access system. Surveillance cams can monitor continuously, or they can use motion detection technology to record only when...

Words: 1226 - Pages: 5

Premium Essay

Security

...Project Part 1 Multi-Layered Security Plan | NT2580 | | James Maus | 8/21/2015 | In the process of emerging a mulit-layered security plan, you will need to see the seven domains of the IT set-up. The security will be increased on each of the domains. Security increase on the seven domains increases complete security of the system and build a mulit-layered security plan. Only the users can negotiate the system in the user domain. Easy passwords can cause a lot of problems so we will need to use difficult passwords with eight characters and up. Passwords will include special characters with capitals and lowercase. A limit to how long you can use the password and to only a one time password use. Workstations will have antivirus and malware protection installed. Since laptops are very weak and easy to get lost or stolen, the companies will have a converted hard drive so only the owner can recover the data. On the LAN domain, you should never open any scam emails when on company systems. To reduce email malware, you should add spam filters to stop junk email and reduce employee mistakes. On the LAN to WAN domain, we should switch the FTP to secure FTP so only our suers can have access to the FTP server. On the WAN domain there should be firewalls put in place on the network to filter inbound traffic. In the case of the Richman investments, network of\ any kind of traffic that is coming in and out is not needed will be stopped by a firewall. Reference Courtesy of...

Words: 444 - Pages: 2

Premium Essay

Security

...Recruiting and Selecting Quality Security Employees for security job position Contemporary Issues in Security Management Abstract For years, recruitment and hiring methods have been deemed by dated by human resource managers but are realizing that different strategies and methods are need to attract millennials. Hiring qualified personnel has become an essential component in an organization foundation. This paper will explore multiple articles that provide techniques on how to recruitment and hire candidates from college graduates, apprentices, and novices to the security profession and presents key components of innovative approaches and traditional human resource techniques, and training policies that will meet any small or large business goal of highly hiring qualified candidates. In addition, it will highlight techniques, practices and, lessons learnt in enhancing a company’s ability to attract, hire, retain, and improve human resource practices, improve human resource development and human resource capabilities in today’s security career field. Keyword: Employees, Hiring, Human Resources (HR), Security Recruiting and Selecting Quality Security Employees in the security field Currently there is a high demand for security professional specializing Cybersecurity, Personnel Security, Physical Security, and Industrial security and many other security jobs. The issue is attracting, hiring, retaining people that have...

Words: 3616 - Pages: 15

Premium Essay

Security

...Security Students Name Institutions Name How to resolve a security issue in a situation where the need for security is great but the available funds are limited Community participation is a very important aspect in enhancing security. Through the community’s leaders individuals can be sensitized on the need to protect each other and also help them to create a ‘we’ feeling in the management of the important resources in a region. This will enable the community members to identify with the resources and wealth of a region and hence strive to protect it by all means. Governments and administrative officials should also involve the locals in making of decisions that are of utmost importance to the people’s welfare (Bakari, Magnusson, Tarimo, & Yngström, 2006). The benefits if personnel in security management develop skills as educators for their organization's security Having high skilled employees who are given the potential to grow their expertise is a great benefit to any organization. An organizations success can often be attributed to individual expertise and skills of its employees. The benefits are as follows: 1. Cuts on the costs of hiring external consultants; many organizations spend a lot of money in hiring third party consultants to cover essential tasks within the organization such as periodic network vulnerability scans and developing security programs. The cost of sending employees to the requisite training may be relatively cheaper (McCoy & Fowler...

Words: 1066 - Pages: 5

Premium Essay

Security

...Security is the degree of resistance to, or protection from, harm. It applies to any vulnerable and valuable asset, such as a person, dwelling, community, nation, or organization. As noted by the Institute for Security and Open Methodologies (ISECOM) in the OSSTMM 3, security provides "a form of protection where a separation is created between the assets and the threat." These separations are generically called "controls," and sometimes include changes to the asset or the threat.[1] Perception of security may be poorly mapped to measureable objective security. For example, the fear of earthquakes has been reported to be more common than the fear of slipping on the bathroom floor although the latter kills many more people than the former.[2] Similarly, the perceived effectiveness of security measures is sometimes different from the actual security provided by those measures. The presence of security protections may even be taken for security itself. For example, two computer security programs could be interfering with each other and even cancelling each other's effect, while the owner believes s/he is getting double the protection. Security theater is a critical term for deployment of measures primarily aimed at raising subjective security without a genuine or commensurate concern for the effects of that measure on objective security. For example, some consider the screening of airline passengers based on static databases to have been Security Theater and Computer Assisted...

Words: 436 - Pages: 2