Saturday, May 11, 2019

Security Planning and Assessment Essay Example | Topics and Well Written Essays - 2500 words

Security Planning and Assessment - turn up ExampleThe focus of Information Security Risks and to implement various methodologies to mitigate the security risks is a developing challenge in the filed of Information technology. The battle is on for conclusion out the efficient ways and externalize methodologies that can analyze the security risks and implement the appropriate mitigation solutions. As, every event or technique has various technologies involved that speed up the dividing line processes there atomic number 18 also prone to cast up risks of computer intrusion, fraud, disruption and many more.A succeederful organization not only relies on finding innovative solutions or products but also on the effective implementation of those solutions. Here, technology plays a major(ip) role as these expert developments can make the implementations simpler, providing a wide range of choice. But the interrogative sentence arises so as to which is the right choice This can only be answered by thorough look into on the cost, stability and reliability of the technology to be used (WALSHAM, 1993). The Information System of the firm should be able to process this task by taking the external (technology functionality) and internal (business environment) entities into account. Thus, the understanding and integration of technological innovations plays a key role in the modeling of any Information System to support the business goals and strategies. ... The organization has to analyze all the possibilities and provide the solution that is technological stable and cost-effective, to implement, maintain and modify in future.Security Management and ResponsibilitiesData OwnerEach Line Department of the union, with its own computing facilities leave alone appoint a senior member of the staff as Data Owner. Those systems which are operated throughout the fellowship should also have a designated Data Owner. Data Owners across the company will be sensible by the Hea d of ead HeadInformation Compliance and Policy. With the existing systems, advice is available to help data owners meet their responsibility in complying with the Information Security Policy. Systems DevelopmentAll systems must comply with the main IT strategy developed for the company by the IT team. Mark Walker, a senior systems analyst, states that an IT strategy is the single most crucial factor for the success of an organization dependent on IT for its operations (Walker, 2000). All system developments must include security issues in their consideration of new developments, seeking guidance from the Head of Information Technology.Management ResponsibilitiesThe management plays the most essential part in building a successful IT infrastructure (Royce, 1998). Managements responsibility goes beyond the basics of support. They are the ones responsible for setting the tone for the entire security program. Generating awareness is the most important activity of the management. The ma nagement must instruct the staff of their security responsibilities. Managers should determine the authority of individuals with respect to access to specific nurture systems. The level of access to specific systems should be

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.