Term Paper on "Long-Term Planning and Information Systems Security Life Cycle Management"
Term Paper 4 pages (1180 words) Sources: 4
[EXCERPT] . . . .
Computer ScienceLong-Term Planning and Information Systems Security Life Cycle Management
Information security means defending information and information systems from unlawful access, use, revelation, disturbance, alteration, examination, assessment, recording or damage. In order to be successful every business needs to have a written network security plan in place. A thorough policy will cover topics such as:
Acceptable use policy, to state what kinds of network activities are permissible and which ones are forbidden
E-mail and communications activities, to help diminish problems from e-mails and attachments
Antivirus policy, to help guard the network against threats like viruses, worms, and Trojan horses
Identity policy, to help defend the network from unauthorized users
Password policy, to help workers select strong passwords and protect them
Encryption policy, to provide leadership on using encryption technology to protect network data
Remote access policy, to help workers safely accesses the network when working outside the office (Security Network Checklist, n.d.).
Training Plan
The History Channel cannot guard the honesty, privacy, and accessibility of information in today's highly networked systems environment without making sure that each person involved in the process understands their roles and responsibilities and is sufficiently trained to perform them. Going forward training will be carried out for current employees; new employees within sixty days of hire;
download full paper ⤓
Everyone needs basic training in it security notions and measures. Beyond the basics, this new approach institutes three separate levels of it security training: Beginning, Intermediate, and Advanced. Each level is then associated to roles and responsibilities. Because people often perform more than one role within the organization, they may need intermediate or advanced level it security training in their main job role, but only the beginning level in a secondary or tertiary role. This new concept makes possible training that is tailored to individual worker needs and career mobility, and to an organization's evolving or changing mission and mix of job functions. "In the end, the idea of refresher training which is traditionally viewed as repetitive learning, gives way to the just-in-time learning approach, as an individual's or organization's it security training needs evolve or change" (Information Technology Security Training Requirements: A Role -- and Performance-Based Model, (n.d.).
Awareness Program
This approach believes awareness programs as a pre-requisite to it security training. Awareness is not training. The reason for an awareness program is merely to focus consideration on security. Awareness programs are planned to permit people to recognize it security apprehensions and respond to them accordingly. In awareness activities the learner is a receiver of information, while the learner in a training situation has a more active role. Awareness relies on reaching wide audiences with nice-looking packaging techniques so as to grab and hold their attention (Information Technology Security Training Requirements: A Role -- and Performance-Based Model, (n.d.).
Short-term certification
As part of the new it security plan it is recommended that all it staff get a vendor certification. Securing the organization's infrastructure and keeping abreast of emerging technologies is vital. "Vendor certifications, including Cisco's Certified Network Associate Certification (CCNA) and Microsoft's Certified Systems Engineer (MCSE), with focus on security and Check Point's Certified Security Expert (CCSE), are particularly in demand" (Gupta, 2011). Demand for these certifications has been going up over the last… READ MORE
Quoted Instructions for "Long-Term Planning and Information Systems Security Life Cycle Management" Assignment:
Part 1.
Write a three (3) page training and certification plan for your security team. You are the security manager for the History Channel. Over time, the network has been really expanding, increasing traffic, media, and new forms of programming. In fact, the History Channel staff is really expanding. The security staff started with just two people, and now it*****s up to five. The leadership has asked you to research and develop a training and awareness plan for the security staff. They should be certified and trained on existing hardware and software; more importantly, they should be training for the new intrusion detection system that will be installed in May.
The History Channel leadership has asked you to put together a training approach for the next one to three years. Consider short- and long-term certification and awareness training; also consider how to keep the staff abreast of current threat trends.
http://www.sans.org/ [key words: SANS, computer security training, security]
Part 2.
Write a one (1) page white paper or thesis describing the benefits and disadvantages of ISLCM as discussed in the TCS article.
TCS article: http://www.xypoint.com/Libraries/Collateral_Documents/ISSLM_White_Paper.sflb.ashx
http://www.jeffersonwells.com/SecurityLifeCycle
Thank you.
*****
How to Reference "Long-Term Planning and Information Systems Security Life Cycle Management" Term Paper in a Bibliography
“Long-Term Planning and Information Systems Security Life Cycle Management.” A1-TermPaper.com, 2012, https://www.a1-termpaper.com/topics/essay/computer-science-long-term-planning/7609180. Accessed 5 Oct 2024.
Related Term Papers:
Information Technology Aquarius Marketing Project Plan Term Paper
Information Technology
Aquarius Marketing Project Plan
The intent of this project plan is to comprehensively define the development process, testing, training, and introduction of an enterprise-class portal and series of… read more
Term Paper 12 pages (3970 words) Sources: 12 Style: Harvard Topic: Management / Organizations
Security Self-Assessment Coyote Systems Security Self-Assessment Organization Thesis
Security Self-Assessment
Coyote Systems Security Self-Assessment
Organization Description
The company Coyote Systems develops enterprise software applications for the world's leading manufacturing companies. It has development offices in Chicago, Illinois, throughout… read more
Thesis 7 pages (2030 words) Sources: 1 Topic: Management / Organizations
Information Technology (IT) Portfolio Management Systems Term Paper
It Portfolio Management Systems
Portfolio management in it is a system that enables organizations evaluate technology systems available at a point of time or planned for the future and leverage… read more
Term Paper 15 pages (4890 words) Sources: 1+ Topic: Management / Organizations
Information Technology an Effective Project Manager Needs Essay
Information Technology
An effective project manager needs a variety of both technical and business skill sets. Discuss the non-technical skills that have been associated with superior project management.
Numerous studies… read more
Essay 6 pages (1908 words) Sources: 3 Topic: Management / Organizations
Human Resources Management - Review of Theories Term Paper
Human Resources Management - Review of Theories
Importance of Human Resources Management to organizations
Strategic Human Resources Management and firm performance
Human Resources Management (HRM) and the Strategic Management Process… read more
Term Paper 12 pages (3670 words) Sources: 1+ Topic: Management / Organizations
Sat, Oct 5, 2024
If you don't see the paper you need, we will write it for you!
We can write a new, 100% unique paper!