Term Paper on "Long-Term Planning and Information Systems Security Life Cycle Management"

Term Paper 4 pages (1180 words) Sources: 4

[EXCERPT] . . . .

Computer Science

Long-Term Planning and Information Systems Security Life Cycle Management

Information security means defending information and information systems from unlawful access, use, revelation, disturbance, alteration, examination, assessment, recording or damage. In order to be successful every business needs to have a written network security plan in place. A thorough policy will cover topics such as:

Acceptable use policy, to state what kinds of network activities are permissible and which ones are forbidden

E-mail and communications activities, to help diminish problems from e-mails and attachments

Antivirus policy, to help guard the network against threats like viruses, worms, and Trojan horses

Identity policy, to help defend the network from unauthorized users

Password policy, to help workers select strong passwords and protect them

Encryption policy, to provide leadership on using encryption technology to protect network data

Remote access policy, to help workers safely accesses the network when working outside the office (Security Network Checklist, n.d.).

Training Plan

The History Channel cannot guard the honesty, privacy, and accessibility of information in today's highly networked systems environment without making sure that each person involved in the process understands their roles and responsibilities and is sufficiently trained to perform them. Going forward training will be carried out for current employees; new employees within sixty days of hire;
Continue scrolling to

download full paper
whenever there is a major change in the it security environment or procedures, or when an worker enters a new position which deals with sensitive information; and occasionally as refresher training, based on the sensitivity of the information the worker handles (Information Technology Security Training Requirements: A Role -- and Performance-Based Model, (n.d.).

Everyone needs basic training in it security notions and measures. Beyond the basics, this new approach institutes three separate levels of it security training: Beginning, Intermediate, and Advanced. Each level is then associated to roles and responsibilities. Because people often perform more than one role within the organization, they may need intermediate or advanced level it security training in their main job role, but only the beginning level in a secondary or tertiary role. This new concept makes possible training that is tailored to individual worker needs and career mobility, and to an organization's evolving or changing mission and mix of job functions. "In the end, the idea of refresher training which is traditionally viewed as repetitive learning, gives way to the just-in-time learning approach, as an individual's or organization's it security training needs evolve or change" (Information Technology Security Training Requirements: A Role -- and Performance-Based Model, (n.d.).

Awareness Program

This approach believes awareness programs as a pre-requisite to it security training. Awareness is not training. The reason for an awareness program is merely to focus consideration on security. Awareness programs are planned to permit people to recognize it security apprehensions and respond to them accordingly. In awareness activities the learner is a receiver of information, while the learner in a training situation has a more active role. Awareness relies on reaching wide audiences with nice-looking packaging techniques so as to grab and hold their attention (Information Technology Security Training Requirements: A Role -- and Performance-Based Model, (n.d.).

Short-term certification

As part of the new it security plan it is recommended that all it staff get a vendor certification. Securing the organization's infrastructure and keeping abreast of emerging technologies is vital. "Vendor certifications, including Cisco's Certified Network Associate Certification (CCNA) and Microsoft's Certified Systems Engineer (MCSE), with focus on security and Check Point's Certified Security Expert (CCSE), are particularly in demand" (Gupta, 2011). Demand for these certifications has been going up over the last… READ MORE

Quoted Instructions for "Long-Term Planning and Information Systems Security Life Cycle Management" Assignment:

Part 1.

Write a three (3) page training and certification plan for your security team. You are the security manager for the History Channel. Over time, the network has been really expanding, increasing traffic, media, and new forms of programming. In fact, the History Channel staff is really expanding. The security staff started with just two people, and now it*****s up to five. The leadership has asked you to research and develop a training and awareness plan for the security staff. They should be certified and trained on existing hardware and software; more importantly, they should be training for the new intrusion detection system that will be installed in May.

The History Channel leadership has asked you to put together a training approach for the next one to three years. Consider short- and long-term certification and awareness training; also consider how to keep the staff abreast of current threat trends.

http://www.sans.org/ [key words: SANS, computer security training, security]

Part 2.

Write a one (1) page white paper or thesis describing the benefits and disadvantages of ISLCM as discussed in the TCS article.

TCS article: http://www.xypoint.com/Libraries/Collateral_Documents/ISSLM_White_Paper.sflb.ashx

http://www.jeffersonwells.com/SecurityLifeCycle

Thank you.

*****

How to Reference "Long-Term Planning and Information Systems Security Life Cycle Management" Term Paper in a Bibliography

Long-Term Planning and Information Systems Security Life Cycle Management.” A1-TermPaper.com, 2012, https://www.a1-termpaper.com/topics/essay/computer-science-long-term-planning/7609180. Accessed 5 Oct 2024.

Long-Term Planning and Information Systems Security Life Cycle Management (2012). Retrieved from https://www.a1-termpaper.com/topics/essay/computer-science-long-term-planning/7609180
A1-TermPaper.com. (2012). Long-Term Planning and Information Systems Security Life Cycle Management. [online] Available at: https://www.a1-termpaper.com/topics/essay/computer-science-long-term-planning/7609180 [Accessed 5 Oct, 2024].
”Long-Term Planning and Information Systems Security Life Cycle Management” 2012. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/computer-science-long-term-planning/7609180.
”Long-Term Planning and Information Systems Security Life Cycle Management” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/computer-science-long-term-planning/7609180.
[1] ”Long-Term Planning and Information Systems Security Life Cycle Management”, A1-TermPaper.com, 2012. [Online]. Available: https://www.a1-termpaper.com/topics/essay/computer-science-long-term-planning/7609180. [Accessed: 5-Oct-2024].
1. Long-Term Planning and Information Systems Security Life Cycle Management [Internet]. A1-TermPaper.com. 2012 [cited 5 October 2024]. Available from: https://www.a1-termpaper.com/topics/essay/computer-science-long-term-planning/7609180
1. Long-Term Planning and Information Systems Security Life Cycle Management. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/computer-science-long-term-planning/7609180. Published 2012. Accessed October 5, 2024.

Related Term Papers:

Information Technology Aquarius Marketing Project Plan Term Paper

Paper Icon

Information Technology

Aquarius Marketing Project Plan

The intent of this project plan is to comprehensively define the development process, testing, training, and introduction of an enterprise-class portal and series of… read more

Term Paper 12 pages (3970 words) Sources: 12 Style: Harvard Topic: Management / Organizations


Security Self-Assessment Coyote Systems Security Self-Assessment Organization Thesis

Paper Icon

Security Self-Assessment

Coyote Systems Security Self-Assessment

Organization Description

The company Coyote Systems develops enterprise software applications for the world's leading manufacturing companies. It has development offices in Chicago, Illinois, throughout… read more

Thesis 7 pages (2030 words) Sources: 1 Topic: Management / Organizations


Information Technology (IT) Portfolio Management Systems Term Paper

Paper Icon

It Portfolio Management Systems

Portfolio management in it is a system that enables organizations evaluate technology systems available at a point of time or planned for the future and leverage… read more

Term Paper 15 pages (4890 words) Sources: 1+ Topic: Management / Organizations


Information Technology an Effective Project Manager Needs Essay

Paper Icon

Information Technology

An effective project manager needs a variety of both technical and business skill sets. Discuss the non-technical skills that have been associated with superior project management.

Numerous studies… read more

Essay 6 pages (1908 words) Sources: 3 Topic: Management / Organizations


Human Resources Management - Review of Theories Term Paper

Paper Icon

Human Resources Management - Review of Theories

Importance of Human Resources Management to organizations

Strategic Human Resources Management and firm performance

Human Resources Management (HRM) and the Strategic Management Process… read more

Term Paper 12 pages (3670 words) Sources: 1+ Topic: Management / Organizations


Sat, Oct 5, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!