Tuesday, May 14, 2019

IT - Security Plan Case Study Example | Topics and Well Written Essays - 1750 words

IT - Security Plan - Case pick up ExampleA computer system must be protected to access it from unauthorized persons. In addition, different methods and techniques are used to protect a computer system from unauthorized access. In this scenario, a tribute pattern consists of rules and measures that will be followed by an organization to ensure the information certificate (Whitman & Mattord, 2011 smith & Spafford, 2004 Williams, 2007). This paper is outlines the process of developing a credentials plan to addresses the security requirements identified by pinnacle IT Manager and control gaps (security requirements) identified previously by Well-Health Inc. ISSO. This security plan is aimed at identifying the basic security needs for Well-Health Inc. along with other security issues and dangers. This research will also suggest mitigation procedures and measures that good deal be incorporated to handle and manage the corporate security management. Plan Scope and declare oneself Pu rpose Basically, the information security plans contain a wide variety of guidelines and rules that promote standardized response to whatsoever information security issue that can be encountered, as a result facilitating a aggroup of IT experts to instantly recognize what action should be taken in some situation. However, the information security plan should be placed into situation by an enterprise that has a computer and communication network. Though, these procedures and policies are hugely complicated to plan as well as implement, however sound information security policies hurry an operation to care-for its selective information with relative ease (Elemental Cyber Security, Inc., 2012 Whitman & Mattord, 2011). In the previous stages, we have assessed a number of aspects regarding impertinent security controls arrangements, applications, requirements which need to be updated before application of new health care insurance system. This divide outlines scope and purpose of t he information security plan. The purpose of this security plan is to offer some guidelines and policies that could be adopted by altitude IT in case of a disaster. Scope The implementation of an information security plan for ACME IT would be extremely helpful and profitable and beneficial while launching each new information technology project by the Well-Health Inc. The scope of this plan includes offering following capabilities to the ACME IT Effective data protection Disaster management and handling Application of suitable controls and authentication heighten data security Better data quality No breach of copyright Assessment of nonchalant tasks Quality authentication Easy way of working Easy management of the data Less conflicts among data formats Easy data sharing among all division of the corporate Target Application Identification and explanation The purpose of applying this security plan is to deal with security issues assessed by ACME IT Security Issues Main security issues are Lack of suitable security policies No enhanced cryptographic modules No record of ply i.e. their current and past employment history No proper mechanism for employees to sign a disceptation confirming that they have

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.