Friday, June 21, 2019

IT - Security Plan Case Study Example | Topics and Well Written Essays - 1750 words

IT - hostage Plan - Case Study ExampleA information processing system system must be protected to access it from unauthorized persons. In addition, different methods and techniques are used to protect a computer system from unauthorized access. In this scenario, a security plan consists of rules and measures that will be followed by an organization to ensure the information security (Whitman & Mattord, 2011 Smith & Spafford, 2004 Williams, 2007). This paper is outlines the process of ontogenesis a security plan to addresses the security requirements identified by peak IT Manager and control gaps (security requirements) identified previously by Well-Health Inc. ISSO. This security plan is aimed at identifying the basic security needs for Well-Health Inc. along with other security issues and dangers. This research will also suggest mitigation procedures and measures that can be incorporated to embrace and manage the corporate security management. Plan Scope and Purpose Purpose Bas ically, the information security plans contain a wide variety of guidelines and rules that promote regularize response to some information security issue that can be encountered, as a result facilitating a team of IT experts to instantly recognize what treat should be taken in some situation. However, the information security plan should be placed into situation by an enterprise that has a computer and discourse network. Though, these procedures and policies are tremendously complicated to plan as well as implement, however sound information security policies facilitate an operation to sell-for its data with recounting ease (Elemental Cyber Security, Inc., 2012 Whitman & Mattord, 2011). In the previous stages, we have assessed a number of aspects regarding new security controls arrangements, applications, requirements which need to be updated before application of new health care insurance system. This section outlines scope and purpose of the information security plan. The pur pose of this security plan is to offer some guidelines and policies that could be adopted by ACME IT in case of a disaster. Scope The implementation of an information security plan for ACME IT would be extremely helpful and profitable and beneficial epoch launching any new information technology project by the Well-Health Inc. The scope of this plan includes offering following capabilities to the ACME IT Effective data protection Disaster management and handling Application of suitable controls and authentication Enhanced data security Better data quality No breach of procure Assessment of daily tasks Quality authentication Easy way of working Easy management of the data Less conflicts among data formats Easy data overlap among all division of the corporate Target Application Identification and Description The purpose of applying this security plan is to deal with security issues assessed by ACME IT Security Issues Main security issues are Lack of suitable security policies No e nhanced cryptographic modules No record of staff i.e. their current and past function history No proper mechanism for employees to sign a statement confirming that they have

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.