logo

Report on High Assurance Computing

   

Added on  2022-08-28

4 Pages732 Words17 Views
 | 
 | 
 | 
Running head: REPORT ON HIGH ASSURANCE COMPUTING
REPORT
ON
HIGH ASSURANCE COMPUTING
Name of the Student
Name of the University
Author Note:
Report on High Assurance Computing_1

HIGH ASSURANCE COMPUTING1
Apple lnc. Is such organization whose success is highly depends on the innovation. Thus,
while analyzing the business growth it is identified that apple has successfully incorporated
information technology into their business structure. While analyzing this aspect it is identified
that Apple holds one of the most complex security challenges for information technology and
decision making. Followed by this it is also identified that information security is one of the
major conflict that may impact their business growth (Hennessy & Najjar 2017). Thus, an
extreme necessity of security awareness has been observed for the mentioned organization.
Making allowance to this concern a detail elaboration on security awareness in Apple is
mentioned below:-
According to the NIST security programs Wilson & Hash (2003) an effective security
control model is consist of the development of IT security policy, identification of the roles and
responsibilities of security implementation, deployment of IT security programs as well as a
monitoring process which will review the effectiveness of the implemented security programs
into the organizational infrastructure. Followed by this concern into the nominated organizational
infrastructure a significant necessity to incorporate security awareness program has been
identified. According to NIST SP800-50 IT security awareness and training Wilson & Hash
(2003) it primarily intended on providing a detail monitoring of the IT security and activities
within an organization. Considering these findings in the nominated company it needs three
major steps to deploy the security awareness and training program.
Thus, in this section it is highly recommended to implement fully decentralized program
management as this model has aimed to provide central security awareness and training program
and provides the control authorities of this model to the organizational unit. While analyzing the
operations of this model it is identified that the central authority provides the authorization power
Report on High Assurance Computing_2

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents