logo

IT Security: Enterprise Technical Infrastructure Security Plan and Risk Assessment for Uber

   

Added on  2023-06-11

5 Pages764 Words99 Views
Running head: IT SECURITY
Information Technology Security
Name of Student-
Name of University-
Author’s Note-

1IT SECURITY
Enterprise Technical Infrastructure Security Plan
For dealing with the IT Security Plan for Uber Enterprise, the security plan has many
technological areas that are to be considered. To consider the technological areas of Uber
enterprise, there are many security professionals who helps in crafting a plan for the organization
(Nelson & Staggers, 2016). The first thing that is considered is to understand the security
technology of next generation and why the security plan is needed for Uber. There are mainly
five steps that are to be considered while making a security plan for the organization. The steps
are stated below.
Step 1: Identifying the resources and classifying them accordingly
The first step while making the security plan is to identify all the resources available with
Uber as well as classifying them accordingly. All the physical resources in Uber Company such
as computer, laptops, cars, etc. are to be identified and classify them accordingly (Dhillon, Syed
& Pedron, 2016). There are hardware resources as well as software resources in a company and
the resources keeps on changing and updating them from time to time is needed.
Step 2: Protecting the access of resources
Security plan involves protecting the resources in the organization. After identifying the
resources, all the resources are to be protected by using security equipment like firewalls, and
web gateways.
Step 3: Detecting threats and detecting attacks
The security plan that is made should have the ability to detect the threats or attacks
involved in the organization. Detecting threat, vulnerability, or detecting an attack are different

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Systems Security: IT Security Fundamentals, Vulnerabilities, and IBM Security Architecture
|5
|747
|57

Investigating Network Security
|20
|5617
|397

Cyber Security Improvement Plan Proposal
|5
|928
|93

Network Security & Its Vulnerabilities | Document
|9
|1749
|130

ICTNWK509 Design and Implement a Security Perimeter for ICT Networks
|11
|2802
|16

Network Security Assessment: Part 1 - Vulnerabilities Assessment
|9
|1577
|381