logo

Developing a Strategic Information Security Plan

   

Added on  2019-09-26

18 Pages4064 Words65 Views
 | 
 | 
 | 
Running head: STRATEGIC INFORMATION SECURITYStrategic Information SecurityStudent Name:Course work:University:
Developing a Strategic Information Security Plan_1

STRATEGIC INFORMATION SECURITY1AbstractThe strategic information security plan is used to secure the information technology of the company which creates a competitive advantage for the company. The plan protects the security of information technology from damages. The consistent and integrated methodologies are used in the plans which help in develop, design and implement the plan in an organization. The risk management is done by the company through five phases. The protection mechanism is used to protect the information technology from threats and contents. The personnel security is used at three levels of the organization namely, management, staff and technical department. The laws and ethics include professional ethics and laws related to other laws such as cyber laws. The PRTnetwork monitors report is used by the company for protecting the networks from various threatswhich help to run the business successfully.
Developing a Strategic Information Security Plan_2

STRATEGIC INFORMATION SECURITY2Table of ContentsAbstract............................................................................................................................................1Introduction......................................................................................................................................3Controlling Risk...............................................................................................................................3Protection Mechanism.....................................................................................................................5Personnel and Security....................................................................................................................6Law and Ethics................................................................................................................................7PRT Network Monitor Report.........................................................................................................8Conclusion.......................................................................................................................................9References......................................................................................................................................11
Developing a Strategic Information Security Plan_3

STRATEGIC INFORMATION SECURITY3IntroductionIn this present paper, we will discuss the strategic information security which a strategic plan used by the organization to mitigate the information risk which is related to processes, people, and technologies. The paper also describes the controlling risk, protection mechanism, personal and security, law and ethics and PRT network monitor report on the basis of which conclusion has been made. The strategic information security plan helps to protect the integrity, confidentiality, and information of the organization. The effective strategic information plan helps to create a competitive advantage for the company which comprises of complying with the standards of the industry, damage security incident avoidance, business reputation sustainment, and supporting commitments to the consumers, stakeholders, shareholders, suppliers and others (LeVeque et al., 2005). The plan includes the briefing of consistent and integrated methodologies which is used todesign, develop and implement in the organization. It also includes the detection of information and criteria to resolve the problem, decreasing the time of delivery by solution concept through implementation, for the delivering of efficient results the proactive decision approach, is used, removal of redundancy which helps to achieve the objectives of an organization, managing of human resource in a most efficient and effective manner and evolving into the company in whichsecurity is integrated with application, workflows, data, process into a unified environment (Lederer et al., 1992). The development of security strategic plan requires an initial step to find the gap between the current position and existing efforts. The standards will be explained by the assessment of information security program. The more steps for the development of strategy includes a briefing
Developing a Strategic Information Security Plan_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents