Sunday, October 6, 2019

Security project planning Research Paper Example | Topics and Well Written Essays - 500 words

Security project planning - Research Paper Example el in order to analyze the information security plan as well as its existing situation of the information security attempts with respect to a number of stages presented in the bull eye model. Basically, the bull eye model allows project teams especially the project planners to find out the status of their progress with respect to their information security efforts. It tells them in which areas they need to pay more attention and expand their information security efforts and potential. Additionally, the bull eye model depends on a process of determining the project plans in a series in the context of four layers, which include policies, networks, systems, and applications. These layers are illustrated in figure1. The figure1 shows how these layers are connected with each other (CQUniversity, 2009; Joshi, 2013). Systems: This layer deals with all kinds of systems that can be used by the people. In this scenario, these systems can comprise computers used as servers, systems employed for process control and manufacturing systems and desktop computers. In addition, the bull’s eye model can be utilized to assess the series of actions that need to be performed to put together elements of the information security plan into a project plan. There is a close relationship between all the layers and these layers can be associated with each other in the following ways (CQUniversity, 2009; Joshi, 2013): Until an organization does not develop, communicate and implement an effective and useable information technology and information security policy, it should not spend further resources on additional controls. Once it is ensured that there is an effective policy is prepared, systems are safe, networks are secure, an organization should pay attention to the evaluation and cure of the security of the firm’s applications installed on systems (CQUniversity, 2009; Joshi,

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.