Verified Document

Computer Science Long-Term Planning And Term Paper

Long-term certification

On a more long-term basis it would be a good idea for the staff of the it department to seek Global information assurance certifications. "The SANS Institute offers this suite of certifications under the GIAC (Global Information Assurance Certification) program. While GIAC certifications are intended primarily for practitioners such as system administrators, and network engineers, there are a few that would be appropriate for early-career managers.

The GIAC Information Security Officer (GISO) is an entry-level certification that includes knowledge of threats, risks and best practices. The GIAC Security Essentials Certification (GSEC) is an intermediate-level certification that demonstrates basic information security knowledge for both practitioners and managers" (Gregory, 2003).

Conclusion

In order to continue to be successful the History Channel must develop a plan to protect its information systems from any and all threats that might be looming. The best way to do this is to make sure that the entire staff is aware of what threats are out there and how to deal with any issues should they arise, which is exactly what the goal of this plan is.

References

Gregory, P.H. (2003). Are security certifications worth it? Retrieved from http://www.computerworld.com/s/article/77849/Are_security_certifications_worth_it

_?taxonomyId=17&pageNumber=2

Gupta, U. (2011). Top 5 Certifications for 2012. Retrieved from http://www.bankinfosecurity.com/top-5-certifications-for-2012-a-4291/op-1

Information Technology Security Training Requirements: A Role -- and Performance-Based

Model. (n.d.). Retrieved from http://csrc.nist.gov/publications/nistpubs/800-16/800-

16.pdf

Security Network Checklist. (n.d.). Retreived from http://www.cisco.com/cisco/web/solutions/small_business/resource_center/articles/se cure_my_business/network_security_checklist/index.html

Most organizations try to administer security management for IA purposes at a distance. This is usually accomplished for common systems such as laptops, desktops or servers using an out of the box applications. This generally works well in these environments for common systems, but as soon as the complexity level or operational character of the systems change, they are left out of the loop and fall short of what is really needed (Information Systems Security Lifecycle Management, 2009).
Benefits of ISLLM

Key advantages of managing information via the lifecycle method include: consistency, inclusiveness, pro-activeness, proportionality and flexibility. ISSLM s a prerequisite for good corporate governance, but is also an integral part of good business conduct. It protects reputations and manages risk, as well as promoting a safe, secured transaction environment (Information Systems Security Lifecycle Management, 2009).

Disadvantages of ISLLM

Information systems are presently designed with no contemplation for Information Assurance (IA). This usually occurs because of miscommunication and lack of understanding of IA by the vendor and government when developing system requirements. Throughout the beginning phases of development, operational facets and shortcuts frequently trump ordinary security practices. The consequence is a system that is not only insecure, but does not hold to a lot of the policies that systems must follow. This is often a result of a variety of reasons, such as a shortage in funding, staffing or understanding of a complex system (Information Systems Security Lifecycle Management, 2009).

References

Information Systems Security Lifecycle Management. (2009). Retrieved from http://www.telecomsys.com/Libraries/Collateral_Documents/ISSLM_White_Paper.sflb.ashx

Sources used in this document:
References

Information Systems Security Lifecycle Management. (2009). Retrieved from http://www.telecomsys.com/Libraries/Collateral_Documents/ISSLM_White_Paper.sflb.ashx
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Information Systems Sunlife of
Words: 1467 Length: 5 Document Type: Term Paper

For the SunLife agents to be successful the accumulated experience and knowledge in the company need to be captured, and applied to the sales cycles and ongoing customer relationships. This is another major gap that is in the approach the company is taking with the implementation of Maestro today as well. SunLife is not taking into account the deep expertise and knowledge within the company to streamline and make

Google HR Workforce Planning and
Words: 1797 Length: 7 Document Type: Essay

Other organizations, however, must also include ample information regarding external and industry-wide trends as well as a variety of other factors, and the more comprehensive and accurate this information is, the more realistic workforce planning predictions will be (Flynn et al. 2010). Developing techniques to encourage employees to stay, to attract applicants, or to ease into individual or group terminations in a way that minimally disturbs the remaining workforce

Supply Chain Planning Under Uncertainty:
Words: 12190 Length: 44 Document Type: Research Proposal

Results from the study by Petersen, Ragatz and Monczka show that effective collaborative planning depends on information quality, and the trust level firms share. The authors purport: "Collaborative planning activities between supply chain partners are expected to lead to better performing supply chains" (Petersen, Ragatz & Monczka, Introduction section ¶ 1). In addition, numerous other researchers have also explored the perception relating to supplier alliances, that enhanced collaborative planning

Computer Security People, Process and Technology Are
Words: 4780 Length: 15 Document Type: Capstone Project

Computer Security People, process and technology are three things which are involved in information security. Biometrics, passwords and firewalls are some of the technical measures and these are not enough in justifying threats to information. In order to protect information from destruction and to secure systems, a blend of different procedures is required. While deploying information security some factors need to be considered for instance processes like de-registration and registration

Planning: A Literature Review in
Words: 5072 Length: 16 Document Type: Literature Review

The value of this case study is demonstrative. It demonstrates how contingency planning can be used, but it says nothing of the results. A quasi-experimental design was used by Chermack & Kim (2008) to explore the effect of scenario planning on decision-making styles. It was found hat participants in scenario planning have a tendency to make a mental shift towards intuitive-based decision-making styles after their participation in the scenario planning

Physical Education and Computer Technology
Words: 11589 Length: 40 Document Type: Term Paper

Computers Are an Underutilized Resource for High School Physical Education Teachers Computers have become an integral part of the high school learning environment, beginning in the early 1990s. They provide a vast variety of resources to help enhance student education through presentation of material in a variety of media and act as an enhancement to teacher lessons. They can sometimes free teachers from routine tasks, allowing them to bring greater depth

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now