Verified Document

Computer Science Long-Term Planning And Term Paper

Long-term certification

On a more long-term basis it would be a good idea for the staff of the it department to seek Global information assurance certifications. "The SANS Institute offers this suite of certifications under the GIAC (Global Information Assurance Certification) program. While GIAC certifications are intended primarily for practitioners such as system administrators, and network engineers, there are a few that would be appropriate for early-career managers.

The GIAC Information Security Officer (GISO) is an entry-level certification that includes knowledge of threats, risks and best practices. The GIAC Security Essentials Certification (GSEC) is an intermediate-level certification that demonstrates basic information security knowledge for both practitioners and managers" (Gregory, 2003).

Conclusion

In order to continue to be successful the History Channel must develop a plan to protect its information systems from any and all threats that might be looming. The best way to do this is to make sure that the entire staff is aware of what threats are out there and how to deal with any issues should they arise, which is exactly what the goal of this plan is.

References

Gregory, P.H. (2003). Are security certifications worth it? Retrieved from http://www.computerworld.com/s/article/77849/Are_security_certifications_worth_it

_?taxonomyId=17&pageNumber=2

Gupta, U. (2011). Top 5 Certifications for 2012. Retrieved from http://www.bankinfosecurity.com/top-5-certifications-for-2012-a-4291/op-1

Information Technology Security Training Requirements: A Role -- and Performance-Based

Model. (n.d.). Retrieved from http://csrc.nist.gov/publications/nistpubs/800-16/800-

16.pdf

Security Network Checklist. (n.d.). Retreived from http://www.cisco.com/cisco/web/solutions/small_business/resource_center/articles/se cure_my_business/network_security_checklist/index.html

Most organizations try to administer security management for IA purposes at a distance. This is usually accomplished for common systems such as laptops, desktops or servers using an out of the box applications. This generally works well in these environments for common systems, but as soon as the complexity level or operational character of the systems change, they are left out of the loop and fall short of what is really needed (Information Systems Security Lifecycle Management, 2009).
Benefits of ISLLM

Key advantages of managing information via the lifecycle method include: consistency, inclusiveness, pro-activeness, proportionality and flexibility. ISSLM s a prerequisite for good corporate governance, but is also an integral part of good business conduct. It protects reputations and manages risk, as well as promoting a safe, secured transaction environment (Information Systems Security Lifecycle Management, 2009).

Disadvantages of ISLLM

Information systems are presently designed with no contemplation for Information Assurance (IA). This usually occurs because of miscommunication and lack of understanding of IA by the vendor and government when developing system requirements. Throughout the beginning phases of development, operational facets and shortcuts frequently trump ordinary security practices. The consequence is a system that is not only insecure, but does not hold to a lot of the policies that systems must follow. This is often a result of a variety of reasons, such as a shortage in funding, staffing or understanding of a complex system (Information Systems Security Lifecycle Management, 2009).

References

Information Systems Security Lifecycle Management. (2009). Retrieved from http://www.telecomsys.com/Libraries/Collateral_Documents/ISSLM_White_Paper.sflb.ashx

Sources used in this document:
References

Information Systems Security Lifecycle Management. (2009). Retrieved from http://www.telecomsys.com/Libraries/Collateral_Documents/ISSLM_White_Paper.sflb.ashx
Cite this Document:
Copy Bibliography Citation

Related Documents

Computer Information Systems Sunlife of
Words: 1467 Length: 5 Document Type: Term Paper

For the SunLife agents to be successful the accumulated experience and knowledge in the company need to be captured, and applied to the sales cycles and ongoing customer relationships. This is another major gap that is in the approach the company is taking with the implementation of Maestro today as well. SunLife is not taking into account the deep expertise and knowledge within the company to streamline and make

Computer Security People, Process and Technology Are
Words: 4780 Length: 15 Document Type: Capstone Project

Computer Security People, process and technology are three things which are involved in information security. Biometrics, passwords and firewalls are some of the technical measures and these are not enough in justifying threats to information. In order to protect information from destruction and to secure systems, a blend of different procedures is required. While deploying information security some factors need to be considered for instance processes like de-registration and registration

Planning: A Literature Review in
Words: 5072 Length: 16 Document Type: Literature Review

The value of this case study is demonstrative. It demonstrates how contingency planning can be used, but it says nothing of the results. A quasi-experimental design was used by Chermack & Kim (2008) to explore the effect of scenario planning on decision-making styles. It was found hat participants in scenario planning have a tendency to make a mental shift towards intuitive-based decision-making styles after their participation in the scenario planning

Computer Hacker Nefarious Notions III
Words: 9646 Length: 35 Document Type: Term Paper

(Hackers Chronology, 2006). 1989 The first case of cyber espionage is recognized in Germany (west). This reportedly involved the CHAOS computer club. "Mentor releases the hacker manifesto Conscience of a hacker, which ends with the intriguing line: 'You may stop the individual, but you can't stop us all.'" (Hackers Chronology, 2006). 1990 Electronic Frontier, Freedom on the Internet advocacy group, is launched Polymorphic viruses (which modifies themselves when they spread), along with other sophisticated kinds of

Science Fiction & Feminism Sci-Fi & Feminism
Words: 13761 Length: 50 Document Type: Chapter

SCIENCE FICTION & FEMINISM Sci-Fi & Feminism Origins & Evolution of Science Fiction As with most things including literature, science fiction has progressed and changed a lot over the years. Many works of science fiction were simply rough copies and following the altready-established patterns of prior authors. However, there has always been authors and creators that push the envelope and forge new questions and storylines that have not been realized or conceptualized before.

Capacity Planning and Performance Monitoring
Words: 788 Length: 3 Document Type: Case Study

This is why cloud computing is still an imprecise science at best, with significant lags in performance and inconsistent performance on large-scale performance requirements (Luo, 2010). VMWare is concentrating on these aberrations in performance to create optimized product and services mix for each of their software and hardware products, looking to ensure a high level of computer capacity utilization over time. Amazon's lessons learned in managing one of the

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now