¶ … System Security
"As a manager, how would you plan on securing organizational data? How does security effectiveness and relative cost figure into those plans?"
The more critical aspect of any enterprise-wide security management strategy is to align system resources to the strategic initiatives and goals of an organization. Increasingly this is being accomplished through the use of role-based access and authentication privileges and process workflows that audit and evaluate use of sensitive information (Shih, Wen, 2005). The role of enterprise security management drastically changes however when ubiquitous Web Services are used for capturing, aggregating, analyzing and effectively using confidential data to make financial decisions (Phifer, 2011). The intent of this analysis is to evaluate how intrusion and intrusion detection systems can be used in the 21st century, state-of-the-art IT systems that are to a large extent Cloud-based and often have remote access points that make them particularly vulnerable (Phifer, 2011). Also included is an assessment of the types and threats from hackers and the risk they pose to confidential corporate data. Enterprise best practices dictates that a company control assets by multiple levels, authentication approaches and through architectural constraints that minimize risk while also providing agility and quickness of retrieval (Microsoft, 2011).
Enterprise System Security in the 21st Century
In terms of arbitrating the costs of IT security for Web-based services and applications, the proliferation of Cloud-based enterprise applications and systems has completely re-order Web security (Phifer, 2011). Many enterprises begin initially by concentrating on securing the entry points of their networks at the Virtual Private…
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now