Computer Science Long-Term Planning And Term Paper

Long-term certification

On a more long-term basis it would be a good idea for the staff of the it department to seek Global information assurance certifications. "The SANS Institute offers this suite of certifications under the GIAC (Global Information Assurance Certification) program. While GIAC certifications are intended primarily for practitioners such as system administrators, and network engineers, there are a few that would be appropriate for early-career managers.

The GIAC Information Security Officer (GISO) is an entry-level certification that includes knowledge of threats, risks and best practices. The GIAC Security Essentials Certification (GSEC) is an intermediate-level certification that demonstrates basic information security knowledge for both practitioners and managers" (Gregory, 2003).

Conclusion

In order to continue to be successful the History Channel must develop a plan to protect its information systems from any and all threats that might be looming. The best way to do this is to make sure that the entire staff is aware of what threats are out there and how to deal with any issues should they arise, which is exactly what the goal of this plan is.

References

Gregory, P.H. (2003). Are security certifications worth it? Retrieved from http://www.computerworld.com/s/article/77849/Are_security_certifications_worth_it

_?taxonomyId=17&pageNumber=2

Gupta, U. (2011). Top 5 Certifications for 2012. Retrieved from http://www.bankinfosecurity.com/top-5-certifications-for-2012-a-4291/op-1

Information Technology Security Training Requirements: A Role -- and Performance-Based

Model. (n.d.). Retrieved from http://csrc.nist.gov/publications/nistpubs/800-16/800-

16.pdf

Security Network Checklist. (n.d.). Retreived from http://www.cisco.com/cisco/web/solutions/small_business/resource_center/articles/se cure_my_business/network_security_checklist/index.html

...

Most organizations try to administer security management for IA purposes at a distance. This is usually accomplished for common systems such as laptops, desktops or servers using an out of the box applications. This generally works well in these environments for common systems, but as soon as the complexity level or operational character of the systems change, they are left out of the loop and fall short of what is really needed (Information Systems Security Lifecycle Management, 2009).
Benefits of ISLLM

Key advantages of managing information via the lifecycle method include: consistency, inclusiveness, pro-activeness, proportionality and flexibility. ISSLM s a prerequisite for good corporate governance, but is also an integral part of good business conduct. It protects reputations and manages risk, as well as promoting a safe, secured transaction environment (Information Systems Security Lifecycle Management, 2009).

Disadvantages of ISLLM

Information systems are presently designed with no contemplation for Information Assurance (IA). This usually occurs because of miscommunication and lack of understanding of IA by the vendor and government when developing system requirements. Throughout the beginning phases of development, operational facets and shortcuts frequently trump ordinary security practices. The consequence is a system that is not only insecure, but does not hold to a lot of the policies that systems must follow. This is often a result of a variety of reasons, such as a shortage in funding, staffing or understanding of a complex system (Information Systems Security Lifecycle Management, 2009).

Sources Used in Documents:

References

Information Systems Security Lifecycle Management. (2009). Retrieved from http://www.telecomsys.com/Libraries/Collateral_Documents/ISSLM_White_Paper.sflb.ashx


Cite this Document:

"Computer Science Long-Term Planning And" (2012, August 22) Retrieved April 19, 2024, from
https://www.paperdue.com/essay/computer-science-long-term-planning-and-75260

"Computer Science Long-Term Planning And" 22 August 2012. Web.19 April. 2024. <
https://www.paperdue.com/essay/computer-science-long-term-planning-and-75260>

"Computer Science Long-Term Planning And", 22 August 2012, Accessed.19 April. 2024,
https://www.paperdue.com/essay/computer-science-long-term-planning-and-75260

Related Documents

For the SunLife agents to be successful the accumulated experience and knowledge in the company need to be captured, and applied to the sales cycles and ongoing customer relationships. This is another major gap that is in the approach the company is taking with the implementation of Maestro today as well. SunLife is not taking into account the deep expertise and knowledge within the company to streamline and make

Other organizations, however, must also include ample information regarding external and industry-wide trends as well as a variety of other factors, and the more comprehensive and accurate this information is, the more realistic workforce planning predictions will be (Flynn et al. 2010). Developing techniques to encourage employees to stay, to attract applicants, or to ease into individual or group terminations in a way that minimally disturbs the remaining workforce

Results from the study by Petersen, Ragatz and Monczka show that effective collaborative planning depends on information quality, and the trust level firms share. The authors purport: "Collaborative planning activities between supply chain partners are expected to lead to better performing supply chains" (Petersen, Ragatz & Monczka, Introduction section ¶ 1). In addition, numerous other researchers have also explored the perception relating to supplier alliances, that enhanced collaborative planning

Computer Security People, process and technology are three things which are involved in information security. Biometrics, passwords and firewalls are some of the technical measures and these are not enough in justifying threats to information. In order to protect information from destruction and to secure systems, a blend of different procedures is required. While deploying information security some factors need to be considered for instance processes like de-registration and registration

The value of this case study is demonstrative. It demonstrates how contingency planning can be used, but it says nothing of the results. A quasi-experimental design was used by Chermack & Kim (2008) to explore the effect of scenario planning on decision-making styles. It was found hat participants in scenario planning have a tendency to make a mental shift towards intuitive-based decision-making styles after their participation in the scenario planning

Computers Are an Underutilized Resource for High School Physical Education Teachers Computers have become an integral part of the high school learning environment, beginning in the early 1990s. They provide a vast variety of resources to help enhance student education through presentation of material in a variety of media and act as an enhancement to teacher lessons. They can sometimes free teachers from routine tasks, allowing them to bring greater depth