Thus, enterprises must plan for space for "machine rooms that afford high availability and reliability to departmental server resources as well as appropriate network security for these resources" (Clotfelter, 2013, p 7).Then, for more restricted data, in-house servers can provide an extra layer of security to help ensure that such sensitive data remains in proper hands. To protect such restricted data, proper identity management strategies should include "a cross functional client and technical team abstracted requirements for updates" (Clotfelter, 2013, p 5). Thus, enterprise organizations must rely on a tiered network infrastructure that provides a number of different levels of security for various elements of the enterprise organization.
Security Plan
Security plans are a necessary part of it protection precautions.
It is important that security plans are flexible and fluid in order to adapt, both to the internal changes of the enterprise organization, but also to the constantly evolving external threat of hackers and security breaches (Clotfelter, 2013). It security systems must be able to adapt to changing needs within the organization which they protect. Here, the research suggests that "the enterprise security architecture must ensure confidentiality, integrity, and availability throughout the enterprise and align with the corporate business objectives" (Arconati, 2002, p 2). It must help facilitate the meeting organizational goals, by securing a solid ground free of technological threats for the organization to grow. As such, all security plans must be highly detailed and tailored to each organization's specific goals and objectives. Specific goals may hinder some aspects of more general it security plan, and must be adapted in order to fit organizational needs. In this sense, "the objective of enterprise security architecture is to provide the conceptual design of the network security infrastructure, related to security mechanisms, and related to security policies and procedures," yet still able to adapt based on its conceptual nature (Arconati, 2002, p 2). Additionally, the threat of external technology develops a rapid pace. This research has already evaluated the sophisticated nature of attacks on enterprise it systems. As previously discussed, it threats are constantly changing, and are thus an incredible dangerous and intangible enemy to fight. Stiff security plans that do not have room for adaptations in IDS systems or penetration testing will surely lead to an enterprise organization falling...
Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.
Get Started Now