Verified Document

Insecurity Managing Issues Of Information Insecurity The Essay

¶ … Insecurity Managing Issues of Information Insecurity

The field of Information Technology is unique among professional disciplines due to its high-paced atmosphere. The quick change of technology, particularly within the context of systems design and electronic information data-basing means that management in this field must be prepared to acclimate to security demands, practice obstacles and end-user needs all while implementing a system that conforms to the particular needs of the firm in question. Technological advance is creating a highly integrated standard for operational usage, particularly in achieving a balance between security imperatives and freedom of usage. Indeed, this concern is at the center of the discussion here, which considers how best to pursue a business IT strategy in the face of so many options.

As the discussion here will note, there is a general emphasis on employing certain 'best practice' strategies in implementing Information Technology security strategies. The background to our case discussion denotes that this approach is often a consequence of a rather problematic attitude. Namely, the use of 'best practice' IT security strategies will not always occur because of the company's confidence in the selected approach but will often be employed because deferment to industry standard practices can help to diminish culpability for system failures or vulnerabilities. This underscores the decision made here to pursue a security strategy that combines the most appropriate elements of Best Practice with elements of...

Parts of this document are hidden

View Full Document
svg-one

Here, the article by Microsoft TechNet (2011) offers a useful first step, and one that combines the two approaches. Here, the article reports, "in order to effectively secure your network environment, you must first become familiar with all of its components. Assessing your infrastructure involves not only identifying all assets and security issues, but also monitoring the quality of your overall security program. To determine your specific network security needs, you should consider several issues. First, you need to be sure that your IT staff has the necessary executive support to run a successful security program. If you find yourself on the same page with management on how to proceed, you should focus on establishing a process to identify and analyze security risks on an ongoing basis. Without such a plan in place, you run the risk of initiating projects that are not solving your largest security problems." (Microsoft TechNet, p. 1)
And certainly, few small or medium businesses (SMBs) can afford to implement a major IT overhaul only to witness failure. This is why there is a distinct need to conduct the step above, recommended as a phase in the Best Practice strategy but also implying that said strategy is not mutually exclusive from steps reflecting a Best Fit approach. Here, scanning the network environment and the environment attendant to the organization's culture can help key decision-makers to identify areas of potential difficulty,…

Sources used in this document:
Works Cited:

Microsoft TechNet. (2011) Enterprise security best practices. Microsoft. Retrieved December 2, 2011, from http://technet.microsoft.com/en-us/library/dd277328.aspx

Phifer, L. (2011) 5 best practices for securing remote access. E-security Planet. Retrieved December 2, 2011, from http://www.esecurityplanet.com/views/article.php/3937121/5-Best-Practices-for-Securing-Remote-Access.htm

Venafi. (2011) 2011 IT security best practices. Retrieved December 2, 2011, from http://www.venafi.com/Collateral_Library/Venafi-Top-Five-Best-Practices-and-Failures.pdf
Cite this Document:
Copy Bibliography Citation

Related Documents

Microsoft Access Computing Technology Has Greatly Aided
Words: 860 Length: 3 Document Type: Essay

Microsoft Access Computing technology has greatly aided human technology and has presented new and easier ways for goals and objectives to be accomplished by its users. Technology works best when it is mostly aligned with the intent and purposes of its wielders and it is important to understand and know how such applications work and operate in order to get the most out of these tools. The purpose of this essay is

Microsoft Dupont Analysis of Microsoft Dupont Analysis
Words: 562 Length: 2 Document Type: Essay

Microsoft DuPont DuPont Analysis of Microsoft DuPont Analysis Overview The DuPont Analysis is a type of analysis that provides a more detailed look at a company's Return on Equity (ROE) by breaking it into three main components. The three components are profit margin, asset turnover and a leverage factor. By separating the ROE into these smaller categories, investors can quickly identify how effectively or efficiently a company is using their resources. If any

Microsoft Monopoly Why Was Microsoft Investigated for
Words: 1173 Length: 3 Document Type: Essay

Microsoft Monopoly Why was Microsoft investigated for antitrust behavior? In the eyes of some legal analysts, Microsoft was investigated and taken to court over antitrust allegations because of the belief that it would not live up to its own word about what it intended (McKenzie and Shughart, 1998). There was little doubt about the fact that by the mid- to late-1990s Microsoft had virtual control over the operating system (Windows) that it

Microsoft's Vega Project
Words: 1351 Length: 4 Document Type: Case Study

Microsoft's Vega Project Microsoft Vega Project Companies' success on the market relies on the performance of their employees, which is determined by several factors. Human resources practices in these companies aim at recruiting and maintaining skilled employees that can develop as strong assets to them, while developing motivational strategies in accordance with employees' needs and preferences. Microsoft is one of the companies that invest the most in the development of their employees. Situation

Microsoft Windows File Systems: Comparison and Contrast
Words: 1164 Length: 3 Document Type: Essay

Microsoft Windows File Systems: Comparison and Contrast The standard versions of Windows use three types of file systems: FAT, exFAT, and NTFS. Windows 8 server also uses ReFS. The 8 server (Windows Server 2012) is the only version that uses that type of file system, as the other versions of Windows are not able to boot from that type of file system at all. In order to better understand these file

Microsoft Management the Four Functions of Management
Words: 773 Length: 2 Document Type: Essay

Microsoft Management The Four Functions of Management at Microsoft The ability of any organization to stay agile and responsive to market conditions is in large part determined by how balanced their management structure is, and how effective their management practices are. At Microsoft the four functions of management are used to create a scalable foundation of future market growth while aligning their internal resources to each opportunity. The intent of this analysis

Sign Up for Unlimited Study Help

Our semester plans gives you unlimited, unrestricted access to our entire library of resources —writing tools, guides, example essays, tutorials, class notes, and more.

Get Started Now