Monday, September 9, 2019

Security Policy Analysis Essay Example | Topics and Well Written Essays - 250 words - 1

Security Policy Analysis - Essay Example These company’s make earnings from these projects (Luetge & Jauernig, n.d.). As a result, they need to mitigate risks facing the projects as one of the factors that will influence the project. In regard to that, there is a need to identify, examine and regulate the threats that may affect the completion of any project. The company also faces other threats not related to the projects in any manner. These form the institution risks. Most of them will attempt to obstruct the system from achieving its objectives. It involves the organization settling on priorities concerning the efforts made in the institution and the use of resources for optimum achievement. It should span all the mission areas of the company. Assume you are a technical advisor for the Chief Information Officer (CIO) of your organization. The CIO sends you an email communicating that she wants to be briefed on "OMB M-11-11" because the administrator has just added it to the list of priorities for the organization. She has limited knowledge of the policy and needs to know how it will effect the organization, and what we have already accomplished towards meeting the requirements within the system. First, I would report on what OMB-11-11 is (Xceedium.com, 2015). In relation to that, it is a policy that advocates for the implementation of identity verification among persons to facilitate authorization to have access to information systems, networks and facilities in an organization. Next, I will report on the implementation of OMB-11-11. The application will entail a detailed procedure and use of software applications that will make the process simpler such as a Xsuite. The access control mechanism will offer privileges such as keeping track of passwords, access methods that rely on keys both for network and information systems. Through such application software, it is possible to separate authorization and authentication to beef up security especially in highly sensitive areas of

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.