Thursday, June 13, 2019

Security Policy Analysis Essay Example | Topics and Well Written Essays - 250 words - 1

Security Policy Analysis - Essay ExampleThese companys make earnings from these projects (Luetge & Jauernig, n.d.). As a result, they adopt to mitigate risks facing the projects as one of the factors that will influence the project. In regard to that, there is a need to identify, examine and regulate the threats that may contact the completion of any project.The company also faces other threats not related to the projects in any manner. These form the institution risks. Most of them will attempt to handicap the system from achieving its objectives. It involves the organization settling on priorities concerning the efforts made in the institution and the use of resources for optimum achievement. It should span all the mission areas of the company.Assume you are a technical advisor for the Chief Information Officer (CIO) of your organization. The CIO sends you an email communicating that she wants to be briefed on OMB M-11-11 because the administrator has just added it to the list o f priorities for the organization. She has limited knowledge of the form _or_ system of government and needs to know how it will effect the organization, and what we have already accomplished towards meeting the requirements within the system.First, I would report on what OMB-11-11 is (Xceedium.com, 2015). In relation to that, it is a policy that advocates for the execution of identity verification among persons to facilitate authorization to have advance to information systems, networks and facilities in an organization.Next, I will report on the implementation of OMB-11-11. The application will entail a detailed procedure and use of software applications that will make the process simpler such as a Xsuite. The access control mechanism will offer privileges such as keeping track of passwords, access methods that rely on keys both for network and information systems. by means of such application software, it is possible to separate authorization and authentication to beef up sec urity especially in highly sensitive areas of

No comments:

Post a Comment

Note: Only a member of this blog may post a comment.