StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Nobody downloaded yet

The Role of a Security Consultant in the Architecture Design Process - Report Example

Cite this document
Summary
The objectives of the particular paper "The Role of a Security Consultant in the Architecture Design Process" included determining how security professionals seek to ensure that threats and controls are in balance during the architecture design process…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.2% of users find it useful

Extract of sample "The Role of a Security Consultant in the Architecture Design Process"

Download file to see previous pages

The study used a qualitative research design. Primary data was collected through semi-structured qualitative interviews. Secondary data was collected through document analysis. Data analysis was through the qualitative interpretive method. The study summarised into three: To prevent overspending on unnecessary security devices, to prevent risks of liability due to failure to comply with regulatory requirements, and most lasting, to ensure that all the security layers or components serve their objective as required.

These roles are fixed to the Defence in-depth theory and systems approach, as they make sure that the security architecture is designed to operate as part of the security system in order to holistically detect, delay, deter, and respond to security threats.IntroductionThe roles and responsibilities of security management professionals have expanded in scope since the 1990s parallel to the expansion of the private sector and the tendencies by firms to downsize, outsource, and adopt the technology (CISSP, 2012; Sennewald, 2012).

The rise in demand for security professional services has also been persistent since 9/11. While security consulting has grown, the roles of security professionals continue to remain unclear (Farah, 2004; Walek & Masar, 2013).Many organizations see a security professional be an individual tasked with recommending proper, cost-effective strategies to attain a wide range of security objectives, crime prevention, loss control, and investigative roles (Scholl et al, 2010). This is, however, insufficient.

Obviously, a rewarding dimension of security professionals is the opportunity to manage and control an organization’s security (Tsohou et al., 2015). The security professionals seek to ensure that threats and controls are in balance (Bogers et al., 2008).Designing secure system architecture and its implementation and application are costly, time-consuming, and complex processes that demand expertise and intervention of a security professional, who is the expert for a particular problem domain.

...Download file to see next pages Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(The Role of a Security Consultant in the Architecture Design Process Report Example | Topics and Well Written Essays - 6250 words, n.d.)
The Role of a Security Consultant in the Architecture Design Process Report Example | Topics and Well Written Essays - 6250 words. https://studentshare.org/architecture/2065718-journal-paper
(The Role of a Security Consultant in the Architecture Design Process Report Example | Topics and Well Written Essays - 6250 Words)
The Role of a Security Consultant in the Architecture Design Process Report Example | Topics and Well Written Essays - 6250 Words. https://studentshare.org/architecture/2065718-journal-paper.
“The Role of a Security Consultant in the Architecture Design Process Report Example | Topics and Well Written Essays - 6250 Words”. https://studentshare.org/architecture/2065718-journal-paper.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Role of a Security Consultant in the Architecture Design Process

Disaster Recovery Planning

Disaster recovery plan Name Date Organizational management This is the process which involves organizing, controlling, planning and leading the efforts of members in an organization to facilitate the achievement of the goals stated.... typical organizational network acrhitecture Disaster recovery plan This is a well-documented set of instructions or a process used to recover and to protect business information and technology infrastructures in occurrence of a disaster....
5 Pages (1250 words) Essay

IT Consultant & Methodolgies

Additionally, a cracker can achieve this objective by paying attention to the organization's processes and procedures in the process getting to identify the existing loopholes that can be used by the cracker to attack.... Exploitation of the configuration, individual networks, and exploit nature of design and architecture can also enable accessibility by a cracker to the organization's system using an existing user's account.... The availability of weaknesses in architecture, functionality, design, and configuration of individual networks poses a great danger to the firm's information and privacy....
3 Pages (750 words) Essay

Object-Oriented Modeling Issues

The CIO is a strategic decision maker for every information needs of the organization and makes sure that all penetrations for cost, effort and monetary optimization are performed at… the role of the CIO is to understand, identify, prioritize and implement the information needs and requirements for growth, better productivity and seamless integrations of required business units for better communication of information in an accurate and timely manner.... Chief Information Officer (CIO) is a highest role on the technical side and embraces the technology change, adaptation, measuring deviations, adopting better strategies and managing the role of the IT in an organization....
10 Pages (2500 words) Essay

A Small Country Fostering Greatest Happiness to People

An author of the paper will focus on urban design and economic policies.... An effectual urban design can only be accomplished if there is a good system of the government, good organization, having entertainment and advanced urban design.... The government can perfectly design a country though happiness can only be achieved if put into practice.... Some of the national interests include good infrastructure, good leadership or system of government, favorable urban design, generating entertainment events, favorable economic policies and technological advancement among others....
7 Pages (1750 words) Term Paper

Computer Network Server Configuration

In the process of selecting a disk drive, there should be a consideration of Reporting and the Self-monitoring technology.... These will ensure that there is adequate security for the server subsequently making the server to work continuously.... … Building a Server HUThe computer network server is configurable efficient and reliable per the needs of a given business....
6 Pages (1500 words) Assignment

Building a Secure Computing System

This assignment "Building a Secure Computing System" presents information security as inclusive of data security, information security management, network security, and data security.... The policy is the major part of all information security efforts.... The protection of confidentiality is facilitated by the execution of the following measures; secure document storage, end users education, the classification of information, and the use of general security policies....
8 Pages (2000 words) Assignment
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us