StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

The Challenge of Consistency and Security - Assignment Example

Cite this document
Summary
This paper "The Challenge of Consistency and Security" focuses on the recent news of intelligence leak from the NSA third-party contractor that has called for the greater need for security in the architecture and infrastructure for both classified and unclassified assets in MIDPAC region.  …
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER91.1% of users find it useful
The Challenge of Consistency and Security
Read Text Preview

Extract of sample "The Challenge of Consistency and Security"

The Challenge of Consistency and SecuritySituation Recent news of intelligence leak from the NSA third party contractor has called for the greater need for security in the architecture and infrastructure for both classified and unclassified assets in MIDPAC region. Assets include data as well as materials and inventory resources.One of the key responsibilities to avoid security issues is to keep inventories updated to early detect security and/or infrastructure breach. Each node in the supply chain from procurement, transportation, inventory management to production control and disposal opens possibility of compromise that could undermine operational level of service of the organizationExperience has also shown that the hiring of third party vendor in IT, logistics management, infrastructural and technology upgrade and other functions in the organization opens the possibility of unauthorized intrusion, breach and use of such data and infrastructure.

Challenges Consistency in the enforcement of protocols that maintain the integrity of IT as well as physical infrastructure is needed such as IA standard plans, policies and /or procedures governing DON,DOD, USMC and regional IT capability operation, integrity, security compliancy, availability and sustainment including IP video surveillance, Intrusion Detection System (IDS), cipher locks and approved storage containers. Consistent implementation of these protocols not only to avoid data and infrastructure compromise but also to deter attempt any forms of breach.

Results Effective leadership and overseeing of personnel helps to avoid human inconsistency in the implementation and enforcement of security and compliance protocols. It also helped to maintain consistency in the compliance in enforcement of protocols of security and inventory control with the implementation of Information Assurance program that does not only maintain consistence but also determines and recommend appropriate actions to improve operational effectiveness and efficiency. Having a consistent data center standard, processes and procedure as well as intrusion free record in security meets the service as well as well as security objectives in all operational areas.

ActionsThe challenge of consistency and security is addressed by the implementation of Information Assurance program that would not only determine and recommend appropriate actions to improve operational effectiveness and efficiency but also maintain the structural as well as data integrity consistent with the service level goals of the organization.The implementation and compliance to best practices in Logistics Management of implementing quality assurance in every node of supply chain helps to maintain sound inventory.

The coordination with project managers Contracting Officer’s Representatives (COR) in the design and construction of new facilities and in modernization, restoration, or sustainment projects for existing facilities ensures compliance with DoD Unified Facilities Criteria (UFC) and thus helps achieve service level objective in all operational areas.

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“The Challenge of Consistency and Security Assignment”, n.d.)
The Challenge of Consistency and Security Assignment. Retrieved from https://studentshare.org/business/1661075-self-assessments
(The Challenge of Consistency and Security Assignment)
The Challenge of Consistency and Security Assignment. https://studentshare.org/business/1661075-self-assessments.
“The Challenge of Consistency and Security Assignment”, n.d. https://studentshare.org/business/1661075-self-assessments.
  • Cited: 0 times

CHECK THESE SAMPLES OF The Challenge of Consistency and Security

Information Security

Determining an appropriate level of information security is often complicated by the fact that different professionals, be they general managers or IT specialists, often perceive security needs through a different set of priorities.... security specialists often see complexity and increasingly secure systems as a desirable business practice (Angus, 2007; Miller, 2005) whereas general managers are more likely to view information security practices within a larger business context....
4 Pages (1000 words) Essay

The Hidden Threat to the Digital Future

E-commerce has been part of the marketing and sales methodology for such organizations since the Internet opened to commercial organizations in 1995.... Organizations also make use of the Internet to allow their employees to telecommute and to facilitate communication with business partners.... hellip; An enterprise level organization (10,000+ user accounts) will have a mixture of platforms and customized applications (legacy systems)....
3 Pages (750 words) Essay

Developing Security Policy

It characterizes the challenge or issue that management is dealing with.... Moreover, this is accomplished by listing a variety of alternatives that can be used A security policy specifically is the imperative foundation on which a valuable and complete security program can be developed.... This significant constituent of the overall security architecture is usually ignored.... A security policy is the most important way in which management's decision for security is converted into specific, measurable, and testable goals and objectives....
9 Pages (2250 words) Essay

Nokia Siemens: Security Management Challenges

… Nokia is currently facing security challenges.... In managing the security challenges, the management must well analyze their responses on the same issue in regards to the effects of their actions on the company's revenue and.... Nonetheless, like any other company, Nokia is facing numerous managerial challenges including security architecture challenges that will form the main discussion in this essay (Steinbock, 2007)....
4 Pages (1000 words) Essay

Developing of New Boutique Hotels

The paper 'Developing of New Boutique Hotels' presents the operational challenges associated with developing new Boutique hotels which include the challenge of staffing since staffs are the ones involved in offering and maintaining unique customer experiences.... hellip; Hiring and training highly motivated staffs, who will always keep the right attitude and consistently ensure the customers are satisfied is a big challenge.... Additionally, sustaining a high level of motivation for such staffs is yet another challenge, since the staffs are required to be enthusiastic all the time....
1 Pages (250 words) Assignment

Whether Independence Is Consistent with Scotland Keeping the Pound

The paper "Whether Independence Is Consistent with Scotland Keeping the Pound" states that entail strong financial positioning and the capability towards establishing a clear as well as robust banking system ultimately represents the consistency of independence with Scotland keeping the Pound....
7 Pages (1750 words) Essay

Data Collection Tools, Methods, and Challenges

The only challenge with use of interview as a tool of collecting qualitative research data is that it is time consuming thus there is need for preparation, transcription and scheduling for interview.... In the paper “Data Collection Tools, Methods, and Challenges” the author analyzes a systematic process of selecting, measuring and gathering information on certain variables of interest with the sole purpose of testing research hypotheses....
7 Pages (1750 words) Essay

Challenges Faced by BYOD

However, these activities also come with many security challenges to interested organizations.... The real challenge is for these organizations to establish a procedure to accommodate these devices, develop a support mechanism for their works, and one that would amicably comply with the security measures put in place.... It was part of an institutionalized security policy control that was consistently and persistently applied.... hereas the case of security risk began long ago even when there were less diverse devices, it has been aggravated by the varied and multiple devices users currently have....
6 Pages (1500 words) Case Study
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us