StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Free

Security project planning - Research Paper Example

Cite this document
Summary
Though these advancements of technology have brought a large number of advantages and opportunities for the business organizations as well as individuals however at…
Download full paper File format: .doc, available for editing
GRAB THE BEST PAPER99% of users find it useful
Security project planning
Read Text Preview

Extract of sample "Security project planning"

Bull Eye Model Bull Eye Model Affiliation In the past few years, we have seen massive developments and advancements in every area of information technology. Though these advancements of technology have brought a large number of advantages and opportunities for the business organizations as well as individuals however at the same time there have emerged serious security challenges. In this scenario, information security is process of developing and putting into practice security measures in an attempt to secure information and data.

In addition, a business organization can also use a bull eye model in order to analyze the information security plan as well as its existing situation of the information security attempts with respect to a number of stages presented in the bull eye model. Basically, the bull eye model allows project teams especially the project planners to find out the status of their progress with respect to their information security efforts. It tells them in which areas they need to pay more attention and expand their information security efforts and potential.

Additionally, the bull eye model depends on a process of determining the project plans in a series in the context of four layers, which include policies, networks, systems, and applications. These layers are illustrated in figure1. The figure1 shows how these layers are connected with each other (CQUniversity, 2009; Joshi, 2013).Figure 1Bull Eye model, Image Source: (Joshi, 2013)Bull’s eye model is based on four layers which are as follows (CQUniversity, 2009; Joshi, 2013):Policies: This is the most outer layer in the bull’s-eye diagram.

Basically, these policies are defined for all the other layers such as systems and applications installed on systems.Networks: This layer deal with the threats from public networks that get together the company’s networking infrastructure.Systems: This layer deals with all kinds of systems that can be used by the people. In this scenario, these systems can comprise computers used as servers, systems employed for process control and manufacturing systems and desktop computers.Applications: These applications can comprise all the software applications installed on systemsIn addition, the bull’s eye model can be utilized to assess the series of actions that need to be performed to put together elements of the information security plan into a project plan.

There is a close relationship between all the layers and these layers can be associated with each other in the following ways (CQUniversity, 2009; Joshi, 2013):Until an organization does not develop, communicate and implement an effective and useable information technology and information security policy, it should not spend further resources on additional controls.Until an organization does not control and implement an effective network it must spend all resources to attain that goal.Once an organization implements a policy and network controls, its deployment should concentrate on the process, information, and manufacturing systems of the firm.

Once it is ensured that there is an effective policy is prepared, systems are safe, networks are secure, an organization should pay attention to the evaluation and cure of the security of the firm’s applications installed on systems (CQUniversity, 2009; Joshi, 2013). ReferencesCQUniversity. (2009). COIT 13211 Information Security - Module 10. Retrieved June 20, 2013, from http://webfuse.cqu.edu.au/Courses/2009/T3/COIT13211/Study_Schedule/module10.htmJoshi, J. B. (2013). Information Security.

Retrieved June 22, 2013, from www.sis.pitt.edu/~jjoshi/IS2820/Spring06/chapter04.doc

Read More
Cite this document
  • APA
  • MLA
  • CHICAGO
(“Security project planning Research Paper Example | Topics and Well Written Essays - 500 words”, n.d.)
Security project planning Research Paper Example | Topics and Well Written Essays - 500 words. Retrieved from https://studentshare.org/information-technology/1622188-security-project-planning
(Security Project Planning Research Paper Example | Topics and Well Written Essays - 500 Words)
Security Project Planning Research Paper Example | Topics and Well Written Essays - 500 Words. https://studentshare.org/information-technology/1622188-security-project-planning.
“Security Project Planning Research Paper Example | Topics and Well Written Essays - 500 Words”, n.d. https://studentshare.org/information-technology/1622188-security-project-planning.
  • Cited: 0 times

CHECK THESE SAMPLES OF Security project planning

Taj Mahal

Taj Mahal, one of the greatest structures on earth and wonders of this globe, was built by the Mughals, Muslim rulers of India.... Regarded as the most beautiful shrine with its architectural beauty never surpassed according to some western historians.... hellip; Its architectural and stunning design, especially at dawn and sunset, surpasses any particular and adequate description....
10 Pages (2500 words) Statistics Project

Networking

Network topologies are essential before implementing a network as per requirements of an organization.... Topology is a framework defining the arrangements of every object on the network.... his includes workstations, network components, servers, WAN devices and many more.... … There are total five topologies to design a computer network....
11 Pages (2750 words) Statistics Project

An Analysis of Corporate Social Responsibility of the United Kindom Firms

This project "An Analysis of Corporate Social Responsibility of the United Kindom Firms" discusses CSR reporting and the accounting aspects of CSR within organizations.... The project provided an opportunity to visit various organizations in order to interview the various members of the management team....
60 Pages (15000 words) Capstone Project

London Congestion Pricing Program

he original capital costs of this project were estimated to be 200 million according to the prices of 2002, approximately 220 million according to prices and values in 2005.... eimbursement in terms of Costs and RevenuesThe original capital costs of this project were estimated to be 200 million according to the prices of 2002, approximately 220 million according to prices and values in 2005....
5 Pages (1250 words) Statistics Project

Kuwait's Monetary Policy

The paper “Kuwait's Monetary Policy” concerns the Central Bank's policy aimed at ensuring the competitiveness of the national currency in the face of rising interest rates in other world currencies, create monetary stability in the local economy, protect the purchasing power of the dinar, etc....
4 Pages (1000 words) Statistics Project

Relation of Learning Styles and Business Training

It is clear that operations department has largest number of workers and project department has only 9 workers out of the sample 74.... It is also evident that department project and operations employ no female workers and the entire female employees working with the organisation belong to support department....
8 Pages (2000 words) Statistics Project

Financial Independence of Elderly

Around 30 percent live on government aid, such as Social security.... According to the Social security Administration in 2006, Americans at age 65 live in four different ways.... Around 30 percent live on government aid, such as Social security.... Unfortunately for those who are approaching retirement age, the ever-increasing numbers of people eligible for Social security means that the government may, in future, exhaust its allocated funds....
2 Pages (500 words) Statistics Project

The financial system and the economy

The global financial system has proved to be challenging as the economy tries to counter the global financial crisis of the year 2008 which have contributed towards to instability of world prices.... The global financial system has been in a difficult position as it is unable to… The failure in global financial system has led to countries being bankrupt with many banks being closed down (Dean, 2006)....
1 Pages (250 words) Statistics Project
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us