Rightsizing and Its Benefits and Costs to Security
14 pages
(3500 words)
, Download 2
, Literature review
ixth, one must have a road map or very clear steps or sequence to follow in rightsizing and this implies the use of management tools like the Gantt chart and performance evaluation and review techniques or PERT.... 1-6), the key elements of an information security program cover vulnerability assessments, incident response strategy, policies and procedures, governance, architecture and design, technology and evaluation, key performance and effectiveness analysis, oversight review, and organisational elements....