Step 1
Research security plans.
Using course materials and the Internet, research various security plans. Use the following to guide your research:
How do the security plans differ? In what ways are they alike?
How can these plans be used to ensure the security of sensitive information?
Step 2
Post your responses to the discussion board.
Respond to the following and, if appropriate, include personal experience as part of your answers:
What affects can an organization endure when a security breach is successful?
What benefits can an organization obtain when a breach is succesfully contained or prevented?
How does a successful breach affect the company outside of the IT portion of the organization?
Whose responsibility is it in the organization to develop, implement, and oversee the security plan?
What training can an organization give to its employees to help the organization's IT Security?
Security plan is set of policies and procedure define in systematic way that protect from any loss ,theft or harm . There are some principles that should be taken care for effective security plans .
Security design can be done in below steps :
Contents of security plan :
àpolicy
àcurrent state, describing the status of security at the time of the plan
à requirements ,what all things are required to complete .
àrecommended controls
àaccountability, who is responsible for the activity
àtimetable,define at what time different security functions can be done
àcontinuing attention means improvising current security plans .
Get Answers For Free
Most questions answered within 1 hours.