Contemporary IT Security Matters Always Relate To Cyber Warfare
11-3-2017
Unit 4 Discussion 1 Response 2 Markeita Drew
Response from: Miss. Bayo Elizabeth Cary, AA,
BA, MLIS
Original Post from Markeita Drew:
When policies or strategies are introduced in a
proactive manner, there are usually high-level meetings with executives,
stakeholders and other decision-makers, as well as approvals that take place
before they are put into practice. Not all instances that require
Information Security activities occur with enough lead time to include input
from all employees that will be affected by the change. In situations
such as those, it’s nearly impossible to follow the same communication plan if
the change is due to a problem that requires an immediate change request and
action to thwart an intrusion or recover from a breach. Global companies
may not have the opportunity to reach individuals or confer with all
departments or geographical locations within their business during a crisis, so
it may appear offensive to end users when they aren’t included in the
decision-making process. This is especially bothersome when the blanket
change that is implemented doesn’t take into account how differently business
is conducted in other regions or how they will directly be affected.
To reduce or eliminate potential areas of
tension or conflict between these two groups within a global organization, I
would make sure that we have a proper business continuity plan as well as a communication
plan that has provisions for steps to take during disaster recovery as well as
normal business conditions. These plans will need to include all areas of
the business and the potentially affected stakeholders. I would also
institute company-wide surveys related to the execution of those plans to get
feedback and achieve more inclusion from the business community at large.
Continual process improvement would be developed as a by-product of the
measures in this strategy.
Response
from: Miss. Bayo Elizabeth Cary, AA, BA, MLIS
It would have never occurred to me, to
care about what every-other-person, thought, in-regards-to running a company,
and IT decisions. I took a-number-of business classes, as an undergraduate
student, through the College of Business, at: Florida State University.
Multinational businesses, are divided-up, into numerous specializing
departments-each with a specific function. A business is run, by a: CEO, then a
board-of-directors, then by the various heads of departments, at different
International locations. It is inappropriate, for any given individual, who has
no specialized knowledge in a specific area-to then attempt, to contribute to a
conversation, regarding that issue.
For instance-an analogy, all medical
doctors, study medicine, however-a cardiologist specializes in the heart, a
neurosurgeon, specializes in brain surgery. At n given point in time, could a
psychiatrist-who has also attended medical school, decide, that because he is
concerned about the final out-come personally, say-perform a neurosurgery. The
business world, is the very same way-if the issues at hand, do not pertain, to
your specific department, and academic training, then, you must courteously
decline, from contributing your input. The IT field is complicated, and
although, tensions arise in any given International business, the tensions
should never be, about something-that an individual, has not trained in.
In-regards-to, the scenario presented in
class, and the tensions that may arise, because the business is International-I
inferred the word: “tensions,” to refer to, the various levels, of security,
that may or may not exist, in differing locales. My best recommendation, for
relieving tensions, related to securing information, in an International
market, and working environment, is to develop a holistic: defense-in-depth,
methods, and securing protocols, that can be shared, and reinforced-through the
International data environments (Brooke, 2001, p. 75).
The online and computer world-a virtual
reality, is circumscribed, by certain real and existent boundaries (Brooke,
2001, p. 75). By looking for end points, and where: “the side-walk ends,”
security measures, can be created, and then reinforced-to better secure data.
It is a myth, to think, that at any given point in time, any-given, security:
measure, practice, control-technique, or management theory, will
provide-complete, or total security. The boundaries are imperfect, and
flexing-moving in and out, like the ocean tides, as the hacker, would approach,
and attempt access-then flee, regardless of whether-or-not, the attempt was
successful. The battle for security, is everlasting, and must be presumed to
be-a continuous battle, a war that never heeds warning, and: “a never-ending
story.”
References
Brooke,
Paul. (2009). Building An In-Depth Defense. Network Computing: Workshop
Security. 12, 14. p. 75-77. Retrieved from www.networkcomputing.com
Comments
Post a Comment