Monday, July 29, 2019
Cybersecurity Profile Essay Example | Topics and Well Written Essays - 1250 words
Cybersecurity Profile - Essay Example In conclusion, it is important to note that security controls and profiles will vary with information systems in different organizations. In this case, the security controls inherent in the Agency are crucial controls that are aimed at maintaining the privacy and confidentiality of the data and information. To achieve a complete and sound security profile, the management, operational and technical controls must be implemented to complement each other for effective results. Planning control lays a foundation for other management controls, this can be done through security policy and procedures and security plan. Basic operational controls such as security awareness and training are crucial in any organization. Through security awareness and training policy and procedures and user awareness, security can be achieved. Finally, the technical controls offer a final remedy for security concerns in the organization. Basically, the identification and authentication control is one of the effe ctive technical controls. By user identification and authentication and device identification and authentication controls, the agency can address the issue of unauthorized access. The identification and authentication procedures and guidelines in the agency require that each device is identified and authenticated before a connection is established. Confidentiality and security can easily be breached through intruding devices. The agency has a device identification and authentication procedure in place that is guided by the IRM of IRS.
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.