Nt1330 Unit 9 Final Paper

443 Words1 Page

To effectively assess the security needs of an organization and to evaluate and choose various security products and policies, the manager responsible for security needs some systematic way of defining the requirements for security and characterizing the approaches to satisfy those requirements. This process is in a centralized data processing environment LANs and WANs. Even for relatively small organizations, information system assets are substantial, including databases and files related to personnel, company operation, and financial matters. The information system environment is complex field including a variety of storage systems, servers, workstations, local networks, and Internet and other remote network connections. A range of threats always growing in sophistication ways. …show more content…

Information strategy deals with how these policy aims are to be accomplished: the second aim above might be accomplished in a variety of issues to enable the task to be performed automatically. These strategies will have different, associated costs, risks and time-scales that need to be evaluated against the anticipated benefits. Information technology embraces computers, telecommunications and software systems that aid the organization, transmission, storage and utilization of what might better be called the 'knowledge resources. Every IT professional should consider global concerns associated with security, international trade is an ongoing business strategies. When I did my organization strategy for the assignment I overlooked the type of business been conducted and how IT gets involved in this helped me evaluate my finding and I came to understand global security was not less needed to implement but still I needed to add the strategy’s in the project for unplanned events that might affect the organization

Open Document