ISSC 422 Week 4 Security Operations & Administration Response
Description
| Peer response| luis ramirez-tapia
A security administration has many different methods in place to ensure they can properly secure their organization or an organization that they are put in charge of protecting. The first step that they will take to ensure they are properly protected would be to identify the assets that they oversee protecting. They will also figure out what risk these assets may face. The main risk that a security administration may face would be people, property and legal. Out of this risk the worst one would be people. People can be attacked using different forms of hacks or gathering information to gain access to the system over time.
Five effective change of management processes could be, prepare the organization, craft a vision and plan, implement the change, embed changes withing company culture, review progress. These are just a few of the many different types of steps to put in place to ensure the company transitions correctly. There are many advantages and disadvantages of a change in management in any field. But in an IT department some of the advantages of change would be the new ideas put in place by the new management, the great vast of knowledge and tools that management brings and the growth they could build with their employs. Some of the disadvantage could be the fear of those employees losing their jobs, the lack of trust between the new management and employees, the fact that a relationship has to be rebuilt.
Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."