Computer Science Legislative, Ethical, and Term Paper

Total Length: 1588 words ( 5 double-spaced pages)

Total Sources: 5

Page 1 of 5

One can also set up policies and procedures to respond to and reduce the effects of the loss or damage to ones it environment (Capability: Security Process, 2012).

The assess phase should decide the fitting security needs for an organization and which processes are presently in place. Security requirements can vary radically from company to company or institution to institution based, for instance, on dimension, industry or field, regional laws, or regulations. Gathering the necessities of an organization will permit one to define a fitting security process (Capability: Security Process, 2012).

Throughout the identify phase, an organization will look at the tools and procedures presently in place and decide what the security requirements are for their organization. During this phase, one will gather security policies that are presently implied or enforced, in addition to technology components already in use or at their disposal.

Stuck Writing Your "Computer Science Legislative, Ethical, And" Term Paper?

They will also gather any outside requirements, based on laws or regulations for their region or industry (Capability: Security Process, 2012).

The evaluate and plan phase moves toward the standardized level of optimization and highlights specific areas of improvement. In order to set up a successful set of security policies and controls one needs to figure out the vulnerabilities that exist in their computer systems and evaluate the security policies and controls that guard them. This review should include all areas where policies are lacking, in addition to looking at the current policies that are already in place (Capability: Security Process, 2012)......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Computer Science Legislative Ethical And" (2012, August 13) Retrieved May 7, 2024, from
https://www.aceyourpaper.com/essays/computer-science-legislative-ethical-75144

Latest MLA Format (8th edition)

Copy Reference
"Computer Science Legislative Ethical And" 13 August 2012. Web.7 May. 2024. <
https://www.aceyourpaper.com/essays/computer-science-legislative-ethical-75144>

Latest Chicago Format (16th edition)

Copy Reference
"Computer Science Legislative Ethical And", 13 August 2012, Accessed.7 May. 2024,
https://www.aceyourpaper.com/essays/computer-science-legislative-ethical-75144