Poor Infrastructure Security -- Model Essay

Total Length: 527 words ( 2 double-spaced pages)

Total Sources: 0

Page 1 of 2

The use of role-based knowledge management and security is implied in the structure of the proposed security equilibrium model. Anchoring this model in security governance and processes allows access to data and information to be role-based, measured for accuracy and much more aligned to the specific goals of users, team members, and facilitators. The technique or function to attain this level of role-based access to data needs to begin with a focus on creating profiles for each variation of users, team members and facilitators that only provides access to data of relevance. Finally the quantification of trust through the use of analytics and metrics can also ensure this model delivers credible, transferrable results on a dependable basis over time. Rather than relying on a series of theories to anchor the model, actual dashboards of scorecards can be used to effectively manage the levels of role definition, risk, and underscore the credibility of the model for the long-term.
The nature of the first model shown in Figure 5.4 shows the need for changing perceptions to anchor information exchange. With his model the focus can be on creating a measurable outcome of effective security strategies, alleviating the confusion over roles and missed system integration points that can lead to more effective enterprise-wide security over time.

Organizational security policies

Individual Security Practices

Exploits

Velocity of system changes that can cause security threats

Quantification

Of Trust

Security of Processes and Systems

Actions

Tight

Manifests

Interprets….....

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Poor Infrastructure Security -- Model" (2011, September 29) Retrieved May 6, 2024, from
https://www.aceyourpaper.com/essays/poor-infrastructure-security-model-45909

Latest MLA Format (8th edition)

Copy Reference
"Poor Infrastructure Security -- Model" 29 September 2011. Web.6 May. 2024. <
https://www.aceyourpaper.com/essays/poor-infrastructure-security-model-45909>

Latest Chicago Format (16th edition)

Copy Reference
"Poor Infrastructure Security -- Model", 29 September 2011, Accessed.6 May. 2024,
https://www.aceyourpaper.com/essays/poor-infrastructure-security-model-45909