Security Planning and Assessment Security Thesis

Total Length: 2028 words ( 7 double-spaced pages)

Total Sources: 7

Page 1 of 7



It's not necessary, for the purposes of this paper, to look in detail at these steps for a basic understanding of how a security assessment is conducted. To understand the nuances, there are about a million books one can read, but we will discuss a few general "rules."

The first thing to keep in mind with an assessment is that the methodology is flexible. It has to be to adapt to scheduling problems with clients, or availability of resources. As an example, a client could desire a certain timetable for the assessment steps to be accomplished. It may not match your schedule, so...flexibility is paramount.

Second, steps within the methodology can be combined. If it makes things more efficient, then do it.

The third step is crucial -- understanding the business. If there is not a solid comprehension of the business then there is no way to understand the risks.

Fourth, communication with clients should be emphasized. They must know the progress and the findings as the assessment progresses. This is key because the client may be able to offer additional information that might affect a finding, and the client has to be prepared to discuss the whole process and findings when the final presentation is made to management.

Stuck Writing Your "Security Planning and Assessment Security" Thesis?



Conclusion

Careful planning is a key concept once it is decided to perform a security risk assessment. The planning will economize everyone's time and the results of the assessment will be more comprehensive. The critical task in planning for the assessment is to define the scope. Definition of how to proceed in the assessment is crucial in order to know how to plan the time and resources to complete the assessment in a timely and thorough manner.

And the notable tasks in this planning phase are: defining the scope, staffing the project with the proper people; holding the kickoff meeting; development of the assessment project plan, and setting the expectations of the client (Kairab, 2004).

The importance of any information security assessment in any organization is that the assessment is the key, but it is only the beginning of a complicated process and must be continually updated. If the rest of the steps of the process are not performed as well as the assessment, then the results will not be a business enabler for the client......

Show More ⇣


     Open the full completed essay and source list


OR

     Order a one-of-a-kind custom essay on this topic


sample essay writing service

Cite This Resource:

Latest APA Format (6th edition)

Copy Reference
"Security Planning And Assessment Security" (2009, May 13) Retrieved May 1, 2024, from
https://www.aceyourpaper.com/essays/security-planning-assessment-security-21899

Latest MLA Format (8th edition)

Copy Reference
"Security Planning And Assessment Security" 13 May 2009. Web.1 May. 2024. <
https://www.aceyourpaper.com/essays/security-planning-assessment-security-21899>

Latest Chicago Format (16th edition)

Copy Reference
"Security Planning And Assessment Security", 13 May 2009, Accessed.1 May. 2024,
https://www.aceyourpaper.com/essays/security-planning-assessment-security-21899