Premium Essay

Project Part 2 Student Sscp® Domain Research Paper

In:

Submitted By deprince
Words 536
Pages 3
Project Part 2 Student SSCP® Domain Research Paper

NT2580 Introduction to Information Security
May 20, 2013 Security Operations means the process of identifying critical information and subsequently analyzing friendly actions attendant to military operations and other activities to: a. identify those actions that can be observed by adversary intelligence systems; b. determine indicators that hostile intelligence systems might obtain that could be interpreted or pieced together to derive critical information in time to be useful to adversaries; and c. select and execute measures that eliminate or reduce to an acceptable level the vulnerabilities of friendly actions to adversary exploitation. [1] The need to connect and collaborate with partners, suppliers, customers, and employees anytime and anywhere has increased the difficulty of managing network and systems security. Organizations are challenged with the difficult and overwhelming task of securing and managing network systems, and keeping their desktops and servers up to date. Organizations want easy and efficient ways to maintain network security, manage updates, and, at the same time, reduce total costs for security management. When addressing security management and operations, administrators need to consider the following: • Security: Employees not only work from corporate offices, but from branch offices, home offices, or from the road. Managing access policies and security for remote connectivity requires flexibility to apply security policies to different sets of users and groups, as well as ensuring remote users are up to date with the most current updates. Administrators must keep systems up to date with the latest reinforcements and fixes to prevent security cracks. • Management complexity: Security threats are vigorous; therefore, ongoing

Similar Documents