5.13 Leveraging IT in security initiatives

 < Day Day Up > 



There are numerous ways that IT can be leveraged to improve security. Possible methods range from support for advanced physical security systems to applying artificial intelligence to process and environmental control. IT managers can find or develop applications to contribute to improved security in each sector. IT managers first need to know what the major security initiatives are and which were presented in this chapter.

Action Checklist Number 5 (see Table 5.23) shows the steps necessary to evaluate, select, deploy, and monitor IT solutions to improve security. The next chapter focuses on why a national strategy to secure cyberspace is important.

Table 5.23: Action Checklist Number 5

Action Item

Status (e.g., Completed, Pending, or N/A)

Evaluate security initiatives for sectors in which the organization has operations.

 

Assess organizational plans to meet security needs.

 

Evaluate IT solutions that address security needs or support new security requirements.

 

Compare IT solutions that address security needs or support new security requirements for effectiveness, usability, and return on investment.

 

Select and acquire IT products or services.

 

Deploy and test applicable IT solutions.

 

Monitor performance of IT solutions and tune, enhance, or migrate product sets.

 



 < Day Day Up > 



Implementing Homeland Security for Enterprise IT
Implementing Homeland Security for Enterprise IT
ISBN: 1555583121
EAN: 2147483647
Year: 2003
Pages: 248

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net