| < Day Day Up > |
|
There are numerous ways that IT can be leveraged to improve security. Possible methods range from support for advanced physical security systems to applying artificial intelligence to process and environmental control. IT managers can find or develop applications to contribute to improved security in each sector. IT managers first need to know what the major security initiatives are and which were presented in this chapter.
Action Checklist Number 5 (see Table 5.23) shows the steps necessary to evaluate, select, deploy, and monitor IT solutions to improve security. The next chapter focuses on why a national strategy to secure cyberspace is important.
Action Item | Status (e.g., Completed, Pending, or N/A) |
---|---|
Evaluate security initiatives for sectors in which the organization has operations. | |
Assess organizational plans to meet security needs. | |
Evaluate IT solutions that address security needs or support new security requirements. | |
Compare IT solutions that address security needs or support new security requirements for effectiveness, usability, and return on investment. | |
Select and acquire IT products or services. | |
Deploy and test applicable IT solutions. | |
Monitor performance of IT solutions and tune, enhance, or migrate product sets. |
| < Day Day Up > |
|