Wednesday, March 27, 2019
Evaluation of Booz Allen Hamilton Cybersecurity Essay -- Cyber Solutio
IntroductionDuring the process of analyzing an organizations effectiveness to manage cyber warrantor risks, on that point are ranges of security policies that need to be implemented. A prime fashion model of this concept is the cybersecurity policies developed for consulting firm Booz Allen Hamilton. The direct course of instruction formed to woo the firms requirements within cyberspace is the Cyber Solution Network (CSN). The CSN division within Booz Allen Hamilton has a range of policies used to ensure the firm is protected against risk. Cybersecurity Policy Best PracticesThe use of cybersecurity policies within CSN is to provide security of the divisions summations. The pen policies provide guidance on implementation, through references to applicable standards and statements of best practices (Booz Allen Hamilton, 2012). As stated by Control Data Corporation, there is no asset which can be 100% secure network security is a great deal times focused on strategic prevention or labile procedures, rather than examination of the security policy and maintaining the operation of it (1999). Therefore digest indicates that numerous breaches are often due to reoccurring weaknesses in the policy. Even the nearly reliable, state-of-the-art technologies can be undermined or rendered ineffective by myopic decisions, or by weak operational practices (Control Data Corporation, 1999, p. 3).The abstract conducted by Control Data Corporation (1999), provides a quality, and precise assessment of adhering to cybersecurity policy. This analysis is organized into several different categories1)The Natural Weaknesses of Security PolicyThe light of natural weaknesses is critical for Booz Allen Hamiltons Cyber Security Network unit. The action of neglectin... ...n of its assets. work CitedBooz Allen Hamilton (2012). Booz Allen cyber solution network. Retrieved from http//www.boozallen.com/consulting/prepare-for-whats-next/cyber/cyber-solutions-networkBooz Allen Hamilton (2011, October 1). Lab Governance Policy. Retrieved from http//www.boozallen.comControl Data Corporation. (1999). Why security policies fail. Retrieved from http//www.scribd.com/doc/17220213/Why-Security-Policies-FailKabay, M. E., & Robertson, B. (2009). Security policy guidelines. In S. Bosworth, M. E. Kabay, & E. Whyne (Eds.), Computer security vade mecum (5th ed.). New York, NY John Wiley & Sons. NIST. U.S. Department of Commerce, (2009). National institute of standards and technology sp 800-53. Retrieved from website http//csrc.nist.gov/publications/nistpubs/800-53-Rev3/sp800-53-rev3-final_updated-errata_05-01-2010.pdf
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.