I need two responses of at least 150 words each for the below students discussions for this week. Also in the bold below are the questions the students at answering.
Topic: Security Administration
1) Describe how security administration works to plan, design, implement and monitor an organization’s security plan.
2) Describe five effective change management processes organizations can execute as well as the advantages and disadvantages of change management when it comes to the IT department.
Student one:
To answer the first question:
Security Administration is a vital part of a company’s security. They are the key to its planning, designing, implementing, and monitoring. Before even setting the team, it has to be decided exactly what kind of information is the company looking to protect; what’s its level of security (is it just personal – credit card info or top-secret – government secrets) Once decided that the security team is needed, and it always is, each member of the team will be given a certain task so all of the responsibility doesn’t fall on one person with the Security Administrator heading the group. As stated in Chapter 6, “The the primary task of an organization’s security administration team is to control access to systems or resources.” (Kim, 2013) This means that the team is responsible for which employees will get onto the network and access certain applications and which ones won’t. The Security Admin and team deal with the four areas of Access control. The first being Identification or the ability to have credentials provided to validate their authentication, Authorization or the ability to provide the users who have permission to be on the system the ability to do so. Authentication or the ability of the user to prove they are who they say they are and the most important, Accountability or the ability to keep track by the use of logs what is happening on the system and who was using it at that time.