MyPage is a personalized page based on your interests.The page is customized to help you to find content that matters you the most.

I'm not curious

Information Security Planning and the Levels Associated

Published on 21 July 17
Information Security Planning and the Levels Associated - Image 1

Businesses into online transactions need least security measures to address the basic needs. A Wide range of security solutions is available in the market. The organization has to make its choice over the different kinds of security solutions. Each product comes with its own benefits and pitfalls.

Different levels

The respective officials have to understand and analyze the requirements. Based on the evaluation result appropriate solution has to be suggested. The security measures adopted give different levels of security. A preliminary audit plan needs to be prepared in line with the goals and objectives of the information security plan. The solution has to be a part of the guidelines and practices made mandatory. The players have to make it a practice to complete their doings using these practices.


The security program has to consist of policy, standards and practices to be followed. The contents are documented after analysing the risks to be addressed by the organisation. The architecture and blueprint documented are used by the players to complete their doings. These docs have to be created and maintained to make it available in the future.

Addressing Divisions

A strategy has to be adopted to address the issues of the organisation. The planning has to focus the resources working towards the goal. The docs have to guide the organisation player’s efforts. The entire domain has to address and a general strategic documentation has to be written. The documents have many divisions addressing different areas. The divisions have to end up reaching the stated goals of the organisation. The procedure has to start with providing the individuals with the role to play. The executive has to understand the goals and aim to aid in reaching the same. The tactical knowledge and the cooperation between them aid in reaching the goal. The mix of different talents aids in balancing the capabilities and building.

Segmentation of Ideas

The plans are translated into tactical objectives with time bounds. Specific and applied objectives are stated. The plans are used to develop operational plans. The tactical ideas are framed on a short-term basis. The planning involves segmenting the idea into fragments. The segments are aimed to meet the incremental objectives. The procedure involves addressing the critical components - budgeting, resource allocation and personnel. The plans aim at making the steps workable by adding guidelines to be following. The planning is project-specific. Hence it is the responsibility of the respective officials to plan the future doings.

Organisation Structure

The players of the organisation use the operation plan docs to complete their doings. The docs include all the necessities involved and can be used by all the departments. The regular reporting is addressed - meetings, progress report, and associated ones. The plans for each unit have to be summated. The plans are to reflect the organization structure. The idea has to encourage frequent meetings and feedback to clarify the necessities. The IT Risk governance case study can be analyzed and a report can be prepared to keeping in mind the professional ethics of the organization.

Tactical Plans

Today's organization are into different kinds of risks so it is important that they analyze the risk of each domain. Based on the risk encountered, appropriate solutions have to be recommended & selected. The strategy deployed in the doings has to be documented efficiently. The tactical plan advised has to address the issues and regular doings of the unit. The operation plan is provided to the players to reach the stated goal. The overall business report is usually an assessment required under the unit of an information security course. Students who need help with information security reports can look into extensive literature and papers for bright ideas to help them with their paper.
This blog is listed under IT Security & Architecture Community

Related Posts:
Post a Comment

Please notify me the replies via email.

  • We hope the conversations that take place on will be constructive and thought-provoking.
  • To ensure the quality of the discussion, our moderators may review/edit the comments for clarity and relevance.
  • Comments that are promotional, mean-spirited, or off-topic may be deleted per the moderators' judgment.
You may also be interested in
Awards & Accolades for MyTechLogy
Winner of
Top 100 Asia
Finalist at SiTF Awards 2014 under the category Best Social & Community Product
Finalist at HR Vendor of the Year 2015 Awards under the category Best Learning Management System
Finalist at HR Vendor of the Year 2015 Awards under the category Best Talent Management Software
Hidden Image Url