Sunday, February 17, 2019
Evaluation of Booz Allen Hamilton Cybersecurity Essay -- Cyber Solutio
IntroductionDuring the process of analyzing an organizations effectiveness to manage cyber credential risks, there are ranges of aegis policies that need to be implemented. A top example of this concept is the cyber hostage policies developed for consulting staunch Booz Allen Hamilton. The direct division create to address the firms requirements within cyberspace is the Cyber Solution mesh topology (CSN). The CSN division within Booz Allen Hamilton has a range of policies used to ensure the firm is protected against risk. Cybersecurity policy Best PracticesThe use of cybersecurity policies within CSN is to provide security of the divisions assets. The written policies provide guidance on implementation, through references to applicable standards and statements of best practices (Booz Allen Hamilton, 2012). As stated by Control Data Corporation, there is no asset which can be 100% secure network security is often times focused on strategic prevention or reactive procedures, r ather than examination of the security policy and maintaining the operation of it (1999). thereof abridgment indicates that numerous breaches are often due to reoccurring weaknesses in the policy. plain the most reliable, state-of-the-art technologies can be undermined or rendered ineffective by poor decisions, or by weak operational practices (Control Data Corporation, 1999, p. 3).The analysis conducted by Control Data Corporation (1999), provides a quality, and precise judicial decision of adhering to cybersecurity policy. This analysis is organized into several different categories1)The Natural Weaknesses of Security PolicyThe recognition of natural weaknesses is critical for Booz Allen Hamiltons Cyber Security Network unit. The movement of neglectin... ...n of its assets.Works CitedBooz Allen Hamilton (2012). Booz Allen cyber solution network. Retrieved from http//www.boozallen.com/consulting/prepare-for-whats-next/cyber/cyber-solutions-networkBooz Allen Hamilton (2011, Oc tober 1). Lab Governance Policy. Retrieved from http//www.boozallen.comControl Data Corporation. (1999). wherefore security policies fail. Retrieved from http//www.scribd.com/doc/17220213/Why-Security-Policies-FailKabay, M. E., & Robertson, B. (2009). Security policy guidelines. In S. Bosworth, M. E. Kabay, & E. Whyne (Eds.), Computer security handbook (5th ed.). New York, NY John Wiley & Sons. NIST. U.S. Department of Commerce, (2009). National institute of standards and engineering science sp 800-53. Retrieved from website http//csrc.nist.gov/publications/nistpubs/800-53-Rev3/sp800-53-rev3-final_updated-errata_05-01-2010.pdf
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.