ipl-logo

Information Security Strategy Paper

1165 Words5 Pages

Introduction
After the development of a change management continuum model, the next stage is the implementation of this strategic plan to coincide with the daily activities of the organization. Organizations have to be ready to transact their businesses and communication activities in the rapidly evolving field of information technology. The rapidly changing field of electronic business transactions and the constant need by organizations to streamline their processes by automating them so as to increase efficiency in production and effectiveness are the two major challenges faced by organizations in the field of information technology.
This strategic plan is built on a foundation based on information technology that has enabled different organizations …show more content…

Adoption of the existing technical standards will be done only where it is necessary. The management of this infrastructure will be different from that of the data and application software due to the fact that each of this has a unique life cycle.
Strategies for information infrastructure
There will be the implementation of an information technology infrastructure with a robust architecture that is based on an open system and the set industry standards whenever necessary. A network that is secure enough to connect the different departments and offices of the industry will be implemented. A private network that is virtual and technology based on the internet will be utilized at the start.
Security strategies
There will be enforcement of policies and guidelines that are appropriate for secure maintenance and information exchange. This will be in view of the notable differences between the current utilization level of information technology in the organization. These policies will address issues that are related to access, privacy, integrity, reliability, authenticity, and recovery so that the organization can enjoy advantages such as filing …show more content…

There will be the promotion of the user data models that are standing together with every element involved in data storage that leads to sharing and re-use of data between the organization and any other interested party.
Strategies for information dissemination
The use of latest technologies that have been approved will be implemented for achievement the widest information dissemination reach, dissemination of information will be guided and reviewed by use of current developments in information technology applications while serving the needs of the whole organization. Each department will be accorded the responsibility for the establishment of its own policies on dissemination.
Organizational responsibilities
Every stakeholder in the organization from management to the technical staff will be required to play a role in the implementation of this strategy.
SWOT analysis of the strategic implementation

More about Information Security Strategy Paper

Open Document