Chat with us, powered by LiveChat Just as quickly as new technology is develope | WriteDen

Just as quickly as new technology is develope

   Week 4 Discussion  

 Just as quickly as new technology is developed, hackers find new  ways to disrupt operations. As a result, security is an ongoing endeavor  in all organizations. Strategic planning can help organizations be  prepared to address new daily threats to information security.  Moreover, many of today's organizations are adopting virtualization as a  way to reduce their footprint in hardware costs and to improve their  backup system capabilities at the client and server levels. At the same  time, virtualization poses security risks that organizations need to  consider as part of their strategic planning process.

Go to Basic Search: Strayer University Online Library to  locate and integrate at least two quality, academic resources (in  addition to your textbook) on the role of strategic planning in  mitigating information security threats, including those associated with  virtualization. You may also use government websites, such as Cybersecurity from the National Institute of Standards and Technology. 

As you write this post, keep in mind your current organization's or a  previous organization's strategic planning for information security,  its infrastructure, and its training.

Please respond to the following in a post of at least 200 words:

  • Justify the importance of strategic planning to an organization's information security.
  • Identify and describe the topics to be included in strategic planning for information security.
  • Specifically describe the security threats associated with virtualization.
  • Explain how strategic planning can help to mitigate the security threats associated with virtualization.
  • Provide full citations and references, formatted according to Strayer Writing Standards.     
    • For assistance and information, please refer to the Strayer Writing  Standards link in the left-hand menu of your course. Check with your  professor for any additional instructions.

In 60 to 75 words, please respond to at least one other post. Choose to respond to those who have few or no responses. 

Note: You will find the information from this post  and the feedback you receive on it useful as you work on your  Virtualization assignment due this week.

4 days ago

Scott Coleman

RE: Week 4 Discussion

Top of Form

A.  Justify the importance of strategic planning to an organization's information security.

 

Strategic Security Planning is critical to any organization.  It typically starts with the CISO.  The CISO should be strategically placed within the organization to ensure proper visibility of security issues and manage risk in a way that aligns with business objectives.

 

A strategic plan is a document used to communicate the organizations goals, tasks needing to be completed to achieve these goals and any other items identified in the assessment.

 

B.  Identify and describe the topics to be included in strategic planning for information security.

 

The topics that should be included in a strategic security plan are below.

· Defining consistent and integrated methodologies for design, development and implementation;

· Detecting and resolving problems;

· Reducing time to delivery from solution concept through implementation;

· Provisioning flexible and adaptable architectures;

· Proactively making decisions to more efficiently deliver results;

· Eliminating redundancy to better support achievement of objectives;

· Planning and managing human resources, relying on external expertise when required to augment internal staff;

· Evolving into an organization where security is integrated as seamlessly as possible with applications, data, processes and workflows into a unified environment.

 

 

C.  Specifically describe the security threats associated with virtualization.

 

To better answer this question, let me first define the 2 virtualization types.

· Type 1 virtual environments are considered “full virtualization” environments and have VMs running on a hypervisor that interacts with the hardware. Examples are VMware ESXi, Citrix/Xen Server and Microsoft Kyper-V.

· Type 2 virtual environments are also considered “full virtualization” but work with a host OS instead of a hypervisor. With this type of hypervisor, the guest host is installed on top of an underlying OS such as Windows 10, Linux, etc.

The threats associated with virtualization can be different depending on the type of hypervisor used. Some examples are:  Shared clipboard, keystock logging, VM monitoring from the host, VM monitoring from another VM, and VM backdoors

 

 

D.  Explain how strategic planning can help to mitigate the security threats associated with virtualization.

A good strategic security plan can have a tremendous impact on the organization’s security posture.  It defines the areas needing to be secured and the tools/processes required to secure them.  For example, is the organization using a Next Gen firewall to protect them from the internet or are they still using an old packet filtering firewall.

 

 

 

1.  Brian Evans, July 8, 2015, The Importance of Building an Information Security Strategic Plan (securityintelligence.com), https://securityintelligence.com/the-importance-of-building-an-information-security-strategic-plan/

 

1. William Stallings. 2019. Effective Cybersecurity: A Guide to Using Best Practices and Standards.

 

1. Dave Shackleford. Virtualization Security : Protecting Virtualized Environments. Sybex; 2012. Accessed April 25, 2022. https://search.ebscohost.com/login.aspx?direct=true&db=nlebk&AN=500245&site=eds-live&scope=site

Bottom of Form

HOW OUR WEBSITE WORKS

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of 
HIGH QUALITY & PLAGIARISM FREE.

Step 1

To make an Order you only need to click ORDER NOW and we will direct you to our Order Page at WriteDen. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
 Deadline range from 6 hours to 30 days.

Step 2

Once done with writing your paper we will upload it to your account on our website and also forward a copy to your email.

Step 3
Upon receiving your paper, review it and if any changes are needed contact us immediately. We offer unlimited revisions at no extra cost.

Is it Safe to use our services?
We never resell papers on this site. Meaning after your purchase you will get an original copy of your assignment and you have all the rights to use the paper.

Discounts

Our price ranges from $8-$14 per page. If you are short of Budget, contact our Live Support for a Discount Code. All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Please note we do not have prewritten answers. We need some time to prepare a perfect essay for you.