answersLogoWhite

0

Security planning for IT may involve the development of security policies (ie, acceptable use, disaster recovery, breach notification), implementation of security controls (to include hardware, software, and personnel), risk assessment, cryptographic use and controls, and legal/ethical considerations. It is essentially the strategic view of computer security as opposed to the tactical view that an intrusion detection analyst might have.

User Avatar

Wiki User

14y ago

What else can I help you with?

Related Questions

What is a planning computer workstation work?

planning computer workstation work ?


What are the three subsets of joint strategic planning?

security cooperation planning, joint operation planning, and force planning


What are the importance of computer in modern management?

reserch,strategy planning,product design,labbeling,storage of data,calculations,security


What is computer and internet security?

Computer security refers to be protected from the viruses present inside your computer whereas Internet security refers to be protected from the malwares those could attack your computer through Internet.


How does computer technology impact the planning of instructions?

Computer technology impacts the planning of instructions by organizing them. Computer technology can distribute instructions to the recipients within seconds.


What are the security and safety procedure within a computer environment?

what are the security and safty procedure in a computer environment


When was National Agency for Computer Security created?

National Agency for Computer Security was created in 2004.


Do I have to be a computer expert to properly setup a computer security camera?

Many computer security cameras do not require computer expertise to install. Most security cameras also come with a instruction manual for easy installation.


1 What is the defining difference between computer security and information security?

Where computer security deals with the processes applied to computer system(s), information security concerns all of the aspects regarding the system of policies and/or procedures for identifying, controlling, and protecting information from unauthorized disclosure. While often synonymous, information security is actually a superset of computer security, encompassing the fields of data security, transmission security, network security, physical security, personal security, and personnel security,


What has the author Deborah Russell written?

Norton is the leader in security software for your computer with more PC Magazine Editor's choice awards than any other security company. Start a free trial and protect your PC today! cutt.ly/rjeos1F


What has the author Tony Bradley written?

Tony Bradley has written: 'Understanding The Interregnum' 'Computer security 101' -- subject(s): Computer networks, Computer security, Internet, Security measures


What has the author Marshall D Abrams written?

Marshall D. Abrams has written: 'Tutorial computer and network security' -- subject(s): Computer networks, Computer security, Security measures 'Distributed processing and computer networks'