Provide (2) 150 words response with a minimum of 1 APA references for RESPONSES 1 AND 2 below. Response provided should further discuss the subject or provide more insight. To further understand the response, below is the discussion post that’s discusses the responses. 100% original work and not plagiarized. Must meet deadline.
RESPONSE 1:
1) Describe how security administration works to plan, design, implement and monitor an organization’s security plan.
There is a few things that need to be done to plan, design, implement and monitor a security plan. First, we need to access the current policies and standards of our security environment. We need to see what policies weren’t working and why and we need to see if we are just maintaining security or updating to something better. We need to monitor all our networks and use anti-virus protection to monitor and detect suspicious activity. Also, we need to look for slow moving parts and things that could the company is limbo. Admin should talk to colleagues and stakeholders. It’s always good to get some fresh eyes in security. They also may know of a program or a better way of doing things. Be transparent and make sure you know your budget. You want to make sure you are protected but don’t skimp on things that are needed.
2. Describe five effective change management processes organizations can execute as well as the advantages and disadvantages of change management when it comes to the IT department.
We all know that change is good. Change is a necessary evil that helps a business moving forward. If one doesn’t change then they won’t be better than their rivals and will cause a business to become stuck. Change allows for employees to bring new life into the company. Also, if an employee suggests a certain change other employees are most likely to follow. Five effective change management processes are communication, training, resistance management, employee feedback and recognizing success and reinforcing the change. The disadvantage of change management is bad management, not having open communication and not having a plan.
RESPONSE 2:
1) Describe how security administration works to plan, design, implement and monitor an organization’s security plan.
– Security policy is the company’s documentation that includes how will they plan to protect their information technology assets, and this get updated often whenever there is required changes to the document. Planning, designing, implementing, and monitoring organization’s security policy will require more needed action to protect the company’s assets. For instance, how will the company educate all their employees that involves in the plan, identify and assessing the effectiveness of the security policy in the company to find out if the changes made works good, and most specially keep tracking and maintaining all the networks to avoid the virus, hackers, or any other suspicious activity occurs. In addition to the updating policies, system’s update often would help.
2) Describe five effective change management processes organizations can execute as well as the advantages and disadvantages of change management when it comes to the IT department.
1. Clearly defining the change and aligning to the business goal- identifying what and why change such required.
2. Determining impacts and those affected- identifying the changes impact and people will affect?
3. Developing communication strategy- identifying how will the changes communicate to the individuals and will be managed when other changes will be required.
4. Providing effective training- what skills and knowledge employees need to receive and how will the training deliver in order to achieve the effectiveness.
5. Implementing a support structure- what areas will be needing the most help and how it will be effective.
6. Measuring the change process- was the change made a difference from the previous, was it successful, and what could have done differently.