Business success can only be achieved
when one can prove you are different than other. This is often called the
competitive strategy of the organization. The accomplishment of the strategy
can be measured by determining the process: tactics. Tactics helps business to
understand how the goals can be accomplished. Tactics are the countermeasures
which the organization will take if the certain situations arise. In order to
implement the right tactics, the objectives have to be identified and
principles are the identifier of the objectives.
In order to accomplish targeted objective of
the organization, security strategic plan has to be strong and successfully
implemented. These plans can only be successful with proper tactics and
operational plan. Resource planning, time, and technology help to achieve the
tactical objectives of the security strategic planning. Observation, timeliness, and economy are the top
principles of the security management as they provide insight on sufficient
information, response time and balanced cost of technology with process. These
principles drive the tactical implementation of the security framework. With
observation principle we can collect enough information to secure the perimeter
and provide strong wall against the security attack. Timeliness determines the
proper communication during the incident and what kind of tactics should be
implemented during any physical or logical attack. Security is one of the
costlier businesses on the organization that involves the qualified manpower,
technology and advance systems. Economy principle focused on balanced resource
and technology along with the cost associated with it. So, these principles
help in defining the effective and efficient tactics.
Work Cited:
Massachusetts Institute
of Technology. (n.d.). BASIC PRINCIPLES OF INFORMATION PROTECTION.
Retrieved October 06, 2015, from Web.mit.edu:
http://web.mit.edu/Saltzer/www/publications/protection/Basic.html
MIT Technology Review.
(2015, August 15). The 20 Most Infamous Cyberattacks of the 21st Century
(Part II). Retrieved October 06, 2015, from MIT Technology Review:
http://www.technologyreview.com/view/540791/the-20-most-infamous-cyberattacks-of-the-21st-century-part-ii/
No comments:
Post a Comment