Board logo

subject: Main Phases Of It Security Services [print this page]


All IT organizations are appraising IT security services and selecting a particular security service to progress and to maintain the enterprise architecture and IT security programs. If you are liable for executing and managing these services, then you must progress the options before selecting the main resources, which can be trusted to the IT security program requirement. It the main benefit for organizations when services and service providers motivate rivalry and will bring originality to the IT market. Every IT company needs to develop the strategy of these security services depending on the size, cost, type and intricacy. This IT industry has to follow the lifecycle from initiation to closeout to improve the security services. Mainly it is divided into three categories such as technical services, management services and operational services. Security is meant to provide the safe guard around the company. These management services will concentrate on managing the computer related security program and the risk, which is caused within the organization. Executed and implementing controls will get attentive by operational service providers. Technical services will mostly concentrate on technical related function of the system for its effectiveness.

The life cycle has six phases to manage and implement the security services; initiation, assessment, solution, implementation, operation and close out.

1) Initiation: the definition of this phase will vary. However, always security managers and decision makers will initiate the security services to support the business function.

2) Assessment: This phase includes existing environment, analyzing opportunities, identifying options and risks before making the decision by managers and decision makers.

3) Solution: In solution phase the security managers and decision makers will opt for the proper solution from variable options which are identified all through the second phase.

4) Implementation: In this phase the security services and its providers are being implemented. It is the simplest form of security services life cycle. It may require substantial work like collecting data and creating metrics.

5) Operation: after implementing the service and service provider, the operational phase will take place. It is the same as assessment phase.

6) Closeout: as the name of this phase explains it is the closure one of IT security services phase, in this phase managers will select and implement the best suitable exit strategy.

IT security service will continuously occur by the assessment, solution and operational phases to get succeed, but life cycle process goes on from initiation to implementation and closeout.

by: kirti_saxena




welcome to loan (http://www.yloan.com/) Powered by Discuz! 5.5.0