Cybersecurity is critical to?protecting an organizations ?infrastructure. Even within the cybersecurity field,?several people may ?be?responsible for
Cybersecurity is critical to protecting an organization’s infrastructure. Even within the cybersecurity field, several people may be responsible for ensuring an organization's infrastructure is protected.
Go to Basic Search: Strayer University Online Library to locate and integrate at least two quality, academic resources (in addition to your textbook) on how to apply change management principles to infrastructure protection. You may also use government websites, such as Cybersecurity from the National Institute of Standards and Technology.
Please respond to the following in a post of at least 200 words:
- Explain the purpose of change management and how it applies to infrastructure protection.
- Describe the methods organizations use to determine whether changes have been made to the infrastructure.
- Outline the process to be followed prior to integrating any changes into a production environment.
- Provide full citations and references, formatted according to Strayer Writing Standards.
- For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.
In 60 to 75 words, please respond to at least one other post. Choose to respond to those who have few or no responses.
5 hours ago
Rohan Grey
RE: Week 9 Discussion
Top of Form
Hello class,
Change management is a significant component in promoting cybersecurity due to intensifying the sustainable utilization of computerized systems in an institution. According to research, change management involves updating systems' login, validation, and approval (Spremić & Šimunic, 2018). The practice enhances the protection of the critical infrastructure through the considerate three quotients, integrity, availability, and confidentiality. The use of the initiative risks improving the efficiency of rendering redundancy of the systems based on the in-depth evaluation of the process and implication to the performance outlier. Primarily, change management is an embodiment of cybersecurity that attributes to the planning, development, and evaluation of effective advanced measures.
Change management contributes to improved availability of system information to the users. Different organizations use dynamic protocols while accessing computerized systems. It is an endeavor based on the level of decision-making among the entities. Therefore, updating the login and nature of data processing based on hierarchical ranking fosters optimal efficiency of the systems since it elevates confidentiality and integrity of information during the access timeline (Spremić & Šimunic, 2018). An excellent example is using a program in a hotel by employees in different departments. A housekeeper intends to access details regarding room occupancy and the reservations. The back office focuses on the flow of cash hence the reliance on financial analysis, while the human resource utilizes positive reviews, repeat customer influx, employees' feedback, and the profitability scale. In addition to the distinctive uses of the program, the management accesses key analytical details across all departments to offer insight concerning the sustenance of the operations. As a result, the administration makes decisions based on all departments' proficiently acquired analysis report details. In this case, it is crucial for the diverse groups to adeptly access the system to accomplish the critical objective of duties and responsibilities.
Change management is essential in cybersecurity practice mainly because it enhances the evaluation of the efficiency of new developments regarding the use of a system. An excellent example is determining the integrity level of a program based on its availability and accessibility. Research indicates that using a system by different people increases the risk of cybersecurity integrity due to the relative malicious acts from the employees (Spremić & Šimunic, 2018). Change management ensures the development of a training program for the workers to learn best practices for exploiting particular datasets. As an interdependent element, cyber infrastructure's performance mainly relies on the optimal and sustainable use of information technology resources.
Monitoring Strategies of Change Effectiveness of Organization's Technological Infrastructure
One of the critical initiatives that affirm the effectiveness of change involves reporting an improvement in performance quotient. Due to technological advancement and the evolutionary scale of consumer behavior, change management boosts the high performance on confidentiality through a review of the logins and the security measures. Therefore, apart from the entities' performance and ease of use, the measure of change effectiveness is determined based on real-time information and report concerning an organization's operations (Moşteanu, 2020). In this case, it is crucial that all users attain proficient details for sustainable decision-making capacity. Technology infrastructure's measure of change effectiveness focuses on the balance between availability, confidentiality, and integrity to improve performance.
Implementation Process of Change Management
The first phase of the implementation process involves planning the change management. There are different aspects of change management that enhance infrastructure cybersecurity in a production organization. The approaches include installing new technological equipment and systems and the configuration of the operating programs. In this case, the management determines the change management aspect to improve performance. Research establishes that the prominent solution to cybersecurity encompasses integrating new technology and configuration processes (Kure & Islam, 2019). Therefore, the mapping enshrines the significant exploitation of loopholes to intensify productivity. An excellent example is the installation of machines and systems, improving quality assessment. The perspective's key objective involves incorporating a production practice with a high-performing quality control monitoring system.
The second phase is installing the new technology and system configurations within the production environment. In this case, it is essential to ensure the involvement and inclusivity of the relevant entities to enhance the implementation and productivity essence. During the installation, the management develops and shares the training manual with the workers. It is an initiative that fosters coherence and coordination while exploiting the changing concept. The third phase is the training of the workers on the use of the system and the significance of the changes. The major quotients that ensure consistency in the implementation process are monitoring the integrity and availability of the system's features. Convenience is a significant competitive advantage in the production environment mainly because of the reliance on quality and quantity against the time and cost incurred. The fourth phase is establishing an efficient monitoring schedule assessing the performance indicator based on the new configurations and technology infrastructure while affirming workers' acknowledgment of necessary cybersecurity measures and practices.
References
Kure, H. I., & Islam, S. (2019). Assets focus risk management framework for critical infrastructure cybersecurity risk management. IET Cyber‐Physical Systems: Theory & Applications, 4(4), 332-340.
Moşteanu, N. R. (2020). Challenges for Organizational Structure and design as a result of digitalization and cybersecurity. The Business & Management Review, 11(1), 278-
286.
Spremić, M., & Šimunic, A. (2018). Cyber security challenges in digital economy.
In Proceedings of the World Congress on Engineering (Vol. 1, pp. 341-346
Bottom of Form
Collepals.com Plagiarism Free Papers
Are you looking for custom essay writing service or even dissertation writing services? Just request for our write my paper service, and we'll match you with the best essay writer in your subject! With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Get ZERO PLAGIARISM, HUMAN WRITTEN ESSAYS
Why Hire Collepals.com writers to do your paper?
Quality- We are experienced and have access to ample research materials.
We write plagiarism Free Content
Confidential- We never share or sell your personal information to third parties.
Support-Chat with us today! We are always waiting to answer all your questions.