Computer Networking

Question

Reply to at least two of your classmates. Be constructive and professional in your responses.

Reply 

1. Information systems architecture planning is related to a strategy put in place by an organization and is the main component that manages and deals with risk. Information systems architecture planning prepares an organization to react to any risk that might arise and project a better way to mitigate such risk.

For instance, my organization (Health Services) deals with patients and is obligated to protect patient's information throughout the information systems infrastructure. Therefore, with proper Information systems architecture

planning in place, we are able to protect our platforms, network, application, databases and operating system against disclosure of PHI of our patients in order to comply with HIPAA regulations. Most of the healthcare security

vulnerabilities can be compromised and get into wrong hands if proper plan are not in place, therefore my organization place a more emphasis on all risk mitigation process that can compromise patient information or mishandling. The risk can be eliminated by educating employees in all areas of risk management strategies and providing security awareness training to protect digital asset and mitigate threat that can pose a new risk to our systems. Also, our IT security analyst assesses our system architecture and addresses any vulnerability within our information system

175 words 

2. BYOD (Bring your own device) makes it difficult to control who access your data or who’s connected to your network and risk could be difficult to eliminate. But there are ways that organization can manage the risk. Clearly write policies about BYOD and ensure it is updated regularly. Ensure that you help your users protect themselves by educating your employees what’s not to collect from their devices. A UEM solution could also help enterprise secure the entire IT environment and all its endpoints. (The UEM client is a package with device administrator privileges. ) Forbes has listed “The 10 Rules Of BYOD” below is the link. Be sure to share any acronyms you use.

175 words 


Details
Purchase An Answer Below

Have a similar question?