Computer Science : Microsoft Windows Security

MICROSOFT WINDOWS SECURITY ADMINISTRATIONAssignment: Security Policy Goals{Students name}{Professors name}{Course title}{Date}1MICROSOFT WINDOWS SECURITY ADMINISTRATION2The Security Administration CycleThe process of security administration does not happen in a straight line but it is carried out as acycle. There is a number of phases encountered in security administration. This process makesquality to be a continuous but not a single goal. The security administrator has the responsibilityof constantly following the four-phase cycle to ensure their environment is always in the highestlevel of security. The mostly used cycle has Plan-Do-Check-Act phases.1. PlanThe first phase is to plan on the organization goals which involves cost saving, customer value orthe time it will take to get to the market. The administrator must measure the level ofeffectiveness which will be brought by the change (Sieuwert, 2017).2. DoAfter setting the goals, the second phase is to make the intended change in the environment. Thisphase is done to implement the processes stated in the planning phase. Security administratorscan do this by reinforcing security, installing firewalls and coming up with new trainingtechniques.3. CheckOnce the change is made the third phase is to check or study the system. This is the process ofcomparing the results which change has brought against the expected results. Every change madeshould bring improvement in the operation of the ...


To Order an Original Plagiarism Free Paper on the Same Topic Click Here

Answers

Related Questions

Art & Design : Chicago Film Analysis...

FILM ANALYSIS1Film Analysis: Use of song in Chicago filmName of StudentInstitutional AffiliationFILM ANALYSIS2Chicago film is characterized by numerou...

Business : Technology Entrepreneurship...

Running Head: TECHNOLOGY ENTREPRENEURSHIPTechnology EntrepreneurshipNameInstitution7/23/201TECHNOLOGY ENTREPRENEURSHIP2Technology EntrepreneurshipTech...

Psychology : P010...

Running head: COMMUNICATION STRATEGIES FOR CHILDREN WITH ASDCommunication Strategies for Children with ASDInstitution Affiliation:Name:1COMMUNICATION...

Engineering : Discussion Post...

1Discussion PostDISCUSSION POSTSTUDENT NAME:COURSE CODE:INSTRUCTORS NAME:DATE:2Discussion PostDiscussion PostAfter watching and critically analyze the...

English : Can A Vegan Diet Be Healthy 1...

Running head: CAN A VEGAN DIET BE HEALTHY?Can a Vegan Diet Be Healthy?Students NameInstitutional Affiliation1CAN A VEGAN DIET BE HEALTHY?2Can a Vegan...

Business : Amazon S Generic Business Strategy Fina...

Running head: AMAZONS GENERIC BUSINESS STRATEGYAmazons Generic Business StrategyYour NameCourseUniversityDue Date of Assignment1AMAZONS GENERIC BUSINE...

Powerpoint : Grant Proposal Ppt...

GRANT PROPOSALFOR HOMELESS PERSONSPREPARED BY:PRESENTED TO:INTRODUCTION This task force was appointed by the city mayor Purpose is to seek grant to co...

Management : Angle...

Running head: DATA ANALYSIS AND VISUALIZATIONReplies to StudentsNameInstitution1DATA ANALYSIS AND VISUALIZATION2Replies to StudentsVikranthUndoubtedly...

Business : Employee Retention...

EmployeeRetentionSTUDENTS NAMEINSTITUTIONS NAMEDATEEmerging employee retentionissuesJob satisfaction, globalization among other factors have becomevit...

MySQL : Data Warehouse System...

Running Head: DATA WAREHOUSE SYSTEMData Warehouse SystemStudents NameInstitution Affiliations1DATA WAREHOUSE SYSTEM2Faced with the challenges of compl...

Sociology : Sociology Quantitative Research And Wr...

Running Head: SOCIOLOGY QUANTITATIVE RESEARCH AND WRITINGSociology Quantitative Research and WritingNameInstitutional AffiliationsDateSOCIOLOGY QUANTI...

Management : Part 2.editedf...

Part 2SIEM is a mechanism for detecting, tracking, reporting and assessing the security issueswithin the IT system. The log data is being collected an...

Management : Cybercrime...

Running head: EMERGING THREATS AND COUNTERMEASURESEmerging Threats and CountermeasuresStudents NameUniversity of Campbellsville1Running head: EMERGING...

English : Houng Dog.edited...

Running head: MUSIC COVERS1Hound DogNameInstitutional AffiliationMUSIC COVERSThe differences between Big Mama Thornton and Elvis Presley, "Hound Dog"I...

Sociology : Wellbeing...

Running Head: WELL-BEING1Well-beingStudents NameInstructorInstitutionDateWELL-BEING2IntroductionWell-being covers how individuals feel about themselve...

Geography : First Nation...

GEOGRAPHY 1120MIDTERM STUDY GUIDESPRING 2020All the questions on the midterm will be taken from the questions below. However, they mayappear in a diff...

Sociology : 20200214181712read Articles Below 1...

Running head: QUANTITATIVE RESEARCH AND WRITINGQuantitative Research and WritingNameInstitution affiliate1QUANTITATIVE RESEARCH AND WRITING2Quantitati...

English : Music And Racial Attitudes...

Running Head: MUSIC AND RACIAL ATTITUDESMusic and Racial AttitudesNameInstitution1MUSIC AND RACIAL ATTITUDES2Music and Racial AttitudesIn the mid-20th...

Marketing : Product Planning And Channel Managemen...

PRODUCT PLANNING AND CHANNEL MANAGEMENTProduct Planning and Channel Management Peer ResponseStudents NameInstitutional Affiliation1PRODUCT PLANNING AN...

Business : Contract...

Running head: EMPLOYMENT CONTRACTEmployment ContractStudents NameInstitutional Affiliation1EMPLOYMENT CONTRACT2Employment ContractAccording to the lec...

Business : Advantages And Disadvantages Of Unions...

1Running Head: ADVANTAGES AND DISADVANTAGES OF UNIONSAdvantages and Disadvantages of UnionsStudents NameInstitutions NameDate2ADVANTAGES AND DISADVANT...

Management : Response 1...

Running head: RESPONSE1RESPONSEStudents NameStudents AffiliationCourseRESPONSE2Hello Sara Thompson,Indeed, the purpose or goals of CMS emergency prepa...

Marketing : Pricing Issues In Channel Management...

PRICING ISSUES IN CHANNEL MANAGEMENTPricing Issues in Channel ManagementStudents NameInstitutional Affiliation1PRICING ISSUES IN CHANNEL MANAGEMENT2Pr...

Computer Science : Articles.edited Final 1...

Running head: ARTICLES1Articles Analysis on Big DataStudents NameStudents AffiliationCourseARTICLES2Articles Analysis on Big DataThe two authors Mille...

If you didn't find the right answer

Ask Your Questions, We'll notify you once someone answers it