|
This workshop will present a best practice methodology for how today’s corporations/organizations should implement computer security. A computer security implementation roadmap will be presented. A “Security Architecture” diagram (single frame slide) will be the focus of discussion during the workshop. The workshop will take participants through a series of steps in the Security Architecture diagram that will include: identifying security threats, vulnerabilities and opportunities, information technology and security strategies, and the impact of computer security on business processes and products/services. Minimum security baselines, policies, standards, procedures and the latest security hardware and software tools will be discussed. This workshop will be beneficial to all instructors and students of computer science/information systems as computer security has become a priority in today’s world. Workshop attendees will learn the importance of implementing a sound Security Architecture, the methodology involved and how companies successfully used the security implementation roadmap. All information systems and computer infrastructure components in today’s organizations require an appropriate level of security as computer information systems and data are vital assets to the organization. Details and knowledge of computer security implementation and security architecture can be obtained from this workshop.
Keywords: Security, Architecture, Information, Data, Hardware, Software, Technology, Systems, Threats, Vulnerabilities
View the PowerPoint Slides (PPT) for this presentation. (47 K bytes)
Comments and corrections to
webmaster@isedj.org