Don't miss an insight. Subscribe to Techopedia for free.


How can security be both a project and process?

By Techopedia Staff | Last updated: July 2, 2020

The issue of IT security is a complex one that can require a strong, consistent response over time. Security can be both a project and a process in the sense that companies can design security projects to upgrade their systems while undertaking a continual process to maintain and enhance these projects for the future. The complexity of the kinds of attacks facing companies and other parties require dedicated, complex and multi-channel responses.

A company may develop a specific security project with its own time line and resources, but it’s likely that a security process will also apply, where professionals work over time to ensure security and respond to any cyber threats or other security issues. Companies can benefit from placing staff in either of these two roles, where creation and maintenance are both priorities in terms of protecting trade secrets, customer data and any other valuable data assets.

The dual nature of IT security is demonstrated in U.S. government reports that talk about life cycle development for security projects. These resources on adequate and comprehensive security point out that adequate security often involves ongoing vigilance and maintenance, rather than a one-time installation or setup. Experts talk about a multi-step process for security practices, which may include a data loop that takes in information in order to build future security protocols. Outside federal agencies and other groups often counsel businesses on the need for ongoing, capable security strategies.

Within the security community, there is the idea that security is more than just security architecture, that it’s a kind of living process where professionals have to attend to the technologies that the company uses for adequate enterprise security. This may involve close monitoring of network resources, emerging policies for endpoint security, responses and reactions to new viruses, malware and attacks, or anything else that enhances a security architecture over time.

Share this Q&A

  • Facebook
  • LinkedIn
  • Twitter


Cybersecurity Risk Management Encryption

Written by Techopedia Staff

Profile Picture of Techopedia Staff

At Techopedia, we aim to provide insight and inspiration to IT professionals, technology decision-makers and anyone else who is proud to be called a geek. From defining complex tech jargon in our dictionary, to exploring the latest trend in our articles or providing in-depth coverage of a topic in our tutorials, our goal is to help you better understand technology - and, we hope, make better decisions as a result.

More Q&As from our experts

Related Terms

Related Articles

Term of the Day

Sovereign Cloud

A sovereign cloud is a cloud computing architecture that’s designed and built to provide data access in compliance...
Read Full Term

Tech moves fast! Stay ahead of the curve with Techopedia!

Join nearly 200,000 subscribers who receive actionable tech insights from Techopedia.

Go back to top