How can security be both a project and process?
A company may develop a specific security project with its own time line and resources, but it’s likely that a security process will also apply, where professionals work over time to ensure security and respond to any cyber threats or other security issues. Companies can benefit from placing staff in either of these two roles, where creation and maintenance are both priorities in terms of protecting trade secrets, customer data and any other valuable data assets.
The dual nature of IT security is demonstrated in U.S. government reports that talk about life cycle development for security projects. These resources on adequate and comprehensive security point out that adequate security often involves ongoing vigilance and maintenance, rather than a one-time installation or setup. Experts talk about a multi-step process for security practices, which may include a data loop that takes in information in order to build future security protocols. Outside federal agencies and other groups often counsel businesses on the need for ongoing, capable security strategies.
Within the security community, there is the idea that security is more than just security architecture, that it’s a kind of living process where professionals have to attend to the technologies that the company uses for adequate enterprise security. This may involve close monitoring of network resources, emerging policies for endpoint security, responses and reactions to new viruses, malware and attacks, or anything else that enhances a security architecture over time.
At Techopedia, we aim to provide insight and inspiration to IT professionals, technology decision-makers and anyone else who is proud to be called a geek. From defining complex tech jargon in our dictionary, to exploring the latest trend in our articles or providing in-depth coverage of a topic in our tutorials, our goal is to help you better understand technology - and, we hope, make better decisions as a result.Full Bio
More From Our Experts
Free Whitepaper: The Path to Hybrid Cloud:
Free E-Book: Public Cloud Guide:
Free Tool: Virtual Health Monitor:
Free 30 Day Trial – Turbonomic:
- Oct25 A Bigger Magnifying Glass: Analyzing the Internet of Things
- Oct26 The Central Hub: Defining the Data Lake
- Oct27 The New Normal: Dealing with the Reality of an Unsecure World
- Nov01 Time's Up! Getting Value from Big Data Now
- Nov16 Data Modeling in an Agile Environment
E-mail is not a threat. (Postal mail) is universal. The Internet is not.- USPS spokesperson Susan Brennan, in a 2001 Wired article.