This preview shows page 1. Sign up to view the full content.
Unformatted text preview: the design of the security solution. 3)Logical Design:Team members create and develop a blueprint for security,and examine and implement key policies. 4)Physical Design:Team members evaluate the technology needed to support the security blueprint,generate alternative solutions and agree upon a final design. 5)Implementation:The security solutions are acquired,tested,implemented and tested again. 6)Maintenance: Once the information security program is implemented,it must be operated,properly managed,and kept up-to-date by means of established procedures....
View Full Document
This note was uploaded on 09/10/2009 for the course CIS 625 taught by Professor Shannon during the Spring '09 term at Missouri State University-Springfield.
- Spring '09
- Computer Security