Preview

Goals And Objectives

Good Essays
Open Document
Open Document
1500 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Goals And Objectives
Goals and Objectives
ABC, Incorporated had identified the need to strengthen their current methodologies of ensuring that all applicable critical and security patches were being deployed and applied. The company believed that this objective would build a solid foundation to further mature its’ IT security practices. In order to facilitate that objective, the company developed five specific goals for this project:
1. Create a functional SCCM infrastructure to facilitate the automation of deploying security patches
2. Identify the current patching compliance of ABC’s deployed workstations and servers against applicable Microsoft critical and security updates
3. Remediate identified deficiencies to bring patching compliance up to an acceptable standard
4. Ensure continued compliance to set standards and facilitate reporting and monitoring
5. Develop guidelines for IT administrators to follow which will ensure future changes within ABC Inc.’s network footprint will conform to established software patching practices
Each successful completion of a goal led successive completion of the next goal in a phased manner. If any goal could not be successfully reached, the next tasks could not be started. During this project, all stated goal were realized, leading up the full successful completion of the project. The goals and their associated objectives are delineated as follows”
Create a functional SCCM infrastructure to facilitate the automation of deploying security patches The company recognized that the first step to successfully automating its processes was to ensure a good foundation. To successfully accomplish that goal, the following individual objectives were completed:
Created network information documentation and diagram
Created Active Directory infrastructure documentation and diagram
Identified individual sites and population of users and systems at each site
Determined number of servers required to deploy SCCM infrastructure
Identified TCP/IP information for

You May Also Find These Documents Helpful

  • Satisfactory Essays

    ISSC362 Week 2

    • 645 Words
    • 3 Pages

    The most important step in the fi ve-step hacking process is step 5, where the security practitioner must remediate the vulnerability and eliminate the exploit. What is the name and number of the Microsoft® Security Bulletin?…

    • 645 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Upgrade- Establish endpoint security updates (Antivirus, Malware protection). Upgrade all desktop and laptop Operating Systems. Once all systems are running on the same system, it will be easier to set up security protocols across the board. Make sure Patch updates are being made regularly, set up a specified time frame to check for and install new patches and updates.…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    network monitoring and maintenance, the need for an additional system administrator, and the risks of not…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    The Corporation Tech IT Network Security Plan establishes guidelines for IT practices used on a day to day basis to provide a secure and robust computing environment. These practices are used in order to protect the mission, operation, and reputation of Corporation Tech System and its information systems.…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Good Essays

    RLOT2 Task 2 B rev 1

    • 569 Words
    • 2 Pages

    The only zero cost opportunity, standardizing polices and procedures, is also the most difficult. Processes for incident response, patch management, and preventative maintenance must be developed, refined and communicated to the appropriate staff. Incident response processes must further be exercised so all incident responders know exactly what to do in the event of a (D)DoS. Development and deployment policies must be developed defining the process for development and deployment and use of University owned and managed computing devices. Security must be forefront-outlining security in the software development life cycle (SDLC) for both University developed applications and off the shelf applications.…

    • 569 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    10. Explain a scenario where an organization can use MBSA, WSUS and Windows Update in a combined strategy to maintain systems across an enterprise up-to-date.…

    • 952 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Explain the importance of defining the objectives, scope and success criteria of the decisions to be taken…

    • 688 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Explain the issues and policies organisations must consider when planning computer systems maintenance (P1, M1)…

    • 676 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    NT 2580 Project Part 2

    • 2096 Words
    • 9 Pages

    Issue four. You must research and formulate a plan to implement monitoring and analysis based on the premise that all employees have Internet access to browse the Web, there is no policy on the use of removable media, and several of the branch offices have encountered issues with malware recently. You must determine system implementation and access in accordance with defined IT criteria as well as how to collect information for identification of and response to security breaches or events.…

    • 2096 Words
    • 9 Pages
    Powerful Essays
  • Good Essays

    IS3230 Final Exam Answers

    • 939 Words
    • 4 Pages

    9. When considering access control security options to mitigate vulnerabilities within the infrastructure, it is ________.…

    • 939 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    IS3110 U1L1

    • 1084 Words
    • 5 Pages

    Lab #1 – Part A – List of Risks, Threats, and Vulnerabilities Commonly Found in an IT Infrastructure…

    • 1084 Words
    • 5 Pages
    Powerful Essays
  • Better Essays

    NT2580 Graded Assignments

    • 5288 Words
    • 22 Pages

    I have correctly matched all the risks or threats within the seven domains of a typical IT infrastructure with the solutions and preventative actions.…

    • 5288 Words
    • 22 Pages
    Better Essays
  • Satisfactory Essays

    Given the following list of end-user policy violations and security breaches, select three breaches and identify strategies to control and monitor each event to mitigate risk and minimize exposure.…

    • 564 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 3

    • 412 Words
    • 2 Pages

    6. When considering the implementation of software updates, software patches, and software fixes, why must you test this upgrade or software patch before you implement this as a risk mitigation tactic? Because you must first see if the software update, software patches, and…

    • 412 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    accuracy recognise the importance of accuracy. perform with a high degree of accuracy. perform with consistent accuracy. achieve results with accuracy and precision. maintain high statistical accuracy.…

    • 7443 Words
    • 30 Pages
    Good Essays