Monitoring Process Monitoring process should be implemented as part of a routinely tasks. Risk can be prioritized based on the outcome and the effectiveness of action that needs to be carried out. The process of monitoring security plays an important function in any organization’s computer use both internally and externally. Security monitoring is used by companies to set boundaries for usage and screen the contents that is being transmitted both to-and-from the company. The process of continuous security monitoring across the enterprise has grown its efforts based on the security authorization process and include the post-authorization period. The objective of the monitoring process is to determine if security controls in the system stays effective over period f time in the light of uncertainties and events that happens within and as well as the environmental aspects in which the system operates.
Internal IT Security monitoring for internal aspects of the organization like payroll, human resources, accounting and
References: Cooper, D., Grey, S., Raymond, G., and Walker, P. (2005) Monitoring and Review. Project Risk Management Guidelines: Managing Risk in Large Projects and Complex Procurements. Greenstein, M. & Vasarhelyi, M. (2002) Risk of Insecure Systems. Electronic Commerce: Security, Risk Management. 2e. Ch. 7 Harris, S. (2010) Information Security and Risk Management. All-In-One CISSP Exam Guide. 5e. Ch. 3