Managing Information Security System Technology Changes Across an Enterprise

The goal of information security systems in an enterprise is to make the right information available to the right entities at the right times and in the right formats while ensuring only authorized information flows occur. The standard approach is to purchase a new system to meet current needs. Patc...

Full description

Bibliographic Details
Main Authors: Kevin E. Foltz, William R. Simpson
Format: Article
Language:English
Published: International Institute of Informatics and Cybernetics 2019-06-01
Series:Journal of Systemics, Cybernetics and Informatics
Subjects:
Online Access:http://www.iiisci.org/Journal/CV$/sci/pdfs/SA380WH19.pdf
_version_ 1818574314988896256
author Kevin E. Foltz
William R. Simpson
author_facet Kevin E. Foltz
William R. Simpson
author_sort Kevin E. Foltz
collection DOAJ
description The goal of information security systems in an enterprise is to make the right information available to the right entities at the right times and in the right formats while ensuring only authorized information flows occur. The standard approach is to purchase a new system to meet current needs. Patches, work-arounds, and added components satisfy the changing future needs while creating an increasingly complex system, and operational capability slowly degrades over time as complexity builds. The system is then rebuilt from the ground up, at great cost and inconvenience, and the cycle repeats. This paper describes an approach for constant change. Instead of building the best system possible based on today's needs, only to replace it in the future, the goal is a system that is capable of evolving toward a better future in a consistent and directed way. This prevents one-off fixes from lingering, and it keeps the distributed decision-making process aligned toward a common enterprise goal. Components not consistent with future goals are identified and scheduled for replacement. Current practices chosen for expedience are assigned expiration dates to prevent them from becoming solidified in the future architecture. The replacement cycle is applied to components of the system instead of the entire system. This stops the cycle of complete replacements by allowing constant change, which reduces overall cost and maintains a more consistent operational capability.
first_indexed 2024-12-15T00:24:57Z
format Article
id doaj.art-78ede5c553f642ad9c0cd68af5c78225
institution Directory Open Access Journal
issn 1690-4524
language English
last_indexed 2024-12-15T00:24:57Z
publishDate 2019-06-01
publisher International Institute of Informatics and Cybernetics
record_format Article
series Journal of Systemics, Cybernetics and Informatics
spelling doaj.art-78ede5c553f642ad9c0cd68af5c782252022-12-21T22:42:12ZengInternational Institute of Informatics and CyberneticsJournal of Systemics, Cybernetics and Informatics1690-45242019-06-011735561Managing Information Security System Technology Changes Across an EnterpriseKevin E. FoltzWilliam R. SimpsonThe goal of information security systems in an enterprise is to make the right information available to the right entities at the right times and in the right formats while ensuring only authorized information flows occur. The standard approach is to purchase a new system to meet current needs. Patches, work-arounds, and added components satisfy the changing future needs while creating an increasingly complex system, and operational capability slowly degrades over time as complexity builds. The system is then rebuilt from the ground up, at great cost and inconvenience, and the cycle repeats. This paper describes an approach for constant change. Instead of building the best system possible based on today's needs, only to replace it in the future, the goal is a system that is capable of evolving toward a better future in a consistent and directed way. This prevents one-off fixes from lingering, and it keeps the distributed decision-making process aligned toward a common enterprise goal. Components not consistent with future goals are identified and scheduled for replacement. Current practices chosen for expedience are assigned expiration dates to prevent them from becoming solidified in the future architecture. The replacement cycle is applied to components of the system instead of the entire system. This stops the cycle of complete replacements by allowing constant change, which reduces overall cost and maintains a more consistent operational capability.http://www.iiisci.org/Journal/CV$/sci/pdfs/SA380WH19.pdf enterprisetechnologyoperational baselineimplementation baselineinformation securitytarget baseline
spellingShingle Kevin E. Foltz
William R. Simpson
Managing Information Security System Technology Changes Across an Enterprise
Journal of Systemics, Cybernetics and Informatics
enterprise
technology
operational baseline
implementation baseline
information security
target baseline
title Managing Information Security System Technology Changes Across an Enterprise
title_full Managing Information Security System Technology Changes Across an Enterprise
title_fullStr Managing Information Security System Technology Changes Across an Enterprise
title_full_unstemmed Managing Information Security System Technology Changes Across an Enterprise
title_short Managing Information Security System Technology Changes Across an Enterprise
title_sort managing information security system technology changes across an enterprise
topic enterprise
technology
operational baseline
implementation baseline
information security
target baseline
url http://www.iiisci.org/Journal/CV$/sci/pdfs/SA380WH19.pdf
work_keys_str_mv AT kevinefoltz managinginformationsecuritysystemtechnologychangesacrossanenterprise
AT williamrsimpson managinginformationsecuritysystemtechnologychangesacrossanenterprise