Preview

Purpose of Gap Analysis

Satisfactory Essays
Open Document
Open Document
486 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Purpose of Gap Analysis
Purpose of the Gap Analysis
The purpose of this gap analysis is to use self-study resources to quickly identify the most obvious gaps in IT services on campus and then to use existing resources to begin to fill those gaps. The study also serves to establish baseline measures from which to measure progress toward future IT goals and plans. This self-study is not intended to replace development of a comprehensive strategic plan for ITT-Tech, but is rather meant as a perquisite to ensure that the required resources and conditions are in place for implementation of a strategic plan for IT by the time the plan is completed in spring 2014. A gap analysis is also needed to inform planning for campus budgeting as such budget planning for 2013-2014 will take place prior to completion for the IT strategic plan.
Methodology
The approach used in this study is a simple SWOT analysis that reviews strengths, weaknesses, opportunities, and challenges for IT on campus with the main purpose of identifying gaps in IT support and services. This report extends that traditional SWOT analysis by also providing background information, outlining a target environment, and making recommendations for quick action to close critical gaps.

Minimizing the Number and Severity of Security Incidents
In most areas of life, prevention is better than cure, and security is no exception. Wherever possible, you will want to prevent security incidents from happening in the first place. However, it is impossible to prevent all security incidents. When a security incident does happen, you will need to ensure that its impact is minimized. To minimize the number and impact of security incidents, you should:
• Clearly establish and enforce all policies and procedures. Policies and procedures should be thoroughly tested to ensure that they are practical and clear and provide the appropriate level of security.
• Gain management support for security policies and incident handling.
• Routinely

You May Also Find These Documents Helpful

  • Good Essays

    Policies and procedures are put into place to make sure that legislation is being followed and the service users and staff are safe and all needs are being met, inclusive practice and diversity is being followed and the setting is staying within the law.…

    • 1143 Words
    • 4 Pages
    Good Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Com 135 Week 5 Analysis

    • 678 Words
    • 3 Pages

    Three complete security policies. Use the Week 5 writing assignment as your starter policy for this section.…

    • 678 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 331 Words
    • 2 Pages

    Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities.…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    LA015666 Assignment 1

    • 5586 Words
    • 19 Pages

    Procedures are clear practical steps to be followed consistently through the whole agency or service in order to meet the policy statement.…

    • 5586 Words
    • 19 Pages
    Good Essays
  • Satisfactory Essays

    Is 411 Study Guide

    • 305 Words
    • 2 Pages

    Information Security Business Challenges and Policies the mitigate risk within the 7 domains. – p 77 - 83…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    UW 330 Syllabus

    • 1576 Words
    • 7 Pages

    This course is an introduction to the fundamentals of information technologies and to the strategic opportunities and challenges presented by these technologies. The course is based on the belief that business opportunities and challenges are best addressed through a fundamental understanding of management and technological concepts. Topics covered include e-business, collaboration through IT, databases, telecommunication technologies, and IT security. While there is some introduction to technical details, the real impact of this class is gained by understanding the impact of technology on how business is done.…

    • 1576 Words
    • 7 Pages
    Powerful Essays
  • Best Essays

    These policies are put in place to make sure problems do not arise currently or in the future. These policies must first be formed by the formulation process, which devises the idea of the policy. Then it has to be approved or denied by legislation which has several steps before it is approved or denied. Once it is approved, it moves to the implementation process that can be difficult if not properly executed. Possessing a plan, understanding the information, and goal in place the implementation phase should go…

    • 1544 Words
    • 7 Pages
    Best Essays
  • Satisfactory Essays

    Cypop5 Syllabus

    • 585 Words
    • 3 Pages

    1.2 Develop policies and procedures for: accidents, illness and emergencies; behaviour; safeguarding; equal opportunities and explain how these will be implemented.…

    • 585 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    unit 2 P5

    • 1244 Words
    • 3 Pages

    Procedures need to be in place and fulfilled to allow for the service users to be safeguarded against and for the level of abuse to be reduced to be as low as possible.…

    • 1244 Words
    • 3 Pages
    Good Essays
  • Good Essays

    SkillPort Security

    • 647 Words
    • 3 Pages

    Having the proper security measures is very critical when running a business. It can be very expensive for an organization to keep an updated security system but in the end, it is well worth the money. No manager should want to even take the risk of letting hackers or viruses into the organizations information system. To fully understand why it is critical to have security measures, you first need to understand the different threats a network can face. Having a good secure network can prevent things such as malware, social engineering attacks, spam, and phishing. All of these can be very dangerous and damaging to your network. As a manager it is also very important to have a thorough security policy that states the precautions and also the steps to take in case of a security breach. When choosing security controls for your business you must consider three things; what security controls does your business need to safeguard the information systems, the safety and protection that security controls should provide, and existing security controls and how they have been implemented.…

    • 647 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    This policy outlines the expectations of all behaviour, how to deal with the challenges staff come across and the steps we should take in dealing with any given situation.…

    • 479 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    2.2 Current Legislation

    • 602 Words
    • 3 Pages

    These policies will show the procedures that staff must follow if they have any concerns. The policies must cover;…

    • 602 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    nvq 3 social care unit 8

    • 3764 Words
    • 14 Pages

    1.2 Explain the main points of health and safety in a health and safety polices and procedures agreed with the employer.…

    • 3764 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    assisting with Medication

    • 5076 Words
    • 21 Pages

    1.3 Explain how and why policies and procedures are agreed ways of working must reflect and incorporate…

    • 5076 Words
    • 21 Pages
    Powerful Essays