explaining how the tools and processes demonstrated in the labs might be used by an infrastructure administrator to help secure an environment.

explaining how the tools and processes demonstrated in the labs might be used by an infrastructure administrator to help secure an environment.

 

PDCA cycle can be used to implement the security controls. It is a four-step model that is carried out repeatedly for continuous improvement. PDCA stands for Plan, Do, Check, and Act.

Plan – Identify an opportunity and plan a change. For instance, the quality of the finished product might not be high enough, doesn’t fully satisfy the consumer’s needs, or an aspect of your marketing anticipates better results. Explore the available information fully. Formulate ideas and develop an implementation plan. State your success criteria and ensure they are realistic and achievable.

Do – Test the change on a small-scale pilot project to determine whether the proposed solution achieves the desired outcome. This ensures no disruption in the main operation if it’s not successful. Gather data and information as you run the pilot project for future reference and use.

Check – review the test, analyze the results, and identify what you have studied against the expected outcome to assess whether the ideation was a success. You might have to return to the first step if it wasn’t; otherwise, proceed to the next phase.

Act – take action based on what you have learned. If it fails, repeat the cycle with a different plan. If successful, implement what you’ve learned to plan new improvements beginning the cycle.

Security administration processes involve any tasks that support an organization’s security policy to ensure a secure Windows environment. Every objective in the security policy should ensure Availability, Integrity, and Confidentiality of data. Data and information become vulnerable to attacks if any security policy is ignored.

Security administration tasks could include password enforcement, backup policies, encryption, and monitoring systems, and network performance, all meant to ensure a secure IT network and environment (BOURGEOIS, 2016).

References

BOURGEOIS, D. A. V. I. D. (2016). Information systems for business and beyond. CREATESPACE.

Desmond, B., Richards, J., Allen, R., & Lowe-Norris, A.G. (2008). Active Directory: Designing, Deploying, and Running Active Directory.

 

Order a similar paper

Get the results you need