Reference no: EM133042647
Cybersecurity is critical to protecting an organization's infrastructure. Even within the cybersecurity field, several people may be responsible for ensuring an organization's infrastructure is protected.
How to apply change management principles to infrastructure protection. You may also use government websites, such as Cybersecurity from the National Institute of Standards and Technology.
Please respond to the following in a post of at least 200 words:
• Explain the purpose of change management and how it applies to infrastructure protection.
• Describe the methods organizations use to determine whether changes have been made to the infrastructure.
• Outline the process to be followed prior to integrating any changes into a production environment.
• Provide full citations and references, formatted according to Strayer Writing Standards.
o For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions.
Julia
Change management is how companies prepare for and execute change. A change is modifying or removing anything that could affect the services that the company provides. Change management helps every level in a company succeed through major or minor adjustments, and helps the business remain current by growing and adapting to current trends with information security. Change management also reduces incidents and meets standards and provides transparency. The main components of change management are as follows:
1. Recording changes --> Identifying the description of the change, what is involved and what will be impacted.
2. Planning changes --> This is determining what resources are needed to implement the change, with any t
time constraints. Plans also include all testing, and what measures should be taken if the change needs to be rolled back.
3. Approving changes --> This is going through the appropriate channels to approve the change having considered the plans and risk mitigation strategies.
4. Communicating changes --> At this stage, the planned and approved changed schedules would need to be communicated to anyone relevant to make sure all parties are prepared.
5. Reviewing changes --> After the change is executed, a post-implementation review of what worked, what did not, and how the next change could go better next time.
Attachment:- Cybersecurity.rar