This essay has been submitted by a student. This is not an example of the work written by professional essay writers.
Uncategorized

Security compliance

Pssst… we can write an original essay just for you.

Any subject. Any type of essay. We’ll even meet a 3-hour deadline.

GET YOUR PRICE

writers online

Security compliance

Security compliance analyst plays a pivotal role in coming up security compliance guidelines in regards to conditions in line with established guidelines and standards. They as well do gap analyses by comparing security measures in progress about the set requirements, determining security vulnerabilities and liaising with the relevant department to come up with a solution. Security compliance analyst as well as performs risk assessments to the security network systems, and they might also be required to assist in designing network infrastructure (Cardwell 70). An individual typically needs a certified Information System security Professional qualification, cyber essentials Mod industry Security Notices and Def-Stan 05/138. A person can attain the qualification if he/she experiences at least three among the eight standard bodies of knowledge domains. The starting average monthly salary for this role is about $ 10000.

Security compliance analysts face some challenges as they execute their roles. Firstly, they face the problem of unknown assets on the network. This challenge plays when an organization doesn’t have a whole inventory system of the It assists required within their networks (Steinberg 24-26). It is a challenge for the network engineer’s since they won’t be able to determine whether the system is secure or not. They can address this challenge through the review of network devices and determining areas where they run. Through conducting the review, they can identify the various access points available on the network and identify an area which needs urgent security updates. Secondly, they can suffer from the challenge of poor network infrastructure. Regardless of the best input from the network engineers, there comes a day when an attacker might succeed in breaching the security of the network put in place, and the depth of the attack will depend on the structure of the network system in place.

In conclusion, compliance needs to come up with a suitable system to ensure that all set standards and guidelines are adhered to without any breach. The management should also that they work under a pleasant work environment to ensure they deliver to the best of their skills towards the smooth running of the organization

Work cited

Cardwell, Kevin. Backtrack: Testing Wireless Network Security. Birmingham: Packt Publishing, 2013. Internet resource.

Steinberg, Joseph. Cybersecurity. , 2020. Print.

  Remember! This is just a sample.

Save time and get your custom paper from our expert writers

 Get started in just 3 minutes
 Sit back relax and leave the writing to us
 Sources and citations are provided
 100% Plagiarism free
error: Content is protected !!
×
Hi, my name is Jenn 👋

In case you can’t find a sample example, our professional writers are ready to help you with writing your own paper. All you need to do is fill out a short form and submit an order

Check Out the Form
Need Help?
Dont be shy to ask