PDCA cycle

Identify the proper phase in the PDCA cycle for each security administration task.
Explain with proper reasoning how a specific administrative task helped in securing the environment. 

200 words, APA format, Remember that you must cite your sources (use both an in-text citation and a formatted reference). Don’t copy and paste large blocks of text. Tell us what you think in your own words. Dont use  discussion  coursehero.com, Wikipedia termpaperwarehouse.com,  and similar sites for discussion. Use only primary sources whenever possible. 

Sample Discussion for reference: 
Identify  the proper phase in the PDCA cycle for each security administration  task discussed in the lab. Explain with proper reasoning how a specific  administrative task helped in securing the environment
Submit to this discussion board.
The  security administration or PDCA (Plan-Do-Check-Act) process is the  process of applying security controls within the IT infrastructure. The  process of security administration is not singly implemented; somewhat,  it is a cyclic process whose stages are constantly implemented for  security administration.  The phases and their explanations are as  below;
Plan  – Reflect what you require to attain or meet your security objective  and institute processes and objectives to achieve that goal. A  description document will be formed during the process of planning.   It  also specifies how to measure the results to define if goals are met.
Do – Implement the processes proven in the Plan phase.
Check  – make sure the plan comprises clear meanings of a failure or success.  The phase of check contains activities done to assess the results of the  Do phase to confirm that the taken actions meet the distinct success  standards.
Act  – this means taking an action to retort to any unpredicted or undesired  performance in the Check phase. Evaluate the changes between projected  results and dignified results. Define the cause of any variances and go  back to the Plan phase to create a plan to advance performance.
The  security administration process entails any activities that support  directly the security policy of an organization. The security  administration actions keep the environment of the Windows secure.   Every security control organized should address directly a security  policy objective. Every goal in the security policy should back up one  or several of the A-I-C Triad features-integrity, availability and  confidentiality. As controls are established and positioned, be sure to  guard all three aspects for data at multiple layers. Any security  property unaddressed makes data susceptible to attack.
General   security administration activities are inclusive and not limited to:  providing input for adequate  policies use, , enforce physical security  standards, enforce password controls, deploy controls to attain  encryption necessities, keep software current, applying backup policies,   ensure antimalware controls are up-to-date and in strength, monitor  network  and system performance. These activities assist in making  environment and IT network secure.

Place your order
(550 words)

Approximate price: $22

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our Guarantees

Money-back Guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism Guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision Policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy Policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation Guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more