preview

Security Awareness

Better Essays

Change Management Plan CSIA 413 Jason Hess VERSION HISTORY Version # | ImplementedBy | RevisionDate | ApprovedBy | ApprovalDate | Reason | 1.0 | | | | | | UP Template Version: 12/05/11 TABLE OF CONTENTS 1 Introduction 4 1.1 Purpose of The Change Management Plan 4 2 Change management Process 4 2.1 Change Request Process Flow Requirements 4 2.2 Change Request Form and Change Management Log 5 2.3 Evaluating and Authorizing Change Requests 6 2.3.1 Change Control Board 7 3 Responsibilities 7 Appendix A: Change Management Plan Approval 9 Appendix B: References 10 Appendix C: Key Terms 11 Appendix D: Change Request Form Example 12 Appendix E: Change Management Log Template 13 Introduction Purpose of The …show more content…

In order to have secure emails, the BA needs to protect it by installing adequate antivirus software. | Submitter | Mr. Bill Wagner | Phone | (541) 474-6866 | E-Mail | bwagner@ba.edu | Product | Antivirus software | Version | 1 | Priority | High | | | Element | Description | Date | 10/01/2012 | CR# | 00006 | Title | Shared Information Storage Resources Protection | Description | Shared information resources storage protection needs to be implemented in order for faculty to store and exchange electronic materials, grades as well to access them outside BA campus. | Submitter | Ms. Sonia McGee | Phone | (541) 474-6809 | E-Mail | smcgee@ba.edu | Product | Protection for Shared Information Storage Resources | Version | 1 | Priority | Medium | Evaluating and Authorizing Change Requests Change requests are evaluated using the following priority criteria: Priority | Description | High | Security policies must be fully implemented in order to protect BA information. This CR affects large numbers of BA users. | High | Network protection must be implemented to avoid malicious attacks. This CR affects large numbers of BA users. | High | Email protection must be implemented to protect BA email communication. This CR affects large numbers of BA users. | Medium | Strategic plan should be implemented to protect BA information security program. | Medium | As technology is

Get Access