IT Security Processes
To achieve effective IT security requires processes related to security management. These
processes include business continuity strategy, processes related to IT security governance
planning, and IT security management implementation.
Processes for a Business Continuity Strategy
As is the case with any strategy, the business continuity strategy depends on a commitment
from senior management. This can include some of the analysis that is obtained by business
impact assessment/risk analysis focused on business value drivers. These business value
drivers are determined by the main stakeholders from the organizations. Examples of these
value drivers are customer service and intellectual property protection [10].