We should mean almost, digitally. With serious considerations to best practices, widely acceptable principles including that of, directly and indirectly related, applicable laws and, if any, for the sake of thoughtful and sensible transparency. Almost everything, in this case is about, as nations and industries are already taking it as an initiative to protect entities such as people, enterprises, assets, properties including but not limited to information, which is the sole subject of information security specialists but it's reality is more complicated than arguing on which security can cover which area. Technology practitioners should appreciate it. Those who goes beyond a few specializations could realized it and make an effective position paramount to a cybersecurity responsibility. And the size of that responsibility may mean breaking and delegating it with various roles, with those who are effective and prudent in their jobs.
The earlier pronouncements about the top 3 layers of the OSI model, L8-10 of the (bold texts are added here) made sense in our world nowadays. They constitute the real requirements where a computing practitioner must perform its job a little better to achieve stability and sustainability in business-enabling and related technological facilities.
Layer 8 - The individual person—Technical (but fundamental)
Layer 9 – The organization—Administrative
Layer 10 – The government and international standards including management systems—Conformance or compliance
Without these, we never have been able to distinguished a job, that is final from the all on-going related tasks and non-stopping events concerning business-IT programs and projects. Much so for an IT operations that can be made upright until it fails, that's not having the regular maintenance it requires. Without the technical individual here, there is not much, even all the layers combined, can do for a business-computing systems that can be considered strategic, effective and efficient.
Comments