Identify how the adoption of standard and creation of policy

Assignment Help Management Information Sys
Reference no: EM131038746

(1) Information Security Standards and Models

Examples of the evolution of information security activities date back to coded messages in ancient times. The modern information security and assurance industry did not begin to establish uniform practices and standards until the late 1980s. One example of an early effort is the creation of ISC2, which involved a group of information security practitioners coming together to establish certification criteria for security professionals. The federal government and a number of standards organizations such as NIST and ISO have developed examples of information security standards. Those reviewing the available standards will find that there is significant agreement among them as to approaches and models that support the work of information security.

Use the study materials and engage in any additional research needed to fill in knowledge gaps. Then discuss the following:

Identify an example of information security standards that appears to have taken a leadership position in setting standards for the industry.

Outline the framework and objectives of a security standards organization, including whether the standards are intended for a particular sector within information security.

Describe how security professionals who work in the private sector might determine which information security standards and models are most appropriate for implementation in the context of a specific organization.

(2) Infosec Policies and Standards in the Private Sector

Application of information security standards and policies can be better defined in industries and organizations that must comply with specific regulations. As more industries become regulated, and as the regulations themselves become more standardized into common practice, this puts pressure on nonregulated industries to conform their practices too. Legal theory in the United States is heavily tilted towards establishing what is "reasonable," making the practice of all organizations best aligned in common practice where possible.

Use the study materials and engage in any additional research needed to fill in knowledge gaps. Then discuss the following:

Describe the relationship between information security standards organizations and the creation of internal information security policy within private sector organizations.

Identify how the adoption of standard and the creation of policy must be adopted within the context of the core business goals and objectives of an organization.

Explain how the information security professional can ensure that there is adequate consideration and approval for diverging from common practice in situations where that is necessary.

Reference no: EM131038746

Questions Cloud

Define the term culture jamming : Define the term "Culture Jamming". Visit http://www.adbusters.org/ , and share your impressions of the website. Then, explain how advertising can act as a form of cultural imperialism.
Create website for irc with link for each piece of equipment : Create a website for the IRC with links for each piece of equipment. Create a word processed document with pictures and step-by-step instructions on how to use the eye tracker as well as the EEG.
Showing the various classes identified and their association : The normalised relations that you will implement in the software, showing the attributes and keys together with their field type and "picture" (for example, the type of data that is held - text, a date, a number etc.) A sample table of the basic r..
Portfolio essay on the issue of globalization : Your essay should answer the following questions: What is globalization, and in what ways has the Internet served as a vehicle for it? What cultural values do the site you chose reflect? What political values are reflected?
Identify how the adoption of standard and creation of policy : Explain how the information security professional can ensure that there is adequate consideration and approval for diverging from common practice in situations where that is necessary.
How disney might be considered as a leading force : You will address how Disney might be considered as a leading force of US imperialism - utilizing the college's library resources.
Calculate after-tax weighted average cost of capital : Calculate after-tax Weighted Average Cost of Capital - what alternative capital structure would you recommend lowering the cost of capital to the company?
Analyze how the type of legal dispute affects the evidence : Analyze appropriate evidence handling for a cybersecurity-related investigation involving a violation of corporate security policy and a criminal investigation. Explore the roles that federal, state, local, and private sector organizations and ag..
Write one page reflection paper about the given article : Read article "Effect of distance of transportation on willingness to pay for food" by Carola Grebitus, Jayson L. Lusk and Rodolfo M. Nayga Jr then write one page reflection paper, the reflection paper should be in MLA style single space.

Reviews

Write a Review

 

Management Information Sys Questions & Answers

  In working out your responses to the discussion question

in working out your responses to the discussion question you should choose examples from your own experience or find

  Effect on implementing green is within an organisation

Discuss who are the key people in an organisation that can have the most effect on implementing Green IS within an organisation.

  Why are some consumer advocates upset with the growth of

1.why are some consumer advocates upset with the growth of crm2.what is contract life cycle management and how is this

  Discuss the technology behind the system

Consider again the telemedicine system discuss the technology behind the system, and how it will be updated to keep pace with emerging technology

  It infrastructures and its relation to business and society

Prepare report on IT infrastructures and its relation to business and society

  About social engineering audit

Social Engineering Audit

  Improve e-discovery and incident management

From the e-Activity, determine which of the seven recommendations to improve e-Discovery and incident management you would consider the most important for organizations to address. Justify your answer

  Information system are transforming business

What is information systems literacy? How does it differ from computer literacy?

  Categories of physical media in use in networks

Describe at least three categories of physical media in use in telecommunications networks today. Which of these media has the highest bandwidth? Which has the least bandwidth?

  Describe online analytical processing

Describe at least two methods that business owners could use in order to protect the privacy of both personal information and organizational data resources related to the Web and information technologies. Provide one example of the use of each met..

  Forward and reverse supply chain management

Describe in detail how and why a company should manage both forward and reverse supply chain management. Include what they should focus on to improve their customer service levels.

  Motivational theories and application to a highly creative

motivational theories and application to a highly creative and complex technology workforcein an internet retailer you

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd