Process based standard of security model for many organizati

Assignment Help Basic Computer Science
Reference no: EM13732617

ISO 17799 is a well-known and accepted process based standard of security model for many organizations. In his ISO 17799 article, Siponen argues that standards need to better focus on the process and the quality of the process. Can the ISO model be improved by Siponen's position? In 400-600 words, discuss Siponen's position and provide support and rationale for your response. 

Reference no: EM13732617

Questions Cloud

Discuss the difference between attributes and variables data : Discuss the differences between attributes and variables data. List the six basic steps involved in building the house of quality.
Improvement to a product or service on the market : You can make a major modification / improvement to a product/service on the market or create your own product/service
Systems consideration in hris : Write a three to four (5 - 6) page paper in which you thoroughly answer the following questions;
Strategic objectives for your new division : Develop the strategic objectives for your new division of the existing business in a balanced scorecard format in the context of key trends, assumptions, and risks. The strategic objectives are measures of attaining your vision and mission. As you..
Process based standard of security model for many organizati : ISO 17799 is a well-known and accepted process based standard of security model for many organizations. In his ISO 17799 article, Siponen argues that standards need to better focus on the process and the quality of the process. Can the ISO model be i..
Multimedia can be difficult to view on a mobile device : Some multimedia can be difficult to view on a mobile device due to screen size or bandwidth limitations. Find two articles that discuss considerations and new developments that will enable multimedia on a site to be viewed effectively on a mobile dev..
List and describe the four main types of vmkernel services : In a Word document, explain the following topics.• List and describe the four main types of VMkernel services that require the use of VMkernel port.• List and detail the five capabilities that both vSS and vDS share in common.
Design a 3-bit counter, which can count either up or down : Design a 3-bit counter, which can count either up or down. The input has a clock, and a signal U. When U = 1, the counter counts up; when U = 0, the counter counts down. For example, assume the current counter Q(t) = 011. If U(t) = 0, then Q(t+1) = 0..
Potential negative aspects of promoting employees : Hiring and promoting from within is often seen as a positive motivational tool. It can be argued that there is a negative side to this practice. Outline five potential negative aspects of promoting employees from within an organization. Be sure to..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Review and discuss methods for it managers to maintain

Review and discuss methods for IT managers to maintain their skills while gaining new managerial skills

  Prepare a game called mysterywordgame

Continue prompting the user to enter letters until they have filled in the word or run out of turns. If they run out of turns (10 max) display the word.

  Distribute music on the internet.

an architecture for a system (such as iTunes) that is used to sell and distribute music on the Internet. What architectural patterns did you use as the basis for this architecture? Why are these patterns appropriate?

  Describe the scope and analyze how to control the scope

Describe the project including the describe the scope and analyze how to control the scope and identify possible risks, constraints, and assumptions.

  Write a program to search a particular element from an array

Write a program to search a particular element from an array using binary search. If the element is found set AX to one and otherwise to zero.

  Write an assembly language program that computes the product

Write an assembly language program that computes the product of two nonnegative integers a x b using IJVM instructions and 8088 MIC-1 MMV simulation environment.

  Explaining responsibility ofconfidentiality to employer

Describe what you must do in such a situation. You know that cost to your present employer will increase if ambiguities are not resolved. Though, you also have a responsibility of confidentiality to previous employer.

  Access to the operating system''s application programming

When an individual, an application, or anotherprogram, through access to the operating system's application programminginterface (API), attempts to and/or gains access to an information assetwithout explicit permission or authorization to do so

  What would you recommend to meet your company needs

Your company wants to implement a strategy for backing up network data. It wants a strategy that allows it to back up changed files on a daily basis and recover lost files quickly in the event of disk failure. What would you recommend to meet your..

  Identifying and describing how information is used

Write a 700- to 1,050-word paper identifying and describing how information is used and how it flows in an organization.

  Discuss at last three advantages of a hard-wired lan

Discuss at last three advantages of a hard-wired LAN compared to a wireless LAN (WLAN) and visa-versa

  When using uml to describe the classes

When using UML to describe the classes, what is UML? What does a + or - signify

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd