The risk assessment for the health body wellness center

Assignment Help Basic Computer Science
Reference no: EM13767463

Introduction:

An Information Security Management System (ISMS) represents a systematic approach for designing, implementing, maintaining, and auditing an organization's information system security objectives. As with any process, if an ISMS is not continually monitored, its effectiveness will tend to deteriorate.

For this task you will be using the attached "Healthy Body Wellness Center Risk Assessment" case study. In this task, you will be writing a 1-2 page white paper outlining the scope of an ISMS plan for the Healthy Body Wellness Center and an evaluation of the previously conducted risk assessment.

The first step in initiating an ISMS is to form a committee of upper level management that would set the tone for the ISMS. Assume you are part of that team. Initiating an ISMS involves developing a plan that includes the scope of the ISMS and identifying and assessing risk. The risk assessment for the Health Body Wellness Center has already been conducted. Your task is to define the ISMS scope for the Healthy Body Wellness Center and make recommendations for implementing the resulting ISMS plan.

Task:

A. Outline the scope (suggested length of 1-2 pages) for the ISMS plan being developed in the case study by including the following:

1. Information about the business objectives for the organization
2. A description of the guiding security principles of the organization
3. A justification of the processes that should be included in the scope
4. A justification of the information systems that should be included in the scope
5. A description of the IT infrastructure that includes a description of information flow

B. Recommend additional steps that the organization would need to take to implement the ISMS plan.

1. Discuss what each recommended step entails.

2. Justify each recommended step.

C. When you use sources, include all in-text citations and references in APA format.

Reference no: EM13767463

Questions Cloud

A manager of a shoe manufacturing plant : 1. Assume that a manager of a shoe manufacturing plant wants to practice management by exception. What are some types of reports that would be helpful? 2. Of the six systems elements that you can form the basis for system control design, which one do..
What is puck surprised to see at the funeral : What is Puck surprised to see at the funeral? What does Tommy's dad mean when he tells Puck that he "would've lost him either way"?
Glacial period related problem : What do you think the effects on humans will be if the climate continues to warm precipitously?
Approximate the probability that at most will be defective : A manufacturing process produces semiconductor chips with a known failure rate of .If a random sample of chips is selected, approximate the probability that at most will be defective.Use the normal approximation to the binomial with a correction for ..
The risk assessment for the health body wellness center : The risk assessment for the Health Body Wellness Center has already been conducted. Your task is to define the ISMS scope for the Healthy Body Wellness Center and make recommendations for implementing the resulting ISMS plan.
Independent issues concerning the capital stock : Respond to the following independent issues concerning the capital stock of corporations in your initial post:
Key elements as part of the risk management framework : Discuss key elements that need to be addressed as part of the risk management framework by completing the attached "RMF To-Do List."
Taxation research and communication : The current tax law system in the United States has emerged over many years from statutory, administrative, and judicial sources. These sources are continually changing and new laws are introduced at least annually.
An llc or a shareholder of a corporation. : A limited liability partnership (LLP) is a type of general partnership that most states now permit. There is a very important distinction, however, between an LLP and an LLC; in an LLP, the partners are not liable for the debts of the partnership. Ho..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  The pointer''s of c++

Write a 800 word discussion of what was lost and what was gained in Java's designers' decision to not include the pointer's of C++

  Demonstrates the use of the command line compiler

Write some usable code that demonstrates the use of the command line compiler to compile the code into a java.class file. Place at least one debug line in the code using a Java library utility such as print. Be sure to upload both the notepad file wi..

  Define a work breakdown structure

Summarize the project requirements and other assumptions (i.e., budget, human resources, workload, environmental dependencies, etc.). Define a work breakdown structure and describe the methodology behind constructing one.

  Create a fully unbalanced bst

I need to create a program written in Java. It needs to create a fully unbalanced BST. It must have 26 levels. It must demonstrate the insertion of elements into the BST.

  Design a spreadsheet to understand required funds

Using the parameters in (a), construct a graph showing how the amount required for the order would vary if the unit cost of a package of bandages rose by $0.25, $0.50, and so on, up to $3.00 per package.

  Role of systems analysis in success of firms today

What role does systems analysis play in success of firms today? Why? Where would you "place" analysis function to maximize its effectiveness? Support recommendations.

  Part of your first project

On completion of this course you are hired by the company Tickets R Us. Part of your first project is to develop an application to assist with the selling of tickets. After discussing with your client

  Recognize interface metaphor to use for conceptual design

For conceptual design (architectural or high-level), recognize the interface metaphor to use, interaction type(s) to employ, and interface type(s) to follow. For each of these, make sure to describe why you select what you did.

  Finding content of top of stack-call instruction is executed

Specify the content of PC, SP, and the top of the stack in the following situations: After the call instruction is executed.

  Statements about current computer hardware is true

A hard disk is a type of volatile memory - Most of Intel's processors can still execute programs that were written for the 80386. When that processor was introduced in 1991, there were 275,000 transistors on the chip.

  Does your company use both lan and wan technologies

Could any of the technologies (Ethernet, token ring, fast Ethernet, 100VG-AnyLAN or gigabit Ethernet) improve your current network's performance?

  Difference between cyber crimes and cyber-related crimes.

Summarize the difference between cyber crimes and cyber-related crimes. On cyber crimes, define cyber trespass, cyber privacy and cyber vandalism. On cyber-related crimes explain the difference between cyber-assisted and cyber-enhanced crimes.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd