Aligning security with business objectives

Assignment Help Basic Computer Science
Reference no: EM131638781

Application: Aligning Security with Business Objectives

The security policy of an organization is not an one-for-all solution; it varies with the organization. As you begin your exploration of information assurance and risk management, consider how organizations in different countries, and even different states, are distinct, with their own structures, culture, and dynamics, as well as unique security-related regulations. Some of this may be due to the nature of the organization, its size, and its business use cases-that is, situations in which a technique may be used profitably. Other concerns can be attributed to the laws, regulations, and industry standards for its location. Even organizations doing business on the Internet may face regulations when doing business in another country or state.

To prepare for this Assignment, assume the role of a consultant working for a bank in your home country that is expanding its online banking to mobile devices. At the same time, it will be opening its first branch office in another country. Choose the location of the new office and use the Internet as well as the Learning Resources in this Week to research regulations and industry standards relevant to the new location. Also research the privacy laws (including Internet privacy regulations) that apply for both the locations. Examples could be the Gramm-Leach-Bliley Act (financial services regulation in Weeked States) or the California Breach Notification Law applicable for Weeked States scenarios. You will need to refer to Brotby, "Layered Security" and "An Introduction to ISO 27001, ISO 27002....ISO 27008" in addition to other reading resources.

Explaining how to align the security policy of the organization with its business objectives, keeping in mind the regulations, privacy laws, and industry standards you have identified. Clearly state any assumptions, and provide citations for reputable sources used in your research.

Cover the following points:

  • Explain how the regulations, privacy-related laws, and industry standards you identified apply to this scenario.
  • Identify concerns you feel the bank will need to focus on because of expanding its online banking to mobile devices and opening its international branch office. Identify three areas where you will need to apply security controls to manage the risk involved in the scenario.
  • For each of these three areas, develop a key goal indicator (KGI) as explained in the textbook
  • For each KGI, indicate the security controls (these involve policies, processes, and tools) that will need to be developed and applied.
  • Justify how the key goal indicators and the security controls you have chosen align with business objectives and enable business processes.
  • Explain how industry standards and best practices are beneficial to implementing security policies that are aligned with business objectives.

Reference no: EM131638781

Questions Cloud

Develop two database management systems : You have been asked to develop two database management systems, one for a small departmental database and the other for a clinical data warehouse.
Would us supreme court have jurisdiction to hear the case : Suppose that Johnson had burned a Texas state flag instead of the U.S. flag. Would the U.S. Supreme Court have jurisdiction to hear the case?
Implement appropriate treatment for exacerbation of copd : Implement appropriate treatment for exacerbation of COPD, Demonstrate correct use of oxygen
Predict the brain weight for the species : Prediction. The line on the scatterplot in Figure is the least-squares regression line for predicting brain weight from body weight.
Aligning security with business objectives : The security policy of an organization is not an one-for-all solution; it varies with the organization. As you begin your exploration of information.
C++ programming in linux : This program is intended to get acquainted with Linux (or refresh programming experience). This will be a short interactive program that will get me started.
Finished medicating a patient with a narcotic injection : finished medicating a patient with a narcotic injection with a dose greater than ordered
Description of the role of it strategy in acquiring : A description of the role of IT strategy in acquiring business driven information systems -
Presentation for the executive leadership team of capratek : Design a narrated PowerPoint presentation for the executive leadership team of CapraTek, outlining your recommendations for addressing the problems

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Assessment phase of rmf

Consider the network risks that may be discovered during the assessment phase of RMF. Assessments can be time consuming.

  Explain why that action would have been ethical or unethical

Should Iris have placed the CD back at the coffee station and forgotten the whole thing? Explain why that action would have been ethical or unethical.

  What personality traits would you look for

Identify the company and the position. What personality traits would you look for? What personality tests would you give to new applicants?

  Find mean shopping time at supermarket-level of significance

Using 0.10 level of significance is there evidence that mean shopping time at local supermarket is different from claimed value of 22 minutes?

  Find the pep of the transmitter output

The output of the transmitter is connected to a 50-? dummy load that has a calibrated average reading wattmeter. The wattmeter reads 6.9 kW. Find the PEP of the transmitter output.

  Solving a linear equation

How is the approach to solving a linear inequality similar to solving a linear equation? When is the approach different? What process do you use when determining which side of an inequality to shade? Example!

  Troubleshooting with patience

The desktop administrator at a remote satellite office called you to let you know that after she installed a new hard disk in the office manager's computer, the DVD drive stopped working. Since you have your A+ certification, they're depending on ..

  Write a sequence of statements that creates a new file

There are two text files, whose names are given by two String variables , file1 and file2. These text files have the same number of lines. Write a sequence of statements that creates a new file whose name consists concatenating the names of the tw..

  The design phase of the srs project is in full swing

The design phase of the SRS project is in full swing

  What is the probability that no fragment arrives

What is the probability, roughly, that LAST FRAG expires? Assume this happens only when the last fragment is lost.

  The sales people at hyperactive media sales

The sales people at Hyperactive Media sales all use laptop computers so they can have easy access to important data on the road. The salespeople regularly take customer lists and other sensitive company information with them. Occasionally a laptop is..

  Determining the optimal strategy

If Mary uses an optimal strategy, then she will determine the answer at the end of exactly how many questions in the worst case?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd