Aligning security with business objectives

Assignment Help Basic Computer Science
Reference no: EM131652599

Application: Aligning Security with Business Objectives

The security policy of an organization is not an one-for-all solution; it varies with the organization. As you begin your exploration of information assurance and risk management, consider how organizations in different countries, and even different states, are distinct, with their own structures, culture, and dynamics, as well as unique security-related regulations. Some of this may be due to the nature of the organization, its size, and its business use cases-that is, situations in which a technique may be used profitably. Other concerns can be attributed to the laws, regulations, and industry standards for its location. Even organizations doing business on the Internet may face regulations when doing business in another country or state.

To prepare for this Assignment, assume the role of a consultant working for a bank in your home country that is expanding its online banking to mobile devices. At the same time, it will be opening its first branch office in another country. Choose the location of the new office and use the Internet as well as the Learning Resources in this Week to research regulations and industry standards relevant to the new location. Also research the privacy laws (including Internet privacy regulations) that apply for both the locations. Examples could be the Gramm-Leach-Bliley Act (financial services regulation in Weeked States) or the California Breach Notification Law applicable for Weeked States scenarios. You will need to refer to Brotby, "Layered Security" and "An Introduction to ISO 27001, ISO 27002....ISO 27008" in addition to other reading resources.

Explaining how to align the security policy of the organization with its business objectives, keeping in mind the regulations, privacy laws, and industry standards you have identified. Clearly state any assumptions, and provide citations for reputable sources used in your research.

Cover the following points:

  • Explain how the regulations, privacy-related laws, and industry standards you identified apply to this scenario.
  • Identify concerns you feel the bank will need to focus on because of expanding its online banking to mobile devices and opening its international branch office. Identify three areas where you will need to apply security controls to manage the risk involved in the scenario.
  • For each of these three areas, develop a key goal indicator (KGI) as explained in the textbook
  • For each KGI, indicate the security controls (these involve policies, processes, and tools) that will need to be developed and applied.
  • Justify how the key goal indicators and the security controls you have chosen align with business objectives and enable business processes.
  • Explain how industry standards and best practices are beneficial to implementing security policies that are aligned with business objectives.

Reference no: EM131652599

Questions Cloud

Life symbolize that might be important in cathers story : Who was Cordelia, What does her sad life symbolize that might be important in Cather's story
Define a tendency to present and equate racial minority : a tendency to present and equate racial minority groups and individuals with specific social problems
Intro to network security : The unchecked Web application is a risk to the organization hosting the application and the users that rely on the application in their daily lives.
Calculate and displays membership fees : Create a C# application that calculate and displays membership fees for N customers who registered for membership from a sport center based in Victoria
Aligning security with business objectives : The security policy of an organization is not an one-for-all solution; it varies with the organization. As you begin your exploration of information.
What feature of the light source do the spectra represent : What feature of the light source do the spectra represent? What is it that you are actually analyzing? How similar is this number to your original estimation?
Define a billboard advertising a local gym : On your way to a restaurant you notice a billboard advertising a local gym. There is a picture of a fit, young man and woman in workout clothes, laughing
What worms and trojan horses are : Part 1: Provide a detailed description of what worms and Trojan horses are.
Define the life of a slave girl : Which one of these two African American authors, Frederick Douglass, in Narrative of the Life, or Harriet Jacobs, in Incidents in the Life of a Slave Girl

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd