Companies information security program

Assignment Help Operation Management
Reference no: EM13844271

Imagine you're a senior executive for a large company. You've just been put in charge of your companies Information Security (IS) Program and told that your mandate is to prevent cybercrime through developing sound policy. Your primary challenges are twofold: 1) You are a transnational company and employees travel all over the globe; and 2) Your company has no active audit program in place to quantify vulnerabilities and potential losses from attacks to information systems. Attack them one at a time...

Realizing that when employees travel they are exposed to risk and possible cyber attack... You need to put information security protocols in place for individuals traveling abroad; specifically what other steps will you put in place to ensure that information (and equipment) will be secure? Will your plan vary depending on the countries your employees visit or is it one security plan works for all countries visited? Why? What steps must employees take before leaving and how will you measure that those steps have been taken?

Your other immediate challenge is to discuss with management the challenges associated with quantifying vulnerabilities and potential losses from attacks to your company's computer systems. What's involved in doing that and what are some of the biggest challenges involved in accomplishing that kind of assessment?

Reference no: EM13844271

Questions Cloud

Calculate the specific heat capacity of the metal : Calculate the specific heat capacity of the metal
Claim on the implied warranty of merchantability and fitness : Ruby Dempsey purchased a nine-week old pedigreed male poodle from the American Kennels Pet Stores. She named the poodle Mr. Dunphy. Dempsey later testified that before making the purchase, she told the salesperson that she wanted a dog suitable for b..
Increase switching costs and lock in customers and suppliers : How could a business use information technology to increase switching costs and lock in its customers and suppliers? How could a business leverage its investment in information technology to build strategic IT capabilities that serve as a barrier to ..
Companies information security program : Imagine you're a senior executive for a large company. You've just been put in charge of your companies Information Security (IS) Program and told that your mandate is to prevent cybercrime through developing sound policy. Realizing that when employe..
Consider project to develop new software inventory system : Consider a project to develop a new software inventory system. What are some of the resource constraints that would make the project challenging? Prior to that, please define what resource constraint means to you?
How much is typical monthly social security monthly check : How much is a typical monthly Social Security monthly check? What is the maximum annual income that anyone can receive from Social Security? How much would a person have to have earned to receive the maximum?
Function performed in scheduling and controlling operation : Which of the following is not a function performed in scheduling and controlling an operation?

Reviews

Write a Review

Operation Management Questions & Answers

  Which of the system represents interrelated activities

Which of the following system represents interrelated activities?

  How american airlines uses in order to reduce costs

discuss the techniques on how American Airlines uses in order to reduce costs and increase profits. The task for this activity goes beyond inventory management (although inventory management may be one technique) please answer with 150 words.

  Assess the product by using the five-step plan which is

imagining yourself to be the customer construct a house of quality to provide the organization with your perspectives

  Consider the baggage check-in of a small airline

Consider the baggage check-in of a small airline

  Illustrate what are the support also resources required

Illustrate what are the support also resources required from senior management to implement marketing plan.

  Calculate mean flow time and mean tardiness of the six hobs

Evan Schwartz has 6 jobs waiting to be processed through his machine. Processing time (in days) and due date information for each job are as follows: Sequence the jobs by FCFS, SPT, SLACK, and DDATE. Calculate the mean flow time and mean tardiness of..

  What is the primary difference between data and information

What is the primary difference between data and information?

  How are governmental mega projects procured

1. Why are organizations buying more professional services? 2. How are governmental mega projects procured?

  What are the factors influencing the choice of suitable

what are the factors influencing the choice of suitable form of business organization.

  Define utilitarianism and deontological ethics

Write a 350- to 700-word essay comparing the similarities and differences between virtue theory, utilitarianism, and deontological ethics. Include the following in your essay: A description of the differences in how each theory addresses ethics and..

  Described as sharing costs-sharing risks

The new world of employee benefits is best described as “sharing costs, sharing risks.” Discuss the impact of that philosophy on the broad areas of health care and pensions.

  Describe the common grounds for discharge and the procedural

Describe the common grounds for discharge and the procedural requirements that are outlined in many collective bargaining agreements. State why the following are important when these cases go to arbitration

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd