Discuss strategies that information security can use

Assignment Help Management Information Sys
Reference no: EM131834424

One page Discussion

Finding and Reporting Security Vulnerabilities

There are an increasing number of industries that are exposed to information security and privacy regulations. Those industries (such as federal agencies, health care, finance, insurance and publicly traded companies) have developed some fairly standardized approaches to meeting those regulations.

These regulations provide the security professional with a certain amount of "teeth" that can be used to motivate company executives to invest in proper resources in order to comply with those regulations.

That is not the case in industries that are not exposed to a particular set of regulatory guidelines. Health care is one example where the investment in information security controls pre-HIPAA were often well below the investment in other industries that were regulatedâ€"despite the fact that health care collects and stores highly sensitive data.

This example speaks to the challenge facing security professionals in unregulated industries to make the case for investment in security controls that do not necessarily contribute to the bottom-line profit margins.

Discuss strategies that information security professionals can use in their unregulated organizations to motivate company executives to provide the proper level of funding to adequately secure the information the organization collects and stores. Include in the discussion both the "carrot" and the "stick" that might be useful in generating these talking points.

For example, post-HIPAA, it was useful to point out to executives that there were penalties built into the HIPAA rules that assigned personal liability for those who could reasonably be expected to be responsible for securing information. "HIPAA jail" quickly became a thing in the health care security community.

Reference no: EM131834424

Questions Cloud

Provide an analysis of the technology and industry trends : Discuss the technology in detail; provide an analysis of the technology and industry trends. this paper should have the most recent technological developments.
Define types of hazards addressed by industrial hygienists : Define the types of hazards addressed by industrial hygienists. Discuss the types of control methods used by industrial hygienists.
Independent random variables : In exercises let X and Y be independent random variables. Let U = X + Y and V = Y - X. Let A = [|V| = 1]. Find (i) p[A|U = 1], (ii) FV|U(0|1)
Find the probability for k : Consider the events A and B defined in example lA. Assuming that P[A] = P[B] = ½, P[AB] = 1/3, find the probability for k = 0, 1,2, that (i) exactly k
Discuss strategies that information security can use : Discuss strategies that information security professionals can use in their unregulated organizations to motivate company executives.
Numerical-valued random phenomenon : The amount of bread (in hundreds of pounds) that a certain bakery is able to sell in a day is found to be a numerical-valued random phenomenon
Identify the failures in process and design : Evaluate which of the security principles you covered in Unit 1 were violated throughout these activities to set up and manage his network.
Describe a procedure for forming a random sample : Using this result, describe a procedure for forming a random sample of a random variable with a X2 distribution with 2n degrees of freedom.
Independent random variables : Let X and Y be independent random variables, each exponentially distributed with parameter A. Find the probability density function of Z = X1(X + Y).

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd