Discuss why you view information security risk management

Assignment Help Management Information Sys
Reference no: EM131738690

RESPOND TO THESE DISCUSSION POST BASED ON THE TOPIC "Welcome to Security Risk Analysis and Planning.

Discuss why you view information security risk management as a balancing act. In response to your peers, state what a balanced approach to information security risk management means to you, and your view on why we should or should not apply a balanced approach to risk management."

APA reminders - In your Discussions and Assignments -

* Use less than 10% direct quotes

* Quotes over 40 words not allowed in this classes (by exception only ahead of time)

* Every quote needs a specific page or paragraph number

* Ideas and concepts from articles on websites need to be re-written in your own thoughts, vocabulary, and ideas and not simply paraphrased.

1.KevS Intro

A balanced approach to risk management when it comes to information security is balancing business operations with the security of the companies data.

Many times information security concerns can restrict business operations while the lack of information security can cause a companies data to be vulnerable to external security breaches. The reason for applying a balanced approach to information security is to understand how the business operates and in what space they operate within and apply security principles to mitigate risks within that space.

For example, if a companies sole business is in e-commerce then the credit card data and personal information of the companies customers should be protected from unauthorized access.

2.BrnL

I think that information security risk is a balancing act because the risk of breaches and other incidents needs to be weighed against efficiency and access. You can lock down a system, network, or system so tightly that it blocks legitimate usage.

From my own experience, overbearing controls can become something that users then try to find ways around, in order to get their work done.

For example, I currently work for an organization where every system modification request regardless of dollar value undergoes at least 4 levels of review, with the last being the CEO herself. What do most units do?

Try to find a way to get their work done using spreadsheets and simple database tools such as Access. The result - we have literally hundreds of spreadsheets being used for major purposes. Scary because spreadsheets are inherently difficult to control. Economics teaches us that at some point, adding additional investments will reach a point of diminishing returns. (Friant, 2012) We are way past the point of diminishing returns for development risk at my company.

A good example of an unbalanced view toward risk is much of the federal banking regulatory response to the economic meltdown of 2009. The cost of regulation has created barriers to entering the market for new banks, actually forcing banks to become bigger. While other issues are in play, regulatory cost is a major factor. Since 2011, only 9 new banks have started in the US. In 2007 alone there were 175. (Ponczek, 2017)

Allow your discussion posts to be detailed and capable of sharing knowledge, ideas and points. You must discuss the topic using your own words first. Using your own words indicate you understand the topic of discussions.

Secondly, you must cite your sources in-text. This is necessary to justify your points.

Sources from several sources showed good research abilities. Lastly, you must provide references at the bottom of your post.

A discussion post without justification with sources does not show proper research abilities. A terse and not detailed discussions represent post that would not provide enough sharing of knowledge or proper understanding of the topic.

DO NOT just copy and paste a sentence from online with citation at the end as your own discussion. I have not asked for definitions, I asked for discussions and will not buy this. You must show understanding of the discussion topic by using your own words to describe the topic and then justify that with sources.

Format references into the APA style if necessary. Extremely important. Intext citations is very essential and highly needed as well.

Wse double spacing, 12-point Times New Roman font, and one-inch margins. Sources should be cited according to APA citation method (citation should be relevant and current). Page-length requirements.

Make sure you cite if you take a piece of someone's work, very important and your reference should relate to your writing (don't cite a reference because it relates to the course and not this very paper) at least 2 current and relevant academic references. No heavy paraphrasing of others work.

Reference no: EM131738690

Questions Cloud

Define what ideas did it import and export : What ideas did it import and export. What trade goods did it import and export
Describe at least three human resource factors : Provide your expectations for the development of the project management field aided by modern technologies.
What category of art history is the painting being long to : What is the legacy of the Confederate memorials? Who was the sculptor? What category of Art History is the painting or sculpture being long to
Review of a scholarly article addressing ethics : Review of a scholarly article addressing Ethics and Why it Matters in Negotiation.Reviews should include a synopsis and your opinion of the article.
Discuss why you view information security risk management : Discuss why you view information security risk management as a balancing act. In response to your peers, state what a balanced approach to information security.
Ahima data quality management model : Explain AHIMA's data quality management model, including the domains it covers and the data characteristics. Provide examples that
What is health information exchange : What is health information exchange (HIE)? Explain the benefits and challenges associated with HIE, as well as the role of health information in relation to HIE
Subordinate expectations in order to lead effectively : Do you think that multinational managers must understand subordinate expectations in order to lead effectively?
Private sector work force : Unions represent under 7% of the private sector work force, perhaps 1/3 of public sector employees, down from a peak of union representation

Reviews

Write a Review

Management Information Sys Questions & Answers

  Evaluate the four risk-mitigation options and strategies

Evaluate the four risk-mitigation options and strategies. Give your opinion as to what circumstances would warrant each strategy.

  Analyze the current trends affecting the evolution hit

Analyze the current trends affecting the evolution of health information technology (HIT) - Determine a significant trend that you believe is having the most significant impact on the expansion of HIT.

  Encrytion should be specified to be wpa or wpa2

Many companies have concerns about security when using wireless. The encrytion should be specified to be WPA or WPA2 and some companies insist on also using VPN over the local wireless? WHY?

  How bias has blocked your ability to make rational decision

Consider the last decision that you have made (purchase of an automobile, purchase of a home, seeking a new job, etc.). Then, discuss that decision in terms of the rational decision making model. How could you have improved your decision?Discuss h..

  Features and benefits of internal property management system

What are the features and benefits of internal property management systems versus external global distribution systems? How do they compare? Which one offers the best overall competitive advantage

  How does the cio set the stage for it alignment

How does the CIO set the stage for IT alignment? What conversations does s/he have with the executive board?

  Build a data warehouse

Data warehouse Project-Build a data warehouse and to do a presentation of the project

  Develop a vulnerability assessment plan

For this assignment, you will need to develop a vulnerability assessment plan. The concepts needed to complete this assignment are found in your reading assignment and in the unit lesson.

  Discuss organizations it architecture

Discuss organization's IT architecture. Given the general description of the stakeholder groups below and using the general client-server classes defined.

  How advances in information technology have changed

Read, Improving the Efficiency, Accuracy, And Cost Effectiveness of Core Business Activities and distinguish how advances in information technology have changed the way businesses are conducted.

  Write organizational policy to correct the it-related issue

Write an organizational policy (or personal policy, if not in the job force) to correct the IT-related ethical issue that you described.

  Describe ings solution for providing security

Describe ING's solution for providing security to determine if the solution is adequate or inadequate. Provide a rationale for your answer.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd