Explain information security governance and management tasks

Assignment Help Management Information Sys
Reference no: EM131183426

Assignment: Information Security Governance

Information security management and governance are not simply implemented tasks within organizations. An information security governance program is a program that must be thoroughly planned, include senior-level management involvement and guidance, be implemented throughout the organization, and be updated and maintained. The International Organization for Standards (ISO) and the International Electrotechnical Commission (IEC) has created information security governance standards. Review the information security governance information provided by ISACA, located at
https://www.isaca.org/Knowledge-Center/Research/Documents/InfoSecGuidanceDirectorsExecMgt.pdf.

Write a 3-5 page paper in which you:

1. Define the information security governance and management tasks that senior management needs to address.

2. Describe the outcomes and the items that will be delivered to the organization through the information security program.

3. Develop a list of at least five best practices for implementing and managing an information security governance program within an organization.

4. Develop a checklist of items that needs to be addressed by senior management, including priorities and needed resources.

5. Use at least three quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required page length.

The specific course learning outcomes associated with this assignment are:

• Examine the principles requiring governance of information within organizations.
• Use technology and information resources to research legal issues in information security.
• Write clearly and concisely about information security legal issues and topics using proper writing mechanics and technical style conventions.

Reference no: EM131183426

Questions Cloud

Describe four levels of language structure and processing : Define language and lexicon. Evaluate the key features of language. Describe the four levels of language structure and processing. Analyze the role of language processing in cognitive psychology.
Compute the macaulay duration for the two bonds : Consider these two bond for (assume that each bond pays interest semiannually): What is the price value of a basis point for bonds A and B? Compute the Macaulay duration for the two bonds.
What are the five steps of capital budgeting analysis : What is the purpose of placing capital projects into categories such as mandatory replacement, or expansion of existing products, services, or markets?
Describe how work sampling and time study assist in analysis : Describe how work sampling and time study assist in analysis. The team wants to see all of your charts, diagrams, and analysis summary.
Explain information security governance and management tasks : Define the information security governance and management tasks that senior management needs to address. Describe the outcomes and the items that will be delivered to the organization through the information security program.
Determine whether the tunnel should be constructed : Finance: in equity valuation is the discount rate for finding present value (of say a stock with growing dividends) equal to the companies required return (k) or the risk free rate? and why please if its a simple answer. Apply the benefit-cost-ratio ..
Create portfolio that has an expected return : You have $110,000 to invest in a portfolio containing Stock X, Stock Y, and a risk-free asset. You must invest all of your money. Your goal is to create a portfolio that has an expected return of 10 percent and that has only 74 percent of the risk of..
Calculate the best-case and worst-case NPV figures : We are evaluating a project that costs $744,000, has a six-year life, and has no salvage value. Assume that depreciation is straight-line to zero over the life of the project. Sales are projected at 45,000 units per year. Price per unit is $60, varia..
Identify q for the process : When 1 mol of a gas burns at a constant pressure, it produces 2414 J of heat and does 5 kJ of work. identify the deltaE for the process. Identify deltaH for the process. Identify q for the process. Identify w for the process.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Describe the types of communication tools

Communication among various constituents in terms of time and place is key to project management consideration. Describe the types of communication tools that you could use to effectively manage your project communication in a large multinational ..

  Describe line process vs. batch process

Line Process vs. Batch Process - Effect on Functions - What concerns might the following functions have about this proposed change?

  How many years it take to recover the cost of layout change

Determine whether it would be worthwhile to change the layout of the hospital. -  How many years would it take to recover the cost of layout changes?

  Skills for an information technology project manager

Skills for an information technology project manager - Which skills do you think are most important for an information technology project manager?

  Fundamentals of analytics and business intelligence

Fundamentals of Analytics and Business Intelligence - Provide the answer to any one (1) of the questions from the Questions for Discussion OR Exercises section of chapter 13 (Make sure to identify the section and the question number).

  Explain the life cycle of an information system.

Imagine that you run a photography printing store. Your employees have been using punch cards for time entry since you started the business.

  How does dhl differentiate itself from its competitors

How does DHL differentiate itself from its competitors? How do the morning operations differ from the afternoon operations at DHL's Miami gateway?

  Advantages and disadvantages of social networking

Analyze how the university might integrate at least two social media and networking technologies to accomplish their goals. Your analysis must cover the advantages and disadvantages of social networking

  Intellectual capital - undervalued or taken for granted

Intellectual Capital - Undervalued or taken for Granted and What would you do to increase your organization's intellectual capital?

  Briefly define the term marketing mix

Briefly define the term marketing mix and distinguish it from the term marketing strategy. Explain how the level of complexity of a product can affect a company's choice of communication modes.

  How has mobile commerce played role in business development

How has mobile commerce played a role in new business development in the retail market? How can mobile technology be used by brick-and-mortar retailers to enhance the in-store shopping experience?

  Option 1- identify a regional cluster in nsw or elsewhere

option 1- identify a regional cluster in nsw or elsewhere in australia that currently exists or where such development

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd