Identify how the adoption of standard and creation of policy

Assignment Help Management Information Sys
Reference no: EM131038746

(1) Information Security Standards and Models

Examples of the evolution of information security activities date back to coded messages in ancient times. The modern information security and assurance industry did not begin to establish uniform practices and standards until the late 1980s. One example of an early effort is the creation of ISC2, which involved a group of information security practitioners coming together to establish certification criteria for security professionals. The federal government and a number of standards organizations such as NIST and ISO have developed examples of information security standards. Those reviewing the available standards will find that there is significant agreement among them as to approaches and models that support the work of information security.

Use the study materials and engage in any additional research needed to fill in knowledge gaps. Then discuss the following:

Identify an example of information security standards that appears to have taken a leadership position in setting standards for the industry.

Outline the framework and objectives of a security standards organization, including whether the standards are intended for a particular sector within information security.

Describe how security professionals who work in the private sector might determine which information security standards and models are most appropriate for implementation in the context of a specific organization.

(2) Infosec Policies and Standards in the Private Sector

Application of information security standards and policies can be better defined in industries and organizations that must comply with specific regulations. As more industries become regulated, and as the regulations themselves become more standardized into common practice, this puts pressure on nonregulated industries to conform their practices too. Legal theory in the United States is heavily tilted towards establishing what is "reasonable," making the practice of all organizations best aligned in common practice where possible.

Use the study materials and engage in any additional research needed to fill in knowledge gaps. Then discuss the following:

Describe the relationship between information security standards organizations and the creation of internal information security policy within private sector organizations.

Identify how the adoption of standard and the creation of policy must be adopted within the context of the core business goals and objectives of an organization.

Explain how the information security professional can ensure that there is adequate consideration and approval for diverging from common practice in situations where that is necessary.

Reference no: EM131038746

Questions Cloud

Define the term culture jamming : Define the term "Culture Jamming". Visit http://www.adbusters.org/ , and share your impressions of the website. Then, explain how advertising can act as a form of cultural imperialism.
Create website for irc with link for each piece of equipment : Create a website for the IRC with links for each piece of equipment. Create a word processed document with pictures and step-by-step instructions on how to use the eye tracker as well as the EEG.
Showing the various classes identified and their association : The normalised relations that you will implement in the software, showing the attributes and keys together with their field type and "picture" (for example, the type of data that is held - text, a date, a number etc.) A sample table of the basic r..
Portfolio essay on the issue of globalization : Your essay should answer the following questions: What is globalization, and in what ways has the Internet served as a vehicle for it? What cultural values do the site you chose reflect? What political values are reflected?
Identify how the adoption of standard and creation of policy : Explain how the information security professional can ensure that there is adequate consideration and approval for diverging from common practice in situations where that is necessary.
How disney might be considered as a leading force : You will address how Disney might be considered as a leading force of US imperialism - utilizing the college's library resources.
Calculate after-tax weighted average cost of capital : Calculate after-tax Weighted Average Cost of Capital - what alternative capital structure would you recommend lowering the cost of capital to the company?
Analyze how the type of legal dispute affects the evidence : Analyze appropriate evidence handling for a cybersecurity-related investigation involving a violation of corporate security policy and a criminal investigation. Explore the roles that federal, state, local, and private sector organizations and ag..
Write one page reflection paper about the given article : Read article "Effect of distance of transportation on willingness to pay for food" by Carola Grebitus, Jayson L. Lusk and Rodolfo M. Nayga Jr then write one page reflection paper, the reflection paper should be in MLA style single space.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Describe where term web 2.0 or web 2.0 technology

Post addresses web 2.0 technology and related issues - Describe where term Web 2.0 or Web 2.0 technology

  Why software as a service

Why "software as a service" is (or is not - pick one) going to dominate the next several years in information management. Be sure to include some reference to SaaS material in your paper.

  Evaluate requirement 6 of the pci dss

In 1-2 pages, Identify what tools you would use, along with the testing procedures provided, to evaluate Requirement 6 of the PCI DSS. Make sure to identify a tool (as applicable) for testing procedure and state the tool you would use to verify compl..

  To what events must the mls system respond

Who are the stakeholders for the issues related to real estate in your community, and what are their main interests and what types of information does the board collect and make available to its members and to the community?

  Explian about vendor managed inventory system

What are the pros and cons of a vendor managed inventory system and How does it differ from a facility managed system

  Trend reports on the topic information technology

Write five trend reports on the topic Information Technology & business starting with January-December 2015 (nothing earlier) in hard (paper) and soft (electronic file)

  Discusses business information systems

Next, find a peer-reviewed article that discusses business information systems that you feel will be useful in helping you to complete this week's Assignment

  Analyze the term risk appetite

Assignment: Organizational Risk Appetite and Risk Assessment, Analyze the term "risk appetite". Then, suggest at least one (1) practical example in which it applies

  Explain how udp differs from ip

Explain how UDP (User Datagram Protocol) differs from IP as a transport mechanism.  Finally, describe the added capability TCP (Transmission Control Protocol) provides for data transport

  What opportunities might exist for an organization

What opportunities might exist for an organization to expand its primary Web site to better support the e-commerce efforts

  Material planning push pull systemi have the following task

material planning push pull systemi have the following task and i need some help getting started write a 2 page paper

  Most critical component of bcp from femas implementation

From the e-Activity, determine what you believe is the most critical component of BCP from FEMA's implementation / suggestions for the BCP process. Justify your answer

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd