Mitigate security risks and develop a security policy

Assignment Help Computer Engineering
Reference no: EM131724349

Story

I have worked in the information assurance (IA) arena for well over a decade. But as happens to many professionals, I worked in one sector only. I became used to the specialized controls that only affected a small segment of the IA population in terms of information technology (IT) and IA processes.

Sure, I was offered the chance to study Information Technology Infrastructure Library (ITIL), but I did not understand the value of a standardized approach to IT management at that stage in my career.

Moral of the Story

Today, I am learning about NIST SP 800-53 controls, but the organization I am working for does not have a standardized approach. That is a long-term goal. In many ways, I wish I had looked at the IA and IT world from a higher vantage point earlier on so that I would understand how a framework could be used to map multiple types of controls. Instead, I am behind the times in catching up on this important work.
Note: The example companies, organizations, products, people, and events depicted herein are fictitious. No association with any real company, organization, product, person, or event is intended or should be inferred.

Assignment

The story you just read shows how difficult it can be to get started with a standardized approach to IT management and to ensure that controls and risk management are understood. For this discussion, research the library and Internet for information about Control Objectives for Information and related Technology (COBIT) and ISO 27002, and then respond to the questions. Consider the difficulties faced in the story and how some of these difficulties were overcome when responding to the assignment questions.

Primary Task Response: Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas.

Today, organizations require significant management oversight and IT governance to ensure that controls and risk management are enforced and understood. One of the IT frameworks for ensuring that there is a common language for both management and IT personnel to manage risks, IT services, and the delivery of value is COBIT. In your main post this week, describe the following:

How does COBIT provide IT processes, goals, and metrics to mitigate security risks and develop a security policy?

What is the purpose of the Responsible, Accountable, Consulted, and Informed (RACI) chart?

How does COBIT integrate standards such as NIST SP 800-53, ITIL, ISO 27001, and ISO 27002?

Reference no: EM131724349

Questions Cloud

Calculate the value of the chi-square statistic : Imagine that 50 men and 50 women are asked, "Do you favor or oppose capital punishment for those convicted of murder?" In the observed data, 38/50 = .76.
Prepare an income statement in contribution margin format : Prepare an income statement in the contribution margin format. Calculate the contribution margin per unit and the contribution margin ratio
Describe and provide background information each method : Describe and provide background information each method, can monitor threats to a computer network
Explain the definition of the average american family : Although the 'family structure' is changing, developmental theorists argue the 'family function' remains the same.
Mitigate security risks and develop a security policy : How does COBIT provide IT processes, goals, and metrics to mitigate security risks and develop a security policy
Discuss effect of sample size on the chi-square test : Considering the effect of sample size on the chi-square test, explain why a finding that a relationship is "not statistically significant".
Create a memo setting out your analysis and recommendations : Create a memo, setting out your analysis and recommendations, that considers ONLY the following ethical lenses: Utilitarianism, Universal Ethics.
A description of the process of neurotransmission : Create a 7-12-slide PowerPoint Presentation about the way drugs affect the brain. A description of the process of neurotransmission.
Immediate dilution potential for new stock issue : What is the immediate dilution potential for this new stock issue?

Reviews

Write a Review

Computer Engineering Questions & Answers

  How to write basic structure of an exception handler

How to write basic structure of an Exception handler a. generate an abstract class Furniture b. Declare an abstract process Discount the returns no value but accepts the cost of item

  Questionillustrate a memory map for a system with a memory

questionillustrate a memory map for a system with a memory capability of 512mb. each memory location in system is 8

  How you would denormalize the model that you created

Describe how you would denormalize the model that you created in question E. Draw the new physical model on the basis of your suggested changes. How would performance be affected by your suggestions?

  Design the calculate button the accept button

You have been hired by an engineering company to develop software to perform advanced geometric calculation. Your new boss asked you to develop an application that allows engineers to calculate the surface area and the volume of a sphere. For this..

  What is olfactory-based warning system and how does it work

What is an olfactory-based warning system and how does it work? And, when and why might an olfactory-based warning system be superior to visual or auditory warning systems for alerting humans to potential danger?

  What are the challenges in rolling out a business

What is "enterprise-wide analytics technology," and how can it play a part in understand business processes? What are the challenges in rolling out a Business Intelligence tool.

  Write a program that creates a histogram

Write a program that creates a histogram that allows you to visually inspect the score distribution of a set of students. The program should prompt the user.

  What your uop application looks like on the web page

Project: First Draft of your User Manual Excerpt. Show the reader what your UOP application looks like on the web page with a screen capture.

  Write a paper about importance of database driven websites

Write a Paper about Importance of database driven websites and its risks. Technologies that support websites, pros and cons. Technologies that support databases, pros and cons. Criticality of the interface, examples of best sites.

  Design the circuit for a newspaper vending machine

Design the circuit for a newspaper vending machine. Each item costs 40 cents. The machine accepts nickels, dimes, and quarters.

  Test a class that prints william on the screen

Write down compile, and test a class that prints William Nichols, 777 Mockingbird Lane, Detroit MI 48222 on three separate lines on the sceen. Sace as Address.java

  Your boss has just heard regarding some nefarious computer

your boss has just heard about some nefarious computer activities called ping sweeps and port scans. he wants to know

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd