Principles for policy and standards development

Assignment Help Basic Computer Science
Reference no: EM132525044

Discussion 1.

"Principles for Policy and Standards Development" Please respond to the following:

Select two principles for policy and standards development (accountability, awareness, ethics, multidisciplinary, proportionality, integration, defense-in-depth, timeliness, reassessment, democracy, internal control, adversary, least privilege, continuity, simplicity, and policy-centered security). Examine how these principles would be the same and different for a health care organization and a financial organization.

Determine which type of organization would have the most difficulty implementing the principles you selected. Support your answer.

Discussion 2.

"OCTAVE" Please respond to the following:

From the e-Activity, provide a brief explanation of the Operationally, Critical Threat, Asset, and Vulnerability Evaluation (OCTAVE) methods. Explain how they are beneficial for organizations developing their IT risk management approaches.

From the e-Activity, explain how the size of the organization impacts the OCTAVE method utilized. Determine the factors that large organizations, as opposed to small organizations, are most concerned with.

Discussion 3.

"Acceptable Use Policy" Please respond to the following:

Describe the main elements of an acceptable use policy. Determine the factors that organizations need to consider when developing their acceptable use policy.

Determine the special considerations that need to be taken into account when developing the acceptable use policy for different types of users (i.e., employees, system administrators, security personnel, contractors, guests, and auditors).

Discussion 4.

Best Practices for User Domain Policies" Please respond to the following:

Imagine that your supervisor has asked you to draft a brief statement about best practices for user domain policies that will be presented to the executive board. Create five best practices for user domain policies.

Select the best practice that you would emphasize the most during this presentation to the executive board and explain why.

Discussion 5.

Policy for Portable and Mobile Devices" Please respond to the following:

Determine the primary considerations that an organization would need to take into account when developing the security policies involving bring your own device (BYOD), portable and mobile devices.

List and examine the major challenges of enforcing policies concerning BYOD, portable and mobile device

Discussion 6.

"Demilitarized Zone (DMZ) Control Standards" Please respond to the following:

Analyze the IT infrastructure assets that are commonly located in the DMZ. Determine how the types and size of the organization impact the structure of the DMZ.

Propose at least three policies that organizations need to implement for traffic flowing into the DMZ or out of the DMZ.

Reference no: EM132525044

Questions Cloud

Relate cloud computing to software quality assurance : Explain How a Cloud Computing Course will be helpful to a Software Quality Assurance Engineer in his day to day life job duties?
Effective information technology security policy framework : Establishing an effective Information Technology Security Policy Framework is critical in the development of a comprehensive security program
Determine the current ratio and quick ratio : The following items are reported on a company's balance sheet: Cash $258,000. Determine the current ratio and quick ratio
Describe the civil right rights act : The Civil Right Rights Act of 1964. Each student will pick a topic and thoroughly discuss the chosen topic. You should tell why it is important.
Principles for policy and standards development : Determine which type of organization would have the most difficulty implementing the principles you selected. Support your answer.
Explain how the building meets the definition of an asset : Your company owns a building that if fully paid for. Explain how the building meets the definition of an asset under each of the scenarios
Create slide media-rich presentation : Describe the reasons it is important to conduct periodic reviews of information systems to determine whether they continue to meet the organization's objectives
Benefits of real-time data warehousing at continental : In what ways does real-time data warehousing fit with the Continental strategy and plans? Describe the benefits of real-time data warehousing at Continental.
What actions would you take to reduce turnover : If you became the new manager at a restaurant with high employee turnover, what actions would you take to reduce turnover and increase retention of employees?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Use of social networking such as facebook

How does the use of social networking such as Facebook, Twitter, Instagram, blogs and other such sites align with your biblical worldview of computer technology?

  How would you define income inequality

How would you define income inequality? How is income inequality measured?

  Graph a linear equation

What is the minimum information needed to be able to graph a linear equation? What process do you go through to graph a linear equation? Give an example, starting with a linear equation, and explain the steps you would use to graph it.

  Write a program to find the nth busalem number

write a program to find the nth BuSalem number. You must use functions.

  Facility equipment and internet

Why should you be careful when using facility equipment and internet?

  What will be its optimal cash replenishment level

What will be its optimal cash replenishment level? (Enter your answer in dollars not in millions. Round your answer to 2 decimal places.)

  Explain the core principles of enterprise security

Explain the core principles of enterprise security and respond to five strategic objectives as part of the overall enterprise system security plan draft

  Elements of a data center

Research other elements of a data center besides the core elements discussed in this chapter, including environmental control parameters such as HVAC (heat, ventilation, and air-condition), power supplies, and security.

  Explain how this principle impacts data security

Read five articles and discuss the principle of least privilege in at least 500 words. Explain how this principle impacts data security.

  What is the minimum required frame length for this ethernet

Assume that two nodes in a 10Mbps Ethernet cable are 1200 meters apart. Also assume that the signal propagation speed is 2 x 10 8 meters/second. What is the minimum required frame length for this Ethernet?

  What is the internet of things

1. What is the Internet of Things (IoT) 2. What are the advantages of IoT.

  Velocity of circulation in year 2

If the quantity theory of money hols calculate the quantity of money, the GDP deflator, real GDP, and the velocity of circulation in year 2

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd