Stakeholders throughout the organization

Assignment Help JAVA Programming
Reference no: EM131053950

Information security governance requires involvement from stakeholders throughout the organization. Executives, business owners, technical experts, and legal experts assess, plan, and execute information security governance in the organization. In order to deal efficiently with information security governance you will have to understand the fit between it and the entire organizational structure.

To prepare for this Assignment, assume the role of computer security team leader in an organization that needs to mitigate a risk. You have been asked to design and test a process for assessing and mitigating risk in the organization but, before you do, you need to make sure you have the right people on your team.

Next, describe a particular type of risk that you think the organization is facing or may face in the near future.  The risk should involve either the use of a new technology or a new administrative process.

You have complete authority to form your own team and identify any resources you would need to perform your job.

For this Assignment, write a 4- to 6-page paper aligning the security team with the overall organizational structure and outlining the responsibilities of the different stakeholders. Respond to the following in your paper:

  • What is the risk that you identified?
  • What are the skill sets you need on the team?
  • How would you determine whether a prospective team member possesses the required skill sets?
  • What critical items would you need to consider while forming the team, and why?
  • How does the information security function of your team fit into the larger organizational structure?
  • What are the roles and responsibilities (relevant to the risk management process) of the stakeholders who need to be involved in the entire process?

Clearly state any other assumptions you make for this scenario.

Make your work original and include your references in APA format

Reference no: EM131053950

Questions Cloud

Give a counterexample to illustrate this point : Give a counterexample to illustrate this point.
Healthcare financial management association : The Healthcare Financial Management Association (HFMA) identified 10 key revenue cycle performance measures. Choose three of the following performance measures/benchmarks identified by the HFMA. , indicate how improvement in the benchmark enhances..
Question regarding the running argument : Write a program that reads in information for two runners in a race and swaps their information if necessary so that the runner with the faster time is stored in a variable called winner and the other is stored in a variable called loser. There ar..
What are potential benefits and costs to the infrastructure : What are the potential benefits and costs to the infrastructure, capability, or group because of this arrangement - What are the potential benefits and costs to the city because of this arrangement?
Stakeholders throughout the organization : Information security governance requires involvement from stakeholders throughout the organization. Executives, business owners, technical experts, and legal experts assess, plan, and execute information security governance in the organization.
Framework to understand organisation behaviour : The assessments in this subject are aimed at providing students a framework to understand organisation behaviour, politics and the dynamics of business environments.
C program in unix environment : This question deals with writing a C Program in UNIX environment (bash). You must rewrite the LS system call in C, but the output of files MUST be in decreasing order in the size of the file (bytes).
Create a minimal set of dependencies g : Create a minimal set of dependencies G that is equivalent to F, and apply the synthesis algorithm (Algorithm 16.6) to decompose R into 3NF relations.
What would a network that included this asset look like : What sector does it fall within - What would a network that included this asset look like? Give examples.

Reviews

Write a Review

JAVA Programming Questions & Answers

  Write a program called drawing in the form of a public class

Write a program called Drawing in the form of a public class Drawing that extends a Java JFrame and provides the following features.

  Write a class house that correctly compiles and runs

Write a class House that correctly compiles and runs with the following TestHouse code. You cannot change a single thing in the TestHouse class,

  Compute and display the monthly payment

Compute and display the monthly payment -  programming problem can be solved by a program that performs three basic tasks-Input Data, Process Data, and Output Results.

  Develop a java program given the width, length and depth

Write the source code for each class in a separate file which must have the same name as the class name together with the extension .java. Remember also that by convention, class names commence with a capital letter.

  Where the computer stores the list of exceptions

The call stack is where the computer stores the list of exceptions. Overloaded methods have the same name and parameter lists

  Write a program that keeps track of the balance

Write a program that keeps track of the balance of a savings account. The program starts by reading the initial amount (starting value) of the savings account. It then allows the account holder to perform withdrawal, deposit and check balance proc..

  How a compiler program could use a stack

Consider a function called insertElementAtLocation() in an array based list data structure. The function will insert an element in an array by shifting the elements in the array down by one position at a given location to make room for the new elemen..

  Compare and determine the smallest number

The main method that begins execution of Java application

  Write a complete java program called parser

Write a complete Java program called Parser that gets a comma-delimited String of integers  (eg "4,8,16,32,...") from the user at the command line and then converts the String to an ArrayList of Integersusing

  Explain the concept of try catch blocks

Why would Java require this? What are some benefits of requiring that exceptions be either explicitly handled or rethrown?

  Design and implement a sorting algorithm

Your task is to design and implement a sorting algorithm and running time grows as a linear function of the array

  Prepare a demo program

Design, and implement a class that will be used in a program that simulates a combination lock. The lock has a circular knob with the numbers 0 through 39 marked on the edge, and it has a three-number combination, which we will call x,y,z.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd