The risk assessment for the health body wellness center

Assignment Help Basic Computer Science
Reference no: EM13767463

Introduction:

An Information Security Management System (ISMS) represents a systematic approach for designing, implementing, maintaining, and auditing an organization's information system security objectives. As with any process, if an ISMS is not continually monitored, its effectiveness will tend to deteriorate.

For this task you will be using the attached "Healthy Body Wellness Center Risk Assessment" case study. In this task, you will be writing a 1-2 page white paper outlining the scope of an ISMS plan for the Healthy Body Wellness Center and an evaluation of the previously conducted risk assessment.

The first step in initiating an ISMS is to form a committee of upper level management that would set the tone for the ISMS. Assume you are part of that team. Initiating an ISMS involves developing a plan that includes the scope of the ISMS and identifying and assessing risk. The risk assessment for the Health Body Wellness Center has already been conducted. Your task is to define the ISMS scope for the Healthy Body Wellness Center and make recommendations for implementing the resulting ISMS plan.

Task:

A. Outline the scope (suggested length of 1-2 pages) for the ISMS plan being developed in the case study by including the following:

1. Information about the business objectives for the organization
2. A description of the guiding security principles of the organization
3. A justification of the processes that should be included in the scope
4. A justification of the information systems that should be included in the scope
5. A description of the IT infrastructure that includes a description of information flow

B. Recommend additional steps that the organization would need to take to implement the ISMS plan.

1. Discuss what each recommended step entails.

2. Justify each recommended step.

C. When you use sources, include all in-text citations and references in APA format.

Reference no: EM13767463

Questions Cloud

A manager of a shoe manufacturing plant : 1. Assume that a manager of a shoe manufacturing plant wants to practice management by exception. What are some types of reports that would be helpful? 2. Of the six systems elements that you can form the basis for system control design, which one do..
What is puck surprised to see at the funeral : What is Puck surprised to see at the funeral? What does Tommy's dad mean when he tells Puck that he "would've lost him either way"?
Glacial period related problem : What do you think the effects on humans will be if the climate continues to warm precipitously?
Approximate the probability that at most will be defective : A manufacturing process produces semiconductor chips with a known failure rate of .If a random sample of chips is selected, approximate the probability that at most will be defective.Use the normal approximation to the binomial with a correction for ..
The risk assessment for the health body wellness center : The risk assessment for the Health Body Wellness Center has already been conducted. Your task is to define the ISMS scope for the Healthy Body Wellness Center and make recommendations for implementing the resulting ISMS plan.
Independent issues concerning the capital stock : Respond to the following independent issues concerning the capital stock of corporations in your initial post:
Key elements as part of the risk management framework : Discuss key elements that need to be addressed as part of the risk management framework by completing the attached "RMF To-Do List."
Taxation research and communication : The current tax law system in the United States has emerged over many years from statutory, administrative, and judicial sources. These sources are continually changing and new laws are introduced at least annually.
An llc or a shareholder of a corporation. : A limited liability partnership (LLP) is a type of general partnership that most states now permit. There is a very important distinction, however, between an LLP and an LLC; in an LLP, the partners are not liable for the debts of the partnership. Ho..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Calculate fourier transform of function

Given a function f(x) as follows: f(0) = 2, f(1) = 3, f(2) = 5, f(3) = 4. Calculate the Fourier Transform of f(x), i.e: F(0), F(1), F(2) and F(3)!

  Which processes were loaded normally is running in safe

Next, boot the system into safe Mode and use Task Manager to list running processes. Which processes that were loaded normally are not loaded when the system is running in safe Mode?

  Instruction cycle and finding contents of registers

Go over instruction cycle and find out contents of registers PC, AR, DR, AC, and IR for each of seven memory-reference instructions.

  A file from the program''s standard input

Write a mycopy program that shall copy a file from the program's standard input (stdin) to its standard output (stdout). You are allowed to use only the functions open/read/write/close for I/O: no other I/O functions (such as fprintf, printf, fscanf,..

  How many bits are required in the address bus

You have been assigned to design a 8M x 32 bit memory board. You may use only 256K x 8 bit RAM chips with full parallel addressing.a) How many bits are required in the Address Bus of the whole board?

  Exploit wildcard feature in order to cheat system

How could Dave, dishonest teller, exploit the wildcard feature  to cheat the system? Dave would want to concentrate on vouchers that are nearly one year old since such vouchers are likely to have been lost.

  What limitations should you keep in mind

When choosing recommended practices ( in accordance with information security) what limitations should you keep in mind?

  Design sequential circuit that continuously compute function

Design a sequential circuit that continuously computes the function 2X + Y where the variables X and Y are 2 three-bit unsigned integers each available on a serial interface. A special external data signal (DATA_READY) is asserted whenever each of..

  What is the purpose of modular design

what's the purpose of modular design ?? why do we break dows circuits into modules and design them independently ?? good answer please

  Characteristics of professionals collapse

How might definitions of plagiarism vary across cultures and Characteristics of professionals Collapse

  The contenders are tortoise and hare

The contenders are Tortoise and Hare, and they begin race as investors at "tile 1" of 70 tiles The finish line is at 70 the tile. With each tick of the clock

  Given two stringsa and bcreate a bigger string made char a

Given two strings, A and B, create a bigger string made of the first char of A, the first char of B, the second char of A, the second char of B, and so on. Any leftover chars go at the end of the result

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd