What ''are the differences between a policy, a standard

Assignment Help Basic Computer Science
Reference no: EM13160988

1. How can a security framework assist in the design and implementation of a security infrastructure? What is information security governance? Who in the organization should plan for it?

2. Where can a security administrator find information on established security frameworks?

3. What is the ISO 27000 series of standards? Which individual standards make up the series?

4. What are the inherent problems with ISO 17799, and why hasn't the United States adopted it? What are the recommended alternatives?

5. What documents are available from the NIST Computer Resource Center, and how can they support the development of a security framework?

6. What benefit can a private, for-profit agency derive from best practices designed for federal agencies?

7. What Web resources can aid an organization in developing best practices as part of a security frarriework?

8. Briefly describe management, operational, and technical controls, and explain when each would be applied as part of a security framework.

9. What 'are the differences between a policy, a standard, and a practice? What are the three types of security policies? Where would each be used? What type of policy would be needed to guide use of the Web? E-mail? Office equipment for personal use?

10. Who is ultimately responsible for managing a technology? Who is responsible for enforcing policy that affects the use of a technology?                                                                                                                                                       

11. What is contingency planning? How is it different from routine management planning? What are the components of contingency planning?

12. When is the IR plan used?

13. When is the DR plan used?

14. When is the BC plan used? How do you determine when to use the IR, DR, and BC plans?

15. What are the five elements of a business impact analysis?

16. What are Pipkin's three categories of incident indicators?

17. What is containment, and why is it part of the planning process?

18. What is computer forensics? When are the results of computer forensics used?

19. What is an after-action -review?When is it performed? Why is it done?

20. List and describe the six continuity strategies identified in the text.

Reference no: EM13160988

Questions Cloud

What are yearly duration of daylight for quito : what are yearly duration of daylight for quito, ecuador(on equator), and for Mazatlan, mexico(on tropic of cancer)?
File format would you choose : What file format would you choose for the following tasks: 1. A cartoon strip 2. A 3D model for use on a multimedia presentation on the web
Create an animation of a square : create an animation of a square according to the directions below. Create a square with a side length of 3 with the square centered at (5,5). Translate this square along a cosine wave on the interval [0, 6*pi].
What is the annual cost - depreciation and interest costs : A used car costs $ 120 000. car can be sold for $ 10 000 after six years. What is the annual cost (depreciation and interest costs) if the discount rate is 9%?
What ''are the differences between a policy, a standard : What 'are the differences between a policy, a standard, and a practice? What are the three types of security policies? Where would each be used? What type of policy would be needed to guide use of the Web? E-mail? Office equipment for personal use?
Dis-assemble each of the following : Dis-assemble each of the following MIPS R2000 object code into source code instructions. Use register names, such as $t2, instead of numbers, such as $20.
Provide a analysis of companys overall financial position : Indicate whether your calculations compare positively or negatively to the National Standards. Provide a possible reason for either scenario. In addition to your National Standards summary, provide a brief analysis of the company's overall financi..
Particular film created and produced : When was the particular film created and/or produced? It is of an era, after all, and will reflect the era's social morays, cultural quandaries, economic conditions, and so forth. 150 word
Circuit diagram of an adder that adds two 8-bit numbers : Draw the circuit diagram of an adder that adds two 8-bit numbers by cascading Adder modules that add two 2-bit numbers.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Floating point numbers in scientific notation

Floating point numbers in scientific notation represents numbers as a base number and an exponent. For examples: 2E3, 2.0E12, 3.14E+12, 3.14E-12. Give a grammar that generates floating point numbers. Use your grammar to derive 3.14E+12.

  Programming in mpi

What advantages are gained by programming in MPI as opposed to using threads? Is there a disadvantage to MPI? What?

  Create a driver class to instantiates-updates several object

Create a driver class called FlightTest whose main method instantiates and updates several Flight objects. Two classes are required for this project: Flight and FlightTest.

  Prediction for open standards that may change world again

In April of 1990, entire concept of domain was born, and email addresses "opened up". What might be the prediction about more open standards which may change our world again?

  Example of weighted directed grap with weight function

Provide an example of weighted directed graph G = (V, E) with weight function ω:E→R and source vertex s such that G satisfies following property.

  Persuade your team to give time to organization

Discuss whether you should accept this demand from your manager or whether you should persuade your team to give their time to the organization rather than to their families.

  Analyze faster processor chip result increase in performance

Analyze the following statement: "Using the faster processor chip results in corresponding increase in performance of a computer even if main memory speed remains same."

  How spki be augmented to support policy

Consider a policy that, for reasons of separation of duties, does not allow an entity to exercise the rights it may grant (delegate) to others. How could SPKI be augmented to support such a policy?

  Significant difference of typical salary for system analyst

Is there a significant difference between typical salaries for system analyst, designers, and developers? What is the difference between typical salaries for these different groups?

  How much of program-s time slice can be spent waiting

Desired data to rotate around to the read/write head, how much of a program's time slice can be spent waiting for a read operation from a disk to take place?

  Button subprocedure to store user-s name in cell

If you wish to take in and store user's name in cell A1 by having them type their name following prompt declaring "Give me your name, Earthling!" that code excerpt must you use within button subprocedure?

  What are areas addressed in cbk

What are the areas addressed in the CBK? Was policy explicitly listed? If not, where do you feel it is addressed in the CBK?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd