Who is ultimately responsible for managing a technology

Assignment Help Management Information Sys
Reference no: EM131250026

Review Questions

1. How can a security framework assist in the design and implementation of a security infrastructure? What is information security governance? Who in the organization should plan for it?

2. Where can a security administrator find information on established security frameworks?

3. What is the ISO 27000 series of standards? Which individual standards make up the series?

4. What are the inherent problems with ISO 17799, and why hasn't the United States adopted it? What are the recommended alternatives?

5. What documents are available from the NIST Computer Resource Center, and how can they support the development of a security framework?

6. What benefit can a private, for-profit agency derive from best practices designed for federal agencies?

7. What Web resources can aid an organization in developing best practices as part of a security framework?

8. Briefly describe management, operational, and technical controls, and explain when each would be applied as part of a security framework.

9. What are the differences between a policy, a standard, and a practice? What are the three types of security policies? Where would each be used? What type of policy would be needed to guide use of the Web? E-mail? Office equipment for personal use?

10. Who is ultimately responsible for managing a technology? Who is responsible for enforcing policy that affects the use of a technology?

11. What is contingency planning? How is it different from routine management planning? What are the components of contingency planning?

12. When is the IR plan used?

13. When is the DR plan used?

14. When is the BC plan used? How do you determine when to use the IR, DR, and BC plans?

15. What are the five elements of a business impact analysis?

16. What are Pipkin's three categories of incident indicators?

17. What is containment, and why is it part of the planning process?

18. What is computer forensics? When are the results of computer forensics used?

19. What is an after-action review? When is it performed? Why is it done?

20. List and describe the six continuity strategies identified in the text.

Reference no: EM131250026

Questions Cloud

What facilities will be needed at each step : What steps need to be taken to implement your solution? What materials/equipment will be needed to accomplish each step? What facilities (space, utilities) will be needed at each step? How will they be used? For how long?
Organizational development and strategy : Appraise the importance of the OD field in terms of its benefits in increasing business performance. Compare and contrast the internal levels of change and resistance, and then conclude which level would be the most difficult to address. Justify yo..
Calculate and report the unique nash equilibrium of the game : Represent this game in the normal form. - Calculate and report the unique Nash equilibrium of this game. - Is there a perfect Bayesian equilibrium with the strategy profile you found in part (b)?
Find the power cogenerated by the turbine : The high temperature heater adds 30 MW and the low temperature heater adds 31 MW to the district heating water flow. Find the power cogenerated by the turbine and the temperature in the return line to the deaerator.
Who is ultimately responsible for managing a technology : What are the differences between a policy, a standard, and a practice? What are the three types of security policies? Where would each be used? What type of policy would be needed to guide use of the Web? E-mail? Office equipment for personal use?
How much net power as work is produced for process heat : A steam power plant has 4 MPa, 500?C into the turbine, and to have the condenser itself deliver the process heat, it is run at 101 kPa. How much net power as work is produced for process heat of 13 MW?
Ineffective communication is the fault of the sender : 1. "Ineffective communication is the fault of the sender." Do you agree or disagree? Discuss. 2. Using the concept of channel richness, give examples of messages best conveyed by email, in face-to-face communication, and on the company bulletin boa..
Why is our culture so obsessed with appearances : Why is our culture so obsessed with appearances - Why do you dress the way you do and Why does fashion change?
Strategic approach to human resource management : Assess Southwest Airlines' strategic approach to human resource (HR) management. Determine how its strategy increases organizational effectiveness.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Determine the architect of a global information system

Describe the four (4) organizational structures, as discussed, which determine the architect of a global information system

  Supply chain management - private vs public

supply chain management - private vs. public sectordifferentiate between the principles and practices of purchasing and

  Process in which a company identifies acceptable software

A process in which a company identifies acceptable software and permits it to run, and either prevents anything else from running or lets new software run in quarantined environment until the company can verify its validity.

  Analyze the role of the selected country central bank

Evaluate current global economic conditions and their effect on local macroeconomic indicators in your selected country. Consider forecasts for population growth, GDP growth, GDP per capita growth, export growth, and sales growth.

  Describe cloud computing and its pros and cons

Business case: Analyze the following business case and provide your recommendations. Describe cloud computing and its pros and cons in three paragraphs

  Information systems - preparing a reportyou work on the it

information systems - preparing a reportyou work on the it team at a local college. you are currently on a project that

  How technologies change your business

How might the Internet and related communication technologies change your business and What are some of the ways that information technology can improve productivity and performance in your business?

  Repository in a knowledge management system

The knowledge base of an expert system is the same as a knowledge repository in a knowledge management system.

  Define the technology or business phenomenon

define the technology or business phenomenon, introduce the history and the present status, Introduce relevant key players

  Develop software project management plan for organization

Determine at least three (3) risks that may occur if the requirements engineering process is not properly followed. Speculate on how failing to perform these processes may lead to project failure. Include examples to support your answer.

  Identify appropriate management solutions to address

Identify the appropriate management Solutions to address identified issues (20%)

  Monitor the productivity and communications of employees

Employers often want to find out if their workers are productive and loyal. Determine at least one (1) limit that you would place upon a private employer's rights to monitor the productivity and communications of employees at work. Support your re..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd