Aligning security with business objectives

Assignment Help Basic Computer Science
Reference no: EM131638781

Application: Aligning Security with Business Objectives

The security policy of an organization is not an one-for-all solution; it varies with the organization. As you begin your exploration of information assurance and risk management, consider how organizations in different countries, and even different states, are distinct, with their own structures, culture, and dynamics, as well as unique security-related regulations. Some of this may be due to the nature of the organization, its size, and its business use cases-that is, situations in which a technique may be used profitably. Other concerns can be attributed to the laws, regulations, and industry standards for its location. Even organizations doing business on the Internet may face regulations when doing business in another country or state.

To prepare for this Assignment, assume the role of a consultant working for a bank in your home country that is expanding its online banking to mobile devices. At the same time, it will be opening its first branch office in another country. Choose the location of the new office and use the Internet as well as the Learning Resources in this Week to research regulations and industry standards relevant to the new location. Also research the privacy laws (including Internet privacy regulations) that apply for both the locations. Examples could be the Gramm-Leach-Bliley Act (financial services regulation in Weeked States) or the California Breach Notification Law applicable for Weeked States scenarios. You will need to refer to Brotby, "Layered Security" and "An Introduction to ISO 27001, ISO 27002....ISO 27008" in addition to other reading resources.

Explaining how to align the security policy of the organization with its business objectives, keeping in mind the regulations, privacy laws, and industry standards you have identified. Clearly state any assumptions, and provide citations for reputable sources used in your research.

Cover the following points:

  • Explain how the regulations, privacy-related laws, and industry standards you identified apply to this scenario.
  • Identify concerns you feel the bank will need to focus on because of expanding its online banking to mobile devices and opening its international branch office. Identify three areas where you will need to apply security controls to manage the risk involved in the scenario.
  • For each of these three areas, develop a key goal indicator (KGI) as explained in the textbook
  • For each KGI, indicate the security controls (these involve policies, processes, and tools) that will need to be developed and applied.
  • Justify how the key goal indicators and the security controls you have chosen align with business objectives and enable business processes.
  • Explain how industry standards and best practices are beneficial to implementing security policies that are aligned with business objectives.

Reference no: EM131638781

Questions Cloud

Develop two database management systems : You have been asked to develop two database management systems, one for a small departmental database and the other for a clinical data warehouse.
Would us supreme court have jurisdiction to hear the case : Suppose that Johnson had burned a Texas state flag instead of the U.S. flag. Would the U.S. Supreme Court have jurisdiction to hear the case?
Implement appropriate treatment for exacerbation of copd : Implement appropriate treatment for exacerbation of COPD, Demonstrate correct use of oxygen
Predict the brain weight for the species : Prediction. The line on the scatterplot in Figure is the least-squares regression line for predicting brain weight from body weight.
Aligning security with business objectives : The security policy of an organization is not an one-for-all solution; it varies with the organization. As you begin your exploration of information.
C++ programming in linux : This program is intended to get acquainted with Linux (or refresh programming experience). This will be a short interactive program that will get me started.
Finished medicating a patient with a narcotic injection : finished medicating a patient with a narcotic injection with a dose greater than ordered
Description of the role of it strategy in acquiring : A description of the role of IT strategy in acquiring business driven information systems -
Presentation for the executive leadership team of capratek : Design a narrated PowerPoint presentation for the executive leadership team of CapraTek, outlining your recommendations for addressing the problems

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the market value of this inverse floater

What is the market value of this inverse floater at the end of 1 year? What is the leverage factor for this bond?

  What are the advantages and disadvantages of this approach

Furthermore, all cost overruns must come out of the functional managers' budgets, whether they be overhead or otherwise, not the project budget. What are the advantages and disadvantages of this approach?

  What is the marginal distribution of party affiliation

Summarize these poll results in a few sentences that might appear in a newspaper article about party affiliation in the United States.

  Calculations without an arithmetic and logic unit (alu)

Determine whether or not it is not possible for microprocessors to perform calculations without an Arithmetic and Logic Unit (ALU)

  Binary search tree

Implement the BinarySearchTree class. The BinarySearchTree class extends the BinaryTree class. Both can be seen here. Your assignment is to implement all of the abstract methods of the BinaryTree class recursively. They are:

  What does it mean to have integrated requirements models

What does it mean to have integrated requirements models? How should they be used?

  How many liters are in a gallon

How many liters are in a gallon? How many pounds are in a gallon?

  Communicate with prospective and current customers

The use of digital media within organizations has transformed how organizations communicate with prospective and current customers. Digital media such as web videos, e-books, and social media have each shaped the communication strategies organizat..

  What is phishing

(a) What is Phishing? (Focus on phishing emails and targeted attacks that include spear phishing and whaling.)

  Role of information security policy

Using the paper in Weeks 2 and 3 add an additional 3-to 4-pages describing the importance of policies and standards for maintaining information systems security.

  Relationship between a digital signal

Describe the difference in analog and digital signals, and explain which is used in current computer architectures. Explain the relationship between a digital signal's period and its frequency. Explain the states of a digital signal.

  Percent of many organization energy usage

Can a green energy eventually make up 100 percent of many organization's energy usage? what obstacles or challenges do you think will need to be surmounted for this transformation to green energy to occur?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd