Aligning security with business objectives

Assignment Help Basic Computer Science
Reference no: EM131638781

Application: Aligning Security with Business Objectives

The security policy of an organization is not an one-for-all solution; it varies with the organization. As you begin your exploration of information assurance and risk management, consider how organizations in different countries, and even different states, are distinct, with their own structures, culture, and dynamics, as well as unique security-related regulations. Some of this may be due to the nature of the organization, its size, and its business use cases-that is, situations in which a technique may be used profitably. Other concerns can be attributed to the laws, regulations, and industry standards for its location. Even organizations doing business on the Internet may face regulations when doing business in another country or state.

To prepare for this Assignment, assume the role of a consultant working for a bank in your home country that is expanding its online banking to mobile devices. At the same time, it will be opening its first branch office in another country. Choose the location of the new office and use the Internet as well as the Learning Resources in this Week to research regulations and industry standards relevant to the new location. Also research the privacy laws (including Internet privacy regulations) that apply for both the locations. Examples could be the Gramm-Leach-Bliley Act (financial services regulation in Weeked States) or the California Breach Notification Law applicable for Weeked States scenarios. You will need to refer to Brotby, "Layered Security" and "An Introduction to ISO 27001, ISO 27002....ISO 27008" in addition to other reading resources.

Explaining how to align the security policy of the organization with its business objectives, keeping in mind the regulations, privacy laws, and industry standards you have identified. Clearly state any assumptions, and provide citations for reputable sources used in your research.

Cover the following points:

  • Explain how the regulations, privacy-related laws, and industry standards you identified apply to this scenario.
  • Identify concerns you feel the bank will need to focus on because of expanding its online banking to mobile devices and opening its international branch office. Identify three areas where you will need to apply security controls to manage the risk involved in the scenario.
  • For each of these three areas, develop a key goal indicator (KGI) as explained in the textbook
  • For each KGI, indicate the security controls (these involve policies, processes, and tools) that will need to be developed and applied.
  • Justify how the key goal indicators and the security controls you have chosen align with business objectives and enable business processes.
  • Explain how industry standards and best practices are beneficial to implementing security policies that are aligned with business objectives.

Reference no: EM131638781

Questions Cloud

Develop two database management systems : You have been asked to develop two database management systems, one for a small departmental database and the other for a clinical data warehouse.
Would us supreme court have jurisdiction to hear the case : Suppose that Johnson had burned a Texas state flag instead of the U.S. flag. Would the U.S. Supreme Court have jurisdiction to hear the case?
Implement appropriate treatment for exacerbation of copd : Implement appropriate treatment for exacerbation of COPD, Demonstrate correct use of oxygen
Predict the brain weight for the species : Prediction. The line on the scatterplot in Figure is the least-squares regression line for predicting brain weight from body weight.
Aligning security with business objectives : The security policy of an organization is not an one-for-all solution; it varies with the organization. As you begin your exploration of information.
C++ programming in linux : This program is intended to get acquainted with Linux (or refresh programming experience). This will be a short interactive program that will get me started.
Finished medicating a patient with a narcotic injection : finished medicating a patient with a narcotic injection with a dose greater than ordered
Description of the role of it strategy in acquiring : A description of the role of IT strategy in acquiring business driven information systems -
Presentation for the executive leadership team of capratek : Design a narrated PowerPoint presentation for the executive leadership team of CapraTek, outlining your recommendations for addressing the problems

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd