Aligning security with business objectives

Assignment Help Basic Computer Science
Reference no: EM131652599

Application: Aligning Security with Business Objectives

The security policy of an organization is not an one-for-all solution; it varies with the organization. As you begin your exploration of information assurance and risk management, consider how organizations in different countries, and even different states, are distinct, with their own structures, culture, and dynamics, as well as unique security-related regulations. Some of this may be due to the nature of the organization, its size, and its business use cases-that is, situations in which a technique may be used profitably. Other concerns can be attributed to the laws, regulations, and industry standards for its location. Even organizations doing business on the Internet may face regulations when doing business in another country or state.

To prepare for this Assignment, assume the role of a consultant working for a bank in your home country that is expanding its online banking to mobile devices. At the same time, it will be opening its first branch office in another country. Choose the location of the new office and use the Internet as well as the Learning Resources in this Week to research regulations and industry standards relevant to the new location. Also research the privacy laws (including Internet privacy regulations) that apply for both the locations. Examples could be the Gramm-Leach-Bliley Act (financial services regulation in Weeked States) or the California Breach Notification Law applicable for Weeked States scenarios. You will need to refer to Brotby, "Layered Security" and "An Introduction to ISO 27001, ISO 27002....ISO 27008" in addition to other reading resources.

Explaining how to align the security policy of the organization with its business objectives, keeping in mind the regulations, privacy laws, and industry standards you have identified. Clearly state any assumptions, and provide citations for reputable sources used in your research.

Cover the following points:

  • Explain how the regulations, privacy-related laws, and industry standards you identified apply to this scenario.
  • Identify concerns you feel the bank will need to focus on because of expanding its online banking to mobile devices and opening its international branch office. Identify three areas where you will need to apply security controls to manage the risk involved in the scenario.
  • For each of these three areas, develop a key goal indicator (KGI) as explained in the textbook
  • For each KGI, indicate the security controls (these involve policies, processes, and tools) that will need to be developed and applied.
  • Justify how the key goal indicators and the security controls you have chosen align with business objectives and enable business processes.
  • Explain how industry standards and best practices are beneficial to implementing security policies that are aligned with business objectives.

Reference no: EM131652599

Questions Cloud

Life symbolize that might be important in cathers story : Who was Cordelia, What does her sad life symbolize that might be important in Cather's story
Define a tendency to present and equate racial minority : a tendency to present and equate racial minority groups and individuals with specific social problems
Intro to network security : The unchecked Web application is a risk to the organization hosting the application and the users that rely on the application in their daily lives.
Calculate and displays membership fees : Create a C# application that calculate and displays membership fees for N customers who registered for membership from a sport center based in Victoria
Aligning security with business objectives : The security policy of an organization is not an one-for-all solution; it varies with the organization. As you begin your exploration of information.
What feature of the light source do the spectra represent : What feature of the light source do the spectra represent? What is it that you are actually analyzing? How similar is this number to your original estimation?
Define a billboard advertising a local gym : On your way to a restaurant you notice a billboard advertising a local gym. There is a picture of a fit, young man and woman in workout clothes, laughing
What worms and trojan horses are : Part 1: Provide a detailed description of what worms and Trojan horses are.
Define the life of a slave girl : Which one of these two African American authors, Frederick Douglass, in Narrative of the Life, or Harriet Jacobs, in Incidents in the Life of a Slave Girl

Reviews

Write a Review

Basic Computer Science Questions & Answers

  How many system calls can the computer execute per second

Suppose that a computer can execute 2 billion instructions/sec and that a system call takes 1000 instructions

  Discussion on ms word versus other word processing programs

For the Discussion on MS Word Versus Other Word Processing Programs, consider that Microsoft Word is only one of the major Word processing software programs many users employ.

  Why you chose the three points of view that you did

Modify one of the three worlds from Exercise 4, using the three camera points of view that you described. Save the finished world as an Alice world and as a movie file.

  Non-real time operating systems

Give out three examples of real time operating systems and non-real time operating systems?

  Make the following two modifications to the program

Make the following two modifications to the program. First, change the while statement to a for statement. Second, in addition to displaying the number of other characters, display the characters themselves, as shown in Figure 13-28. Save and then..

  Formula to convert from celsius to fahrenheit

Write a python script (with comments) that prompts the user for a temperature (in Celsius) and displays the corresponding temperature in Fahrenheit. The formula to convert from Celsius to Fahrenheit is: Fahrenheit = 9 / 5 * Celsius + 32

  Find its minimum spanning tree

Modify the bfs.java program (Listing 13.2) to find the minimum spanning tree using a breadth-first search, rather than the depth-first search shown in mst.java (Listing 13.3). In main(), create a graph with 9 vertices and 12 edges, and find its mi..

  Characteristics of an object-oriented language

What are the primary characteristics of an object-oriented language? How does an object-oriented language differ from a third generation language or a fourth generation language?

  What is the minimum number of bits required to represent

What is the minimum number of bits required to represent

  Descriptive and point out any pluses or minuses

Can we think of any examples (real or hypothetical) of distributed systems that employ cloud, grid and peer to peer technologies together.

  Analyze these data and draw appropriate conclusions

The data are shown in the following table. Analyze these data and draw appropriate conclusions.

  Why is an e-mail use policy important

1). Why is the issue of trust an integral part of a security policy 2). Why is an e-mail use policy important?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd