Analyze the role of the key leaders within the organization

Assignment Help Management Information Sys
Reference no: EM131482964

Assignment: Information Serucity Roles and Responsibilities

You will submit your roles and responsibilities portion of the final project. Who are the key leaders of the organization specific to how their responsibilities are connected to the security of the organization's information? You must also identify key ethical considerations. What are the ramifications of key leaders not properly accounting for ethical and legal considerations? What are the key components of information assurance as they relate to individual roles and responsibilities within the information assurance plan? For example, examine the current policies as they relate to confidentiality, integrity, and availability of information.

Employing information assurance best practices will ensure a firm is able to eliminate hierarchical structures, become more flat, and have greater customer touch points by leveraging the correct information at the right time. Successful firms will maintain an established information assurance plan and posture that is implemented and reviewed on a weekly basis.

The ability to properly assign roles is crucial to the design of an effective information assurance plan. Without clearly identified roles and responsibilities, the key members of an organization would not have a clear understanding of what was expected of them. The establishment of roles and responsibilities assists each member to communicate clearly and effectively throughout the organization.

Prompt: In Module Four, you will submit your roles and responsibilities portion of the final project. Your submission should answer the following questions: Who are the key leaders of the organization specific to how their responsibilities are connected to the security of the organization's information? You must also identify key ethical considerations. What are the ramifications of key leaders not properly accounting for ethical and legal considerations? What are the key components of information assurance as they relate to individual roles and responsibilities within the information assurance plan? For example, examine the current policies as they relate to confidentiality, integrity, and availability of information.

Specifically, the following critical elements must be addressed:

II. Information Security Roles and Responsibilities

a) Analyze the role of the key leaders within the organization specific to how their responsibilities are connected to the security of the organization's information. What is the relationship between these roles?

b) Evaluate key ethical and legal considerations related to information assurance that must be taken into account by the key leaders within the organization. What are the ramifications of key leaders not properly accounting for ethical and legal considerations?

c) What are the key components of information assurance as they relate to individual roles and responsibilities within the information assurance plan? For example, examine the current policies as they relate to confidentiality, integrity, and availability of information.

Use double spacing, 12-point Times New Roman font, and one-inch margins. Sources should be cited according to APA citation method. Page-length requirements:3-4 pages. Make sure you cite if you take a piece of someone's work, very important and also your reference should relate to your writing (don't cite a reference because it relates to the course and not this very paper) at least 4 references.

Reference no: EM131482964

Questions Cloud

What may be happening in the aggregate : Each individual has a sense of how the macroeconomy is doing. Is it a mistake to extrapolate from one's own experience what may be happening in the aggregate?
Calculate the after-tax cash flow at disposal : Fenton has a tax rate of 30%. The asset is sold at the end of six years for $3263.
States the main idea of the writing assignment : Why does the problem exist?What factors are contributing to the problem?Who is affected/how are they affected?
Questions on a separate document : Explain how you reached the answer or show your work if a mathematical calculation is needed, or both.
Analyze the role of the key leaders within the organization : Analyze the role of the key leaders within organization specific to how their responsibilities are connected to security of the organization's information.
Describe why scenario is likely to be bad for macroeconomy : Assume the federal government runs huge budget deficits today to finance, say, Social Security, Medicare, and other programs for the elderly, and finances.
What is the project initial investment : The project also requires an initial $258140 investment in net working capital. What is the project's initial investment outlay?
Capital budgeting project : Super Storage has the following projections for year 1 of a capital budgeting project.
What is the average time of one complete sunspot cycle : What is the average time span (to the nearest tenth of a year) between maxima? What is the average time of one complete sunspot cycle?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd