Comparison of different frameworks

Assignment Help Basic Computer Science
Reference no: EM132797550

The required article readings this week give a good discussion and look at some of the frameworks that are used to manage risk within organizations and enterprises. One of the readings this week provided an introduction and comparison of different frameworks. As with anything, there are going to be strengths and weaknesses to all approaches.

For your week 6 research paper, please address the following in a properly formatted research paper:

Do you think that ISO 27001 standard would work well in the organization that you currently or previously have worked for? If you are currently using ISO 27001 as an ISMS framework, analyze its effectiveness as you perceive in the organization.

Are there other frameworks mentioned has been discussed in the article that might be more effective?

Has any other research you uncover suggest there are better frameworks to use for addressing risks?

Reference no: EM132797550

Questions Cloud

Significant principles of management communications : Comprehensive research review of the significant principles of management communications used to successfully achieve organizational objectives
Ethical hacking : Discussion topic on FOOTPRINTING, you now have an idea as to how to conduct a digital investigative project.
Research risks associated with cloud adoption : First step in assessing risk in cloud computing will be to identify and describe risk concepts and cloud computing risk factors associated with cloud adoption.
Technology-based security alerts : Noise is considered technology-based security alerts that distract from true security incidents.
Comparison of different frameworks : One of the readings this week provided an introduction and comparison of different frameworks.
Preparing for forensic investigation : What is the nature of the alleged crime, and how does the nature of the crime influence a prospective investigation?
Online and brick-and-mortar divisions of business : What factors affect competition between the online and brick-and-mortar divisions of the business?
Recommendations regarding passwords : An IT Security consultant has made three primary recommendations regarding passwords:
Significant impact on businesses and industries : Blockchain has made a significant impact on businesses and industries.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  View or conception of ethics changed

Over the course of the past 8 weeks, has your view or conception of ethics changed in any way? If yes, is there a specific moment you can identify and describe that triggered the change (a reading(s), or posting(s), discussion(s) with colleague(s)..

  Existing research literature

Analyze the practicality of your research topic. What has been the consensus on the topic through existing research literature?

  Security for missing mobile devices

Unprotected mobile devices can be used to access sensitive personal or work data. To reduce the risk of theft or loss, there are applications

  Display the total amount due

A furniture store is having a customer appreciation sale. Depending on the total dollars purchased, the customer could receive a discount on his or her total purchases. You are to develop pseudocode or C# code that will obtain the total dollars pu..

  Conduct a forensic examination

You are hired by JLA Enterprise to conduct a Forensic Examination after a network intrusion occurs at their corporate office.

  Using the sql server diagramming tools

Implement the data model below in your database, using the SQL Server diagramming tools. Implement the data model EXACTLY as it is shown. The Table names, field names, data types, nullable fields, keys, and relationships all need to be exactly ..

  Software developer development and improvement

This assignment consists of two (2) sections: an improvement plan and a PowerPoint presentation. You must submit the two (2) sections as separate files for the completion of this assignment.

  What is project and what are its main attributes

What is a project, and what are its main attributes? How is a project different from what most people do in their day-to-day jobs?

  Display a count of the number of letters in the word

Write a program that accepts a word into a character array string variable. Display a count of the number of letters in the word. Also display a count of the number of vowels and the number of consonants in the word. Save the file as WordStatistic..

  Describe hypothetical situation

Describe a hypothetical situation in which a legitimate organization used spam in an effective and nonintrusive manner to promote a product or service.

  Increased efforts to measure and classify human behavior

In the late 19th century, psychology emerged as a discipline distinct from philosophy, accompanied by increased efforts to measure and classify human behavior.

  Mission and values of better world books

What are the mission and values of Better World Books? Critically evaluate their usefulness to the company's management in formulating strategy.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd