Develop an information security plan

Assignment Help Computer Engineering
Reference no: EM132265590

Question:1 ( I want 150 to 200 words conclusion on following paragraph)

The risk assessment of a current production information system should be used to develop an information security plan. The risk assessment plan may be based on the risk register or a formal programme of work. If the risks need to be managed as a formal programme of work the plan should follow the project management and must be approved at the appropriate level within the organization. However, if the risk assessment was for a new system then the report should be used to ensure that the controls required to manage the risks are incorporated into the solution architecture and design documents or request for proposal document. The security is responsible for identifying the components and defining the boundaries of an information system that is within the scope of the risk assessment.

Question: 2 ( I want 150 to 200 words conclusion on following paragraph)

Risk Assessment: Risk assessment is the process which is designed to enable agencies to systematically identify, analyze and evaluate the information security risks associated with an information system or service together with the controls required to manage them. During a risk assessment, it is essential to establish the business and technical context of the information system being reviewed. Establishing the context ensures that the business objectives are captured and that the internal and external factors that influence the risks are considered. A risk assessment may be performed for an information system that is already in production or as part of the development life cycle of a new information system.the risk assessment is being performed for an information system that is in production or as part of the development life cycle process for a new information system there will already be controls in place to reduce the likelihood and/or impact of some of the risks that have been identified. A control can reduce the risk by reducing the likelihood of an event, the impact or both. Assessing the effect that the control has on the overall risk leads to determining the residual risk rating during the risk assessment, a control may be identified as being ineffective, not sufficient or simply not relevant to the risk it is supposed to be mitigating. If this is the case, an analysis should be performed to determine whether it should be removed and replaced by another more suitable control or whether it should remain in place and be supplemented with additional controls.

Questsion: 3 (I want 150 to 200 words conclusion on following paragraph)

Remote access can be explained as ability to access, control and monitor networks or computers from any place and at any time. One of the advantages of remote access is that the technology is well established and thus quite a large number of people are familiar with it and thus not a lot of training is required. The other advantage is that the firewalls processing overheads and various connections on the VPN can all be active in the same time. Remote access also ensures that the communication is secure as the rights to access are given to specific individuals (Vazquez, 2016).

The software also increases flexibility and reduces the costs of communication.in addition to this; the software enhances productivity as it provides an extension to the applications and networks in the corporate. Connecting this access is not expensive and thus possible for many companies to connect. Remote access also enables the stakeholders to have regular updates on the progress of the company products and services. Remote access also saves the managers as well as the employees the time and cost of travelling to the office as they can access away from the office.in addition to this the branch offices of a company can access the head office through this connection (Gray, 2016,).

On the other hand, one of the weaknesses is that it becomes difficult to install and configure it to a client if the IT personnel are not in office as the software needs to be installed in the user's computer for a connection to be established. Remote accesses can also results to some losses and sufferings when the computer is left with a running session. In addition to this, the remote access can be slow when one is away from the PC which can result to delays (Vazquez, 2016).

Reference no: EM132265590

Questions Cloud

Potential of digitalized ecosystems : What is the potential of Digitalized Ecosystems: Blockchain technology for this case?
Calculate acquistion costs : How do we calculate acquistion costs, assuming all customers are acquired through banner advertising?
Global marketing differs from domestic marketing : Which is NOT an objective for trade promotions? Global marketing differs from domestic marketing in that:
Which primary key do you think is most useful : What are primary keys, and why are they important? Which primary key do you think is most useful, and why?
Develop an information security plan : The risk assessment of a current production information system should be used to develop an information security plan. The risk assessment plan may be based.
With respect to advertising media choices : With respect to advertising media choices. Which is NOT true about public relations?
Computer science question : Can someone help me with this computer science question:
How big must the total buffer and slack be : Need a little bit of help with the following question in regard to computer science:
Creating a report on historical education trends : Expand Your World - You are working as part of a group creating a report on historical education trends on the developing nation of Mali

Reviews

Write a Review

Computer Engineering Questions & Answers

  Examination of a storage media

Digital Forensics Examiner. Considering a real or a hypothetical case you are required to produce a formal report consisting of facts from your findings to your attorney who has retained you.

  How web analytics has changed over the years

In 3-4 page APA formatted paper, discuss how web analytics has changed over the years. What should it look like in the future? What do you see as the biggest.

  What is the transfer function

By using the block diagram analysis approach determine the transfer function H(z) = Y(z)/X(z) of the digital filter structure of figure.

  Difference between von neumann and harvard cpu architectures

What is the difference between von Neumann and Harvard CPU architectures? Provide an example of a commercially available microcontroller using each type of CPU.

  What does this value of the pc point at

The 68000 is running in its supervisor mode, and you want to run a user-mode program whose entry point is in DO, initial CCR is in DI.

  Design a software solution to a problem in your life

Using tools and concepts learned this week to design a software solution to a problem in your life.

  Create a application that allows users to input their names

Create a smart device application that allows users to input their names, year of birth, and student IDs. Create and display a new security hash value.

  Calculate the greatest common divisor tasks

A number of Java classes to implement Calculate Pi, Calculate Primes and Calculate the Greatest Common Divisor tasks

  Creating the algorithm

We suppose that we are given a majority graph in order to generate agenda for managing the sequential majority kind of election.

  What is a multicore processor

What is a multicore processor? What are its advantages compared with multiple-processor architecture?

  How long will it take you to check all possible passwords

If it takes you 100 microseconds to check one password on average, then how long will it take?

  How your employment is directly related to your field

Explain how your employment is directly related to your field of study? Business Disaster and Recovery Planning and Information Security and Risk Management.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd