Discuss about the cybersecurity framework

Assignment Help Management Information Sys
Reference no: EM132144185

Do you agree or disagree and WHY?

Enterprise risk management is is the process a business or individual undertakes to plan, organize, control and lead the activities that affect a company's or individual's capital and earnings (Rouse, 2018). ERM, as it's called, is essential in setting up any type of security for yourself or your business, whether that's cybersecurity or physical security it's all necessary to protect information and facilities.

NIST or the National Institute of Standards and Technology Cybersecurity Framework, was created in 2014 after President Obama issued Executive order 13636, which called for NIST to develop a cybersecurity framework that would help mitigate and reduce risk that could potentially effect national and economic security (Lei, 2014).

ISO 27001 - This is the most commonly used standard in the ISO 27000 family and it "specifies the requirements for establishing, implementing, maintaining and continually improving an information security management system within the context of the organization (ISO, 2018)."

All three of these are integral pieces to setup a functional and sustainable security system that adheres to necessary standards set up to keep your data and infrastructure safe.

They also aid you in making sure that the steps taken by each individual company or person are taken with the best interest of that individual or company in mind.

Lei Shen1. (n.d.).

Rouse., M. (2018). Enterprise risk management.

ISO. (2018). ISO/IEC 27001:2013.

100 words response ...no references....no citations.

Reference no: EM132144185

Questions Cloud

Action could be taken by companies to increase participation : What actions could be taken by companies to increase participation? What actions could be taken by women who seek to be directors?
Why should the government focus should be on productivity : Why should the government's focus should be on productivity not employment? Why is the decentralization of government power good for economy?
Determine the sensitivity of the stock price : FIN 3150 Assignment - Evaluating sensitivity to risk. Determine the sensitivity of the stock price to each underlying variable selected
Looking for guidance : A distribution of exam scores has µ = 90 and s = 10. In this distribution, Sharon's score is 9 points above the mean, Jill has a z-score of +1.20
Discuss about the cybersecurity framework : NIST or the National Institute of Standards and Technology Cybersecurity Framework, was created in 2014 after President Obama issued .
Detail the five stage of the dispute resolution process : Detail the five stage of the dispute resolution process, those responsible for each stage of the dispute process and relevant time frames.
Perform a cost analysis using given information : Provide background information about the agency, mission, goals, objectives, departments, and strategic plan. (Title this section Introduction.)
What is the probability that at least one washing machine : What is the probability that at least one washing machine will need repair in the first year?
Develop a forecast model for sales through operating income : Develop a forecast model for sales through operating income. Create the forecast in Excel. In a Word document, describe the set of assumptions (ratios) you used

Reviews

Write a Review

Management Information Sys Questions & Answers

  Analyze the phenomenon of facebook and twitter

Discusasion- Analyze the phenomenon of Facebook and Twitter, and discuss in what ways social media works as a globalizing force.

  Key data regarding supply chain managementi need assistance

key data regarding supply chain managementi need assistance in explaining the key activities of supply chain

  Articles on managerial issues of a networked organization

Research at least two articles on the topic of managerial issues of a networked organization.

  Describe three interfaces you interact with on a daily basis

Analyze each interface you identified in Question one (1) and assess how it adheres to Mandel's five (5) golden rules.

  What potential impacts of flat world for student performing

What are the potential impacts of a flat world for a student performing a job search? How might this impact your own job search? What can you do to prepare yourself for competing in a flat world?

  What are the interesting aspects of the technology

What are the interesting aspects of the technology? What would be the benefits and downfalls of the product? Which type of organization would it be useful? Why?

  How does a resource starved business unit build a plan

Research on why your company or organization needs more user education about security.Where does that begin?

  Define and discuss the brainstorming techniques

Define and briefly discuss the following brainstorming techniques, the delphi technique, brainstorming, or nominal group technique

  Design a business information system

Construct a system analysis paper based on your weekly presentations.

  How did target respond to the data breach

What could have caused this data breach? How did Target respond to the data breach?

  How many management functions were originally proposed

How many management functions were originally proposed by Henri Fayol

  Describe the privacy concerns with internet service provider

From the first e-Activity, describe the privacy concerns with Internet service provider (ISP) packet detection. Decide whether or not you believe the government should demand ISPs to take more of a proactive approach in detecting and protecting ag..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd