Explain elements of enterprise information security policy

Assignment Help Basic Computer Science
Reference no: EM1368357

1. List and describe briefly the three guidelines for sound policy, as stated by Bergeron and Bérubé.

2. Are policies different from standards? In what way? Are policies different from procedures? In what way?

3. List and describe briefly the three types of information security policy as described by NIST SP 800-14.

4. List and describe briefly four elements that should be present in the Enterprise Information Security Policy.

Exercise
1. Using the Internet and a browser, go to the International Information Systems Security Certifications Consortium Web site (www.isc2.org) and look for the information security common body of knowledge (CBK). What are the areas addressed in the CBK? Was policy explicitly listed? If not, where do you feel it is addressed in the CBK?

Reference no: EM1368357

Questions Cloud

Solving problem by permutation on set is a one-to-one : Prove that PERM=POWER P, the obvious algorithm doesn't run in polynomial time as problem size is logarithmic (and no linear) with respect to the value of t.
Creating a pay off matrix : Suppose two strategically dependent firms in an oligopolistic industry: Firms A and B. Firm A knows that if it offers extended warranties on its products but Firm B does not,
Positive and negative example of events : Can you select one positive and one negative example of events in your area, state, country or the world that might impact our life, careers or professions.
Define recently company has experienced issues with employee : Explain Recently your company has experienced issues with employee teamwork. Employees are not working well together. Your boss has asked you to research ways to create an effective team work environment.
Explain elements of enterprise information security policy : Write and explain briefly the three kinds of information security policy as described by NIST SP 800-14. Write and explain briefly four elements that must be present in Enterprise Information Security Policy.
Calculate opportunity cost of increasing the annual output : Atlantis is a small, isolated island in South Atlantic. The  inhabitants increase potatoes and catch fresh fish. The accompanying  table shows the maximum yearly output combinations  of potatoes and fish that can be produced.
Problems on advanced computer networks : Identify and explain the events that can change the state of the system also determine the percent of time that this storage space will be adequate to accommodate newly arrived jobs-CS524 Advanced Computer Networks
Determine the expected number of empty bins : Assume that n balls are tossed into n bins, where each toss is independent and ball is equally likely to end up in any bin. Determine the expected number of empty bins?
Compute the npv and irr on properties : Compute the NPV and IRR on each of these properties individually and collectively assuming a discount rate of 15 percent

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Client health-care facilities-information-gathering process

shoulde patients in client health-care facilities participate in the information-gathering process? if so,why , and in what ways should they participate?

  Investigate project management body of knowledge

Investigate Project Management Body of Knowledge (PMBoK). Write a report on one of knowledge areas. Describe the task of understanding potential threats

  Possibility-using fiber optic cable instead of twisted pair

Discuss the possibility of using fiber optic cable instead of either twisted pair cable or staying with the existing coax wiring structure.

  Sbh problem to reconstruct dna sequence from its l-mer

The SBH problem is to reconstruct a DNA sequence from its l-mer composition. Suppose that instead of a single target DNA fragment, we have two target DNA fragments

  Explain vulnerability in the system

How would you respond if Goli came to you describing a vulnerability in your system and offering to help fix it--What would incline you to hire her? What would disincline you from doing so?

  Calculate overall cost including installation-configuration

Calculate the overall cost, including installation, configuration, maintenance, ISP, and miscellaneous costs. Do not consider depreciation in the cost computation.

  The authentication process in a synchronous token system

Describe how the Kerberos authentication process work and outline the main components within the Kerberos environment, their respective functions and the level of security provided by Kerberos. Draw a diagram supporting your explanation Explain..

  Relative risk comes form inside the organisation

Write a report on relative risk that comes form inside organisation as opposed to risk which comes from external sources.

  Explaining network attacker steal secure google cookies

Explain how a network attacker (an active attacker that can intercept or forge network packets, etc.) could steal secure google.com cookies.

  Discuss strategies to dilute manager-s anger

Discuss strategies you will use to dilute this manager's anger. Discuss how you will get them both to support your recommendations.

  Tools to perform project management processes

Describe in scholarly detail the tools and techniques that are used for prforming project management processes.

  Describe primary uses of networking for business

Describe at least 2 of the primary uses of networking for businesses. Discuss how you might match appropriate networking technologies.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd