Explain relationship between policies and security plans

Assignment Help Basic Computer Science
Reference no: EM132636504

Justin wants to move forward with developing privacy policies to ensure videos are not distributed or uploaded to the net without the consent of the people in them. This opens a much larger conversation: Devil's Canyon is also in need of a complete security plan, as well as risk assessments.

Prepare the following information to present to the Devil's Canyon team:

Explain the relationship between policies and security plans. Identify potential policy needs, noting Justin's privacy policy, in relation to the Devil's Canyon enterprise structure.

Outline the importance of a security plan in relation to security roles and safeguards.

Analyze at least 5 security-related risks/threats that Devil's Canyon may face.

Assess the probability and impact to the Devil's Canyon if each risk occurs. Based on these two factors, determine the overall risk level. For purposes of this assignment, evaluate and categorize each factor as low, medium, or high, and create a table to illustrate the risks. For example, a risk/threat with a low likelihood of occurrence and a high impact would represent an overall medium risk.

Consider digital elements mentioned in the designing of the enterprise architecture, such as software, hardware, proposed security measures, smart lift tickets, web cam systems, and smartphones.

Reference no: EM132636504

Questions Cloud

Change effect the water cycle process : How does global climate (that fact that is is getting hotter) change effect the water cycle process?
What is the amount of its total liabilities : Steeler Company has $159,000 in total assets, and its owner's equity is $80,000. What is the amount of its total liabilities
What is Village debt ratio : Question - Village Laundry reported assets of $1,000 and equity of $630. What is Village's debt ratio
Address the memo to all mid-level managers : Address the memo to all mid-level managers and above at your company - explain the new process that the employees can expect. Outline the way that reviews
Explain relationship between policies and security plans : Explain the relationship between policies and security plans. Identify potential policy needs, noting Justin's privacy policy,
How about an ecommerce presence : Do presentation layers add an attack surface to the enterprise? How about an eCommerce presence?
Mobile phones with emphasis on auditing system : Our task in conference is to discuss, mobile phones (including smart phones and tablets). with an emphasis on an auditing system for such phones/devices
Calculate pairwise distances between sequences : Calculate pairwise distances between sequences. Use Hamming distance: it is the number of positions at which the sequences are different
Discussing application of this course to work environment : Discussing the application of this course to your work environment. How will you apply the skills acquired from this course to your job?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What is the difference between TKIP and CCMP

List and briefly define IEEE 802.11 services. What security areas are addressed by IEEE 802.11i? What is the difference between TKIP and CCMP?

  Differences between it and the ricardian model

In international economics, what is the Heckscher-Ohlin model? What are the differences between it and the Ricardian Model?

  Monetary or fiscal policy

1.) Why can't either Monetary or Fiscal Policy by itself successfully help the national economy?

  Why is the abruptly style used in the following event

Why is the abruptly style used in the following event? While the world is running, move seaplane forward 1 meter style = abruptly.

  Enrollment at a college in southern california

The data reflects student enrollment at a college in Southern California.

  Describe how customer service programs provide employees

Describe how customer service programs provide employees with "tools." Provide an example from your business or from a brand you admire.

  What and why is project stakeholder management important

What and why is Project Stakeholder Management important?

  Preliminary research of cryptography history

You are gathering preliminary research of cryptography history to use with a dissertation,

  Finitely repeated or one-time game

How does an infinitely or indefinitely repeated Prisoner's Dilemma game differ from a finitely repeated or one-time game? WHY?

  Responsibilities for organization staff regarding security

Develop RACI chart for cybersecurity plan for small start-up company in which you. Explain roles/responsibilities for organization's staff regarding security

  Most popular features in windows 10

Find out and explain three of the most popular features in Windows 10. Explain how each could improve your daily work routine or job performance.

  Value proposition in investing in IT leadership development

Discuss the value proposition in investing in IT Leadership development. What do you consider are the qualities of good IT Leadership.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd