How would implementing a comprehensive security programme

Assignment Help Management Information Sys
Reference no: EM133338395

Assignment:

Please answers these question in terms of Security Planning

1) You have just been hired as the New Head of Security for a technology company of about 2000 employees which has been operating for less than five years. No one has been specifically responsible for security before you although ICT have tried to cope with whatever they thought was reasonable.

Discuss: How you would go about implementing a comprehensive security programme. What would you do first and why? What tools would you need and why? What documentation would be necessary? Who would you get to sponsor you and how? How many people would you initially need in the Security Department, what would their roles be and what qualifications should they hold?

How would you ensure that employees outside of security knew what was expected of them? Provide as much detail as possible in your discussion.

2) What are the risks involved in making hiring decisions based on a referral from an applicant's current or formal employee? HINT: In terms of HR perspective.

3) Why do some companies want larger sizes sessions when it comes to training and why others prefer smaller classes? What's the difference? HINT: Think in terms of SETA.

Reference no: EM133338395

Questions Cloud

Keynes thought that behavior of the economy : Keynes thought that the behavior of the economy in the short run was influenced by what he called "animal spirits." By this he meant
Uphold high moral standards : Do you think USA citizens are discontent with their government due to lack of efficiency or leaders failling to uphold high moral standards?
Stakeholders to demonstrate how your internal audit function : You would engage with key stakeholders to demonstrate how your Internal Audit function can provide value to the company going forward
How the disruption occurred : Retail Bank has been disrupted by technological factors/Fintechs. How the disruption occurred, Example firms that have led the disruption
How would implementing a comprehensive security programme : How you would go about implementing a comprehensive security programme. What would you do first and why? What tools would you need and why?
Describe a time that you were faced with a decision : Describe a time that you were faced with a decision where you didn't demonstrate integrity in a way you wished you had? What would you do differently?
What company first invested in apple : INFM 109 Ivy Tech Community College, Indianapolis What was the difference in the schooling of Bill Gates and Steve Jobs? Why is it important?
Do you belong to any online social networks which ones : Do you belong to any online social networks? Which ones? How do you use them? How might you use them to further your job search?
Why fraud does not fit into the cia model : Take some time to consider further why fraud doesn't fit into the CIA model. List some examples and try to imagine how you would mitigate the threat.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd