How would implementing a comprehensive security programme

Assignment Help Management Information Sys
Reference no: EM133338395

Assignment:

Please answers these question in terms of Security Planning

1) You have just been hired as the New Head of Security for a technology company of about 2000 employees which has been operating for less than five years. No one has been specifically responsible for security before you although ICT have tried to cope with whatever they thought was reasonable.

Discuss: How you would go about implementing a comprehensive security programme. What would you do first and why? What tools would you need and why? What documentation would be necessary? Who would you get to sponsor you and how? How many people would you initially need in the Security Department, what would their roles be and what qualifications should they hold?

How would you ensure that employees outside of security knew what was expected of them? Provide as much detail as possible in your discussion.

2) What are the risks involved in making hiring decisions based on a referral from an applicant's current or formal employee? HINT: In terms of HR perspective.

3) Why do some companies want larger sizes sessions when it comes to training and why others prefer smaller classes? What's the difference? HINT: Think in terms of SETA.

Reference no: EM133338395

Questions Cloud

Keynes thought that behavior of the economy : Keynes thought that the behavior of the economy in the short run was influenced by what he called "animal spirits." By this he meant
Uphold high moral standards : Do you think USA citizens are discontent with their government due to lack of efficiency or leaders failling to uphold high moral standards?
Stakeholders to demonstrate how your internal audit function : You would engage with key stakeholders to demonstrate how your Internal Audit function can provide value to the company going forward
How the disruption occurred : Retail Bank has been disrupted by technological factors/Fintechs. How the disruption occurred, Example firms that have led the disruption
How would implementing a comprehensive security programme : How you would go about implementing a comprehensive security programme. What would you do first and why? What tools would you need and why?
Describe a time that you were faced with a decision : Describe a time that you were faced with a decision where you didn't demonstrate integrity in a way you wished you had? What would you do differently?
What company first invested in apple : INFM 109 Ivy Tech Community College, Indianapolis What was the difference in the schooling of Bill Gates and Steve Jobs? Why is it important?
Do you belong to any online social networks which ones : Do you belong to any online social networks? Which ones? How do you use them? How might you use them to further your job search?
Why fraud does not fit into the cia model : Take some time to consider further why fraud doesn't fit into the CIA model. List some examples and try to imagine how you would mitigate the threat.

Reviews

Write a Review

Management Information Sys Questions & Answers

  What is the intent of black hat seo tactics

What is the intent of black hat SEO tactics? How does Google attempt to deter websites from using black hat SEO tactics?

  Explore how these might work in practice

Discuss the changes to the ways of working for Phab - i.e. discuss what processes will change, and explore how these might work in practice.

  Examine advances in internet-based communication

Research the web and journal sites and identify one article that examines advances in Internet-based communication technologies and their impact.

  Which strategic business objectives of information systems

Discuss Which strategic business objectives of information systems are evident in each case study - What kinds of ethical issues are evident.

  How goal orientation heuristics applies to security

Explain in few sentences how each of these heuristics applies to security:Goal orientation (people want to pursue some task which isn't security)

  Describe the australian governments ism and pspf

Describe the Australian Government's ISM and PSPF with particular emphasis on information classification.

  A high level of visibility on search engine results pages

Why is it important that businesses maintain a high level of visibility on search engine results pages?

  Emerging technologies in the field that you are covering

For example if your name is John Doe, the file will submitted as DoeJ.docx. If you submit a screen recording be sure to test the link to either the screencastomatic or youtube server prior to submission. Do not attach the video file. Include a br..

  Define data analytics in general

Analyze the main advantages and disadvantages of using data analytics within the industry or company that you have chosen.

  Explain what are advantages and disadvantage of social media

What are advantages and disadvantages of social media? How might knowing these advantages and disadvantages alter how a person might use social media? What credibility issues can arise from information on the Internet?

  Analyze the means in which data moves within organization

Suggest three (3) logical access control methods to restrict unauthorized entities from accessing sensitive information, and explain why you suggested each method. Analyze the means in which data moves within the organization and identify techniq..

  How would you collect information from potential customers

Classic Airlines:Collecting Customer's Information and How would you collect information from potential customers and frequent flyer members?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd