Identify how the adoption of standard and creation of policy

Assignment Help Management Information Sys
Reference no: EM131038746

(1) Information Security Standards and Models

Examples of the evolution of information security activities date back to coded messages in ancient times. The modern information security and assurance industry did not begin to establish uniform practices and standards until the late 1980s. One example of an early effort is the creation of ISC2, which involved a group of information security practitioners coming together to establish certification criteria for security professionals. The federal government and a number of standards organizations such as NIST and ISO have developed examples of information security standards. Those reviewing the available standards will find that there is significant agreement among them as to approaches and models that support the work of information security.

Use the study materials and engage in any additional research needed to fill in knowledge gaps. Then discuss the following:

Identify an example of information security standards that appears to have taken a leadership position in setting standards for the industry.

Outline the framework and objectives of a security standards organization, including whether the standards are intended for a particular sector within information security.

Describe how security professionals who work in the private sector might determine which information security standards and models are most appropriate for implementation in the context of a specific organization.

(2) Infosec Policies and Standards in the Private Sector

Application of information security standards and policies can be better defined in industries and organizations that must comply with specific regulations. As more industries become regulated, and as the regulations themselves become more standardized into common practice, this puts pressure on nonregulated industries to conform their practices too. Legal theory in the United States is heavily tilted towards establishing what is "reasonable," making the practice of all organizations best aligned in common practice where possible.

Use the study materials and engage in any additional research needed to fill in knowledge gaps. Then discuss the following:

Describe the relationship between information security standards organizations and the creation of internal information security policy within private sector organizations.

Identify how the adoption of standard and the creation of policy must be adopted within the context of the core business goals and objectives of an organization.

Explain how the information security professional can ensure that there is adequate consideration and approval for diverging from common practice in situations where that is necessary.

Reference no: EM131038746

Questions Cloud

Define the term culture jamming : Define the term "Culture Jamming". Visit http://www.adbusters.org/ , and share your impressions of the website. Then, explain how advertising can act as a form of cultural imperialism.
Create website for irc with link for each piece of equipment : Create a website for the IRC with links for each piece of equipment. Create a word processed document with pictures and step-by-step instructions on how to use the eye tracker as well as the EEG.
Showing the various classes identified and their association : The normalised relations that you will implement in the software, showing the attributes and keys together with their field type and "picture" (for example, the type of data that is held - text, a date, a number etc.) A sample table of the basic r..
Portfolio essay on the issue of globalization : Your essay should answer the following questions: What is globalization, and in what ways has the Internet served as a vehicle for it? What cultural values do the site you chose reflect? What political values are reflected?
Identify how the adoption of standard and creation of policy : Explain how the information security professional can ensure that there is adequate consideration and approval for diverging from common practice in situations where that is necessary.
How disney might be considered as a leading force : You will address how Disney might be considered as a leading force of US imperialism - utilizing the college's library resources.
Calculate after-tax weighted average cost of capital : Calculate after-tax Weighted Average Cost of Capital - what alternative capital structure would you recommend lowering the cost of capital to the company?
Analyze how the type of legal dispute affects the evidence : Analyze appropriate evidence handling for a cybersecurity-related investigation involving a violation of corporate security policy and a criminal investigation. Explore the roles that federal, state, local, and private sector organizations and ag..
Write one page reflection paper about the given article : Read article "Effect of distance of transportation on willingness to pay for food" by Carola Grebitus, Jayson L. Lusk and Rodolfo M. Nayga Jr then write one page reflection paper, the reflection paper should be in MLA style single space.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Price of products after implementing new technologyas

price of products after implementing new technologyas manager of online instructional services ois you receive exciting

  Explian about vendor managed inventory system

What are the pros and cons of a vendor managed inventory system and How does it differ from a facility managed system

  Question about computer crime

Question about Computer Crime: Challenges and Security Issues and What are some suggestions as to how to track down offenders of these crimes you've identified?

  Kumquat computerskumquat computers is a major computer

kumquat computerskumquat computers is a major computer manufacturer that also owns all of the organizations in the

  Explain how are investments analyzed for performance

Your task for this module's project piece is to conduct research to determine what investors want to know about their investments on a daily basis and over time. How are investments analyzed for performance

  Summary analysis about stumbleupon

Prepare 2 pages summary analysis about StumbleUpon. The analysis must include: Executive summary and History and evolution of the platform

  What phases are included in the systems design

Systems Design. What is the primary target of systems design and what phases are included in the systems design? Refer to the video clip on Terra Nova Beverage Company. What two recommendations would you make for the new system design? Provide sup..

  Develop system and user interfaces design for the product

Develop system and user interfaces design for the product order sub-system and design system environment and architecture to support the entire system. The system is to be deployed on the company's premises but securely connected to the Internet.

  Create a web page using color or an image as a background

Create a web page using color or an image as a background, add an image into the body of text, and then add colors that are compatible to the design

  Components of implementing strategyi need assistance with

components of implementing strategyi need assistance with the following i know what they are but i cant get the words

  Paper on development of corporate strategy

Write a five to seven (5-7) page paper on development of Corporate Strategy for Information Security

  Ways that it dashboards provide meaningful data

Evaluate the ways that IT dashboards provide meaningful data or information to the organization's executives. Determine the best ways to use an IT dashboard for this purpose

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd