Identify how the adoption of standard and creation of policy

Assignment Help Management Information Sys
Reference no: EM131038746

(1) Information Security Standards and Models

Examples of the evolution of information security activities date back to coded messages in ancient times. The modern information security and assurance industry did not begin to establish uniform practices and standards until the late 1980s. One example of an early effort is the creation of ISC2, which involved a group of information security practitioners coming together to establish certification criteria for security professionals. The federal government and a number of standards organizations such as NIST and ISO have developed examples of information security standards. Those reviewing the available standards will find that there is significant agreement among them as to approaches and models that support the work of information security.

Use the study materials and engage in any additional research needed to fill in knowledge gaps. Then discuss the following:

Identify an example of information security standards that appears to have taken a leadership position in setting standards for the industry.

Outline the framework and objectives of a security standards organization, including whether the standards are intended for a particular sector within information security.

Describe how security professionals who work in the private sector might determine which information security standards and models are most appropriate for implementation in the context of a specific organization.

(2) Infosec Policies and Standards in the Private Sector

Application of information security standards and policies can be better defined in industries and organizations that must comply with specific regulations. As more industries become regulated, and as the regulations themselves become more standardized into common practice, this puts pressure on nonregulated industries to conform their practices too. Legal theory in the United States is heavily tilted towards establishing what is "reasonable," making the practice of all organizations best aligned in common practice where possible.

Use the study materials and engage in any additional research needed to fill in knowledge gaps. Then discuss the following:

Describe the relationship between information security standards organizations and the creation of internal information security policy within private sector organizations.

Identify how the adoption of standard and the creation of policy must be adopted within the context of the core business goals and objectives of an organization.

Explain how the information security professional can ensure that there is adequate consideration and approval for diverging from common practice in situations where that is necessary.

Reference no: EM131038746

Questions Cloud

Define the term culture jamming : Define the term "Culture Jamming". Visit http://www.adbusters.org/ , and share your impressions of the website. Then, explain how advertising can act as a form of cultural imperialism.
Create website for irc with link for each piece of equipment : Create a website for the IRC with links for each piece of equipment. Create a word processed document with pictures and step-by-step instructions on how to use the eye tracker as well as the EEG.
Showing the various classes identified and their association : The normalised relations that you will implement in the software, showing the attributes and keys together with their field type and "picture" (for example, the type of data that is held - text, a date, a number etc.) A sample table of the basic r..
Portfolio essay on the issue of globalization : Your essay should answer the following questions: What is globalization, and in what ways has the Internet served as a vehicle for it? What cultural values do the site you chose reflect? What political values are reflected?
Identify how the adoption of standard and creation of policy : Explain how the information security professional can ensure that there is adequate consideration and approval for diverging from common practice in situations where that is necessary.
How disney might be considered as a leading force : You will address how Disney might be considered as a leading force of US imperialism - utilizing the college's library resources.
Calculate after-tax weighted average cost of capital : Calculate after-tax Weighted Average Cost of Capital - what alternative capital structure would you recommend lowering the cost of capital to the company?
Analyze how the type of legal dispute affects the evidence : Analyze appropriate evidence handling for a cybersecurity-related investigation involving a violation of corporate security policy and a criminal investigation. Explore the roles that federal, state, local, and private sector organizations and ag..
Write one page reflection paper about the given article : Read article "Effect of distance of transportation on willingness to pay for food" by Carola Grebitus, Jayson L. Lusk and Rodolfo M. Nayga Jr then write one page reflection paper, the reflection paper should be in MLA style single space.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd