Organization and develop an information security strategy

Assignment Help Basic Computer Science
Reference no: EM13936431

The task is to carry out an information security risk assessment for an organization and develop an Information Security Strategy for that organization. This should include, at least:
a prioritized list of the risks identified (4 - 5 information risks) as follows:

i) Identify & analyse information risks with clear identification of assets, vulnerabilities and threats (TVA analysis). When you identify these risks make sure to classify them properly (for example, loss of information is a general risk, so you should clarify if it is loss of confidentiality, integrity or Availability).

ii) Give an estimate of single loss expectancy (SLE), annualized rate of occurrence (ARO) and then calculate the annualized loss expectancy (ALE). SLE & ARO should be justified form previous info. sec reports such as 2014 Information security breaches survey (https://www.pwc.co.uk/audit-assurance/publications/2014-information-security-breaches-survey.jhtml)
a list of specific controls that should be put in place, and any relevant guidance on how the controls should be implemented, along with clear rationales, in terms of costs and benefits, for the choices that have been made (see control examples).
an outline of the information security policies that should be established.

an audit strategy for the controls that have been proposed.

a suitable incident response plan.

You should make use of whatever accepted industry or international standards you feel are appropriate in carrying out this task, but either COBIT 5 or ISO 27000 series standards, or a combination of both are recommended.

If you feel that additional areas need to be addressed in the strategy, then please add them, with a brief explanation of why.

In selecting an organization to focus on, you may choose a specific organization with which one or more of your group are familiar. In the case where you choose an organization that not all of the group members are familiar with, you should clearly define the roles that each member of the group will take in the assignment work, bearing in mind the prior knowledge that each member has.

Reference no: EM13936431

Questions Cloud

Service (iaas) from a cloud service provider : An organization is planning to use Infrastructure as a Service (IaaS) from a cloud service provider to host their web site and e-commerce applications. This will consist of an appropriate number of suitably sized Linux Virtual Servers and Virtual ..
Advice on strategies for your project execution : You have been told during this process to reach out to other CA City Retail Group Cafés to obtain appropriate advice on strategies for your project execution. What are three questions you could ask to guarantee success - Explain the process for ide..
Show how this priority queue is affected by adding string : To tell if one element in ZooGraph has relation X to another element, you look for a path between them. Show whether the following statements are true, using the picture or adjacency matrix.
Evaluation and interpretation of criminal justice data : Discuss why these aspects were selected. Describe how the selected aspects relate to the evaluation and interpretation of criminal justice data and research findings. Explain why researchers would consider qualitative methods an artistic expression o..
Organization and develop an information security strategy : The task is to carry out an information security risk assessment for an organization and develop an Information Security Strategy for that organization. This should include, at least:
Value and exchange for developing a marketing strategy : Marketing Reflection - Explaining the concepts of Value and Exchange for developing a marketing strategy.
Internal it services hosted on premise : Many organizations are using cloud services in place of internal IT services hosted on premise. Cloud services reduce the need for capital expenditure and can be set up in minutes without the need for long hardware procurement cycles. However usin..
What do you estimate the dollar amount of rollover balances : Also the value of a(s - q)/t = 1. If current CD balances are $100 million, what do you estimate the dollar amount of rollover balances to be?
Explain the super predator myth : During the 1990s and into the 2000s a juvenile super predator myth drove statutory and policy development throughout the nation. Using federal or state government publications and/or peer reviewed journal articles: Explain the super predator myth

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Calculate the problem and stop after the condition

Use the information below to create a storyboard (which can be a text based description for solving the problems) and a flowchart (using flowchart symbols to illustrate how you would program) to solve each problem. You may use Microsoft Word® for you..

  Describe how rsa algorithm works for cryptography

Explain why RSA works, namely the math foundation behind it. You must explain why each equation works and provide one simple example to verify that - Itemize the steps described in the textbook for the scenario and explain the purpose for each ste..

  Biometric devices as computer peripherals

What are your thoughts regarding current or next generation biometric devices as computer peripherals? What near-term and long-term trends do you think we will see in the human-computer interface in general?

  Write a statement to print the counter value

Write a For loop such that the loop till iterate from 1000 to 1 decrementing the counter by 1 each time through the loop. Inside the loop, write a statement to print the counter's value to the Output window.

  Write bash shell script filestatic to examine number files

Write bash shell script filestatic. Script should examine the number files in directories given as arguments (parameters) to this script.

  Advising about a software purchase

Your local art museum recently purchased a quad-core computer with 16 GB of RAM. The curator read an article about an art collection inventory system software package that could go on the new computer. You have a long experience with end users has..

  Define the conditional jump statements causes a jump to dest

Assume for each part of this problem that the EAX register contains 00 00 00 4F and the doubleword referenced by value contains FF FF FF 38. Determine whether each of the conditional jump statements causes a jump to dest.

  Write a program that displays four lines of text in four lab

Write a program that displays four lines of text in four labels

  An instruction set which includes transcendental function

Describe a major application which would need each of the following types of instruction set

  What other patient data should be included in your database

In a larger category of "Vaccine," you might divide an MMR vaccine into separate antigens, such as measles, mumps, and rubella. What other larger categories must be included? What challenges do you encounter in organizing the data? Refer to Chapte..

  The multiplexer and expected simulation report

Write a Verilog testbench for the multiplexer and expected Simulation Report.

  Develop a c-level executive briefing to explain the practice

The Assignment Your manager has assigned you to a workgroup to research the assigned IT best practice (IT Infrastructure Library (ITIL) and develop a C-level executive briefing that will explain the practice,

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd