Relationship between policies and security plans

Assignment Help Basic Computer Science
Reference no: EM133158673

Now that you have seen all the elements contributing to the Devil's Canyon enterprise architecture, Justin wants to move forward with developing privacy policies to ensure videos are not distributed or uploaded to the net without the consent of the people in them. This opens a much larger conversation: Devil's Canyon is also in need of a complete security plan, as well as risk assessments.

Prepare the following information to present to the Devil's Canyon team:

Explain the relationship between policies and security plans. Identify potential policy needs, noting Justin's privacy policy, in relation to the Devil's Canyon enterprise structure.

Outline the importance of a security plan in relation to security roles and safeguards.

Analyze at least 5 security-related risks/threats that Devil's Canyon may face.

Assess the probability and impact to the Devil's Canyon if each risk occurs. Based on these two factors, determine the overall risk level. For purposes of this assignment, evaluate and categorize each factor as low, medium, or high, and create a table to illustrate the risks. For example, a risk/threat with a low likelihood of occurrence and a high impact would represent an overall medium risk.

Consider digital elements mentioned in the designing of the enterprise architecture, such as software, hardware, proposed security measures, smart lift tickets, web cam systems, and smartphones.

Reference no: EM133158673

Questions Cloud

Efficient collaboration of global-cross cultural workforce : Organizations today understand the vital importance of technology that supports effective and efficient collaboration of global and cross-cultural workforce
Graphic visual representations of information : Comparison charts are graphic visual representations of information, knowledge, or data to present information concisely and clearly.
Hubspot focus on flexible benefits : What concerns would you have regarding giving employees countless flexible benefits such as HubSpot does; for example, a yearly sabbatical?
Implementing network and personnel security measures : Implementing Network and Personnel Security Measures. Illustrates how remote users will securely connect to the government agency's network.
Relationship between policies and security plans : Explain the relationship between policies and security plans. Outline the importance of a security plan in relation to security roles and safeguards.
Why legal-risk-compliance-audit-information technology : Create a business process map that indicates how users will interact with the technology. Explain why the legal, risk, compliance, audit, information technology
Industry experts believe blockchain is technology : Industry experts believe blockchain is a technology that has the potential to affect the business of most IT professionals in the next five years.
Digital growth timeline : What is digital growth? Where is the company now in terms of digital growth? What is Big Data? How might Big Data be used in this business?
Significant past medical or psychiatric history : The patient has no significant past medical or psychiatric history and takes no regular medications.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Database modeling and normalization

Determine the steps in the development of an effective entity relationship model (ERM) diagram

  Describe the concept of system

Describe the concept of a "system". Describe the job of a system analyst

  Social media and social networking

Cis 542-Social media and social networking are some of the newest tools used to market products and services to the public.

  Find the best approach to my revision questions

Are you available you help me find the best approach to my revision questions.

  Advantage of the full transfer rate of interfaces

If you did want to take advantage of the full transfer rate of these interfaces, it would be better to use a solid-state drive (SSD) rather than a hard drive.

  Database integrity solutions

Briefly explain what are database integrity constraints and why they are important to ensure data quality and list the types of constraints

  What is a dynamic array

a. Explain the enum data type with an example program. b. What is a dynamic array?

  Advantages of a virtualized data center

What are the advantages of a virtualized data center over a classic data center?

  Hedge currency in financial global markets

How do some multinational corporations hedge currency in financial global markets?

  Licensed programming software

Write the advantage of open source language like R over other licensed programming software.

  Implementing cybersecurity in the energy sector

Discussion that connects your entire analysis with the topic and future implications of cybersecurity in the energy sector

  What is information security

What is information security? What are some of the challenges associated with keeping your own information safe within the digital world?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd