Preview

Discussion 1

Satisfactory Essays
Open Document
Open Document
396 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Discussion 1
From a management perspective, analyze the overall industry requirements and major organizational challenges of forming a sound information security program, and ascertain the fundamental manner in which regulations and compliancy may factor into the challenges in question.

A security policy defines limitations on individual behavior or system performance and details activities that are permitted, controlled or prohibited within the company. In order for policies to be effectual, senior management must endorse them, they must be communicated to all employees, undergo recurring reviews, and be assessed for usefulness. A security program encompasses all of the required pieces necessary to successfully protect a business. It should include policies, requirements, standards and procedures. Security plans should be operative at all levels of a corporation to be effective. Management should communicate a formal explanation of what is acceptable by all employees. Management should also clearly dictate what the consequences of noncompliance are. Organizations can use the ISO-27002:2005 as an outline to create a security policy.

Gregory, P. (2010). CISSP Guide to Security Essentials. Boston, MA: Cengage Learning.

From the e-Activity, compare and contrast quantitative, qualitative, and hybrid risk assessment methodologies overall. Give one (1) example of when you would use each of the methods over the others. Justify your response.

Qualitative risk analysis is used for ranking risk occurrences by calculating and relating their likelihood of occurrence and impact to identify requirements for additional analysis or action. It identifies and ranks the potential incidents, in combination with the likelihood of their happening. Quantitative risk analysis describes the process used to numerically analyze the effect of an identified risk. Qualitative risk assessment happens with a pre-defined range of resources or activities. The assets can be made up of

You May Also Find These Documents Helpful

  • Better Essays

    risk assessments - process of evaluating the potential risks that may be involved in method of work…

    • 1528 Words
    • 7 Pages
    Better Essays
  • Satisfactory Essays

    When specifying security policies for an enterprise, setting security on an individual-by-individual basis provides the tightest and most personalized security. The tradeoff, however, is the increased amount of administration effort in setting up the security and maintaining it on an ongoing basis. You have been brought in as a consultant from Smith Systems Consulting to advise Riordan Manufacturing on what it will take to establish adequate enterprise security policies. You will need to prepare a 3-5 page paper that highlights why they should establish separation of duties via role assignment and how this will provide safeguards to protecting the data in their information systems.…

    • 354 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    When specifying security policies for an enterprise, setting security on an individual-by-individual basis provides the tightest and most personalized security. The tradeoff, however, is the increased amount of administration effort in setting up the security and maintaining it on an ongoing basis. You have been brought in as a consultant from Smith Systems Consulting to advise Riordan Manufacturing on what it will take to establish adequate enterprise security policies. You will need to prepare a 3-5 page paper that highlights why they should establish separation of duties via role assignment and how this will provide safeguards to protecting the data in their information systems.…

    • 651 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    At Richman Investments the personnel is accountable for the appropriate use of IT assets. Therefore, it is in the best interest of the organization to ensure employees handle security procedures with integrity. It is essential to create a strong AUP (Acceptable Use Policy) procedure and as part of the process, require employees sign an agreement to guarantee they understand and conform to implemented rules and regulations. In addition, the company will conduct security awareness training, annual security exercises, notices about securing information, and constant reminders security is everyone’s responsibility.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    IS3550 Final Project

    • 4998 Words
    • 19 Pages

    The purpose of this paper is to develop an information security policy that defines the requirements to make our organization's computer network compliant with National Institute of Standards and Technology (NIST) Security Standards. NIST regulations and instructions were reviewed in order to develop the requirements that are stated in this policy. The source documents used can be found in the references section.…

    • 4998 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    Quantitative Risk Analysis is the methodology for numerically breaking down the impact on general venture objectivities of distinguished dangers" (comp. Pmbok3, p. 237). On the base of the after-effects of the Qualitative Risk Analysis the "Quantitative Risk Analysis is performed on dangers that have been prioritized and analysis’s the impacts of those dangers occasions and assigns a numerical rating to those dangers". As opposed to evaluating the single effects by utilizing a crude typology as a part of the procedure of Quantitative Risk Analysis the effects to the entire undertaking will be made processable and will be processed for creating a more expounded aggregate positioning.…

    • 1477 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    References: Johnson, Rob. with Merkow, Mike. Security Policies and Implementation Issues. First Edition. Copyright © 2011by Jones & Bartlett Learning, LLC, an Ascend Learning company…

    • 577 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Student Lab Manual © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION © Jones & Bartlett Learning, LL NOT FOR SALE OR DISTRIBUT © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION Student Lab Manual © Jones & Bartlett Learning, LLC © Jones & Bartlett Learning, LLC NOT FOR SALE OR DISTRIBUTION NOT FOR SALE OR DISTRIBUTION…

    • 38968 Words
    • 406 Pages
    Satisfactory Essays
  • Better Essays

    BSBRSK501B Assessment4v15

    • 1514 Words
    • 6 Pages

    What are three ways that research can be conducted for risk-related issues? For each way, briefly describe how it may be done.…

    • 1514 Words
    • 6 Pages
    Better Essays
  • Good Essays

    IDEF0 assignment

    • 1588 Words
    • 6 Pages

    The third step is risk management is “Qualitative risk analysis” which allows you to prioritize impacts on project and its objective so we can attend most important ones first.…

    • 1588 Words
    • 6 Pages
    Good Essays
  • Good Essays

    Risk Assessment by Zakir

    • 7898 Words
    • 58 Pages

    The main aim of the assignment is to outline the application of Risk Assessment procedures to…

    • 7898 Words
    • 58 Pages
    Good Essays
  • Powerful Essays

    Security paper

    • 1480 Words
    • 6 Pages

    In today’s information age, there is an over dependence in I.T in all operations of a company from keeping records to many other functions in the organization. Given the importance of information systems in tee organizations, malice, mischance or error can be detrimental to the organization’s existence and therefore a well laid out security policy is almost mandatory. Security policy therefore focuses on the processes, tools and methods necessary for the design, implementation and testing of the systems as well as adopt the existing systems to the ever changing environment. Global Distribution Inc. (GDI) is a distribution company that is involved with management of numerous accounts across the United States, Mexico and Canada. With the complexity and sensitivity of its operations, data loss or interference in its systems through error, malicious damage or mishap would lead to loss of millions of dollars as well as massive inconvenience to thousands of its clients (Greene, 2005). Having a good security policy for this organization is therefore a priority and this can only be achieved through a dedicated team of experts in the firm whose roles and responsibilities are well defined. It is clear that outsourcing cuts down operation costs, but dedication and availability of such staff raises questions to the quality of work they will offer to such a sensitive department. Having a good security policy requires involvement of all stake holders in the firm, from the C.E.O to the high number of employees in the firm (Greene, 2005). Given this chance to come up with a good security policy for the firm requires a high level commitment from me and my team and therefore the following document will breakdown how we intend to achieve such a great task.…

    • 1480 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    The security policy for an organization plays a predominant rule. There are different security strategies for every organization. For example, Organization A with the policy X might be not be useful for organization B. Every company designs its own security policies in which the custom and living document can reflect the environment and culture of the organization to meet their required specific needs (Long, 2002). The strategies of implementing the policies are designed on the bases of technologies and principles the organization uses (Hrause &Tipton 2003).…

    • 1134 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    assessing risk – understanding the nature of the risk, likelihood of the risk occurring and the consequence or impact it may have…

    • 1631 Words
    • 7 Pages
    Powerful Essays
  • Best Essays

    The reason for choosing the issue-specific security policy was because it was the least investigated yet potentially the most important policy of all three key policies. The purpose of the task itself was to enable students to gain a deeper understanding of the effects and uses of security policies which in turn further expanded our knowledge of how rules and regulations are structured in the corporate world.…

    • 3522 Words
    • 15 Pages
    Best Essays