Preview

Is411 Study Guide

Good Essays
Open Document
Open Document
2595 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Is411 Study Guide
Study Guide IS 411
Security Policies and Implementation Issues

A perfect policy will not prevent all threats. Key to determining if a business will implement any policy is cost. Policies support the risk assessment to reduce the cost by providing controls and procedures to manage the risk. A good policy includes support for incident handling. Pg 15

Policy may add complexity to a job but that is not important. Unmanageable complexity refers to how complex and realistic the project is. The ability of the organization to support the security policies will be an important topic. Pg 105

Who should review changes to a business process?
Policy change control board, minimally you should include people from information security, compliance, audit, HR, leadership from other business units, and Project Managers (PMs). Pg 172
-------------------------------------------------
Policy – a document that states how the organization is to perform and conduct business functions and transactions with a desired outcome. Policy is based on a business requirement (such as legal or organizational)
-------------------------------------------------

-------------------------------------------------
Standard – an established and proven norm or method, which can be a procedural standard or a technical standard implemented organization-wide
-------------------------------------------------

-------------------------------------------------
Procedure – a written statement describing the steps required to implement a process. Procedures are technical steps taken to achieve policy goals (how-to document)
-------------------------------------------------

-------------------------------------------------
Guideline – a parameter within which a policy, standard, or procedure is suggested but optional pg 11-13

Resiliency is a term used in IT to indicate how quickly the IT infrastructure can recover. Pg 279. The Recovery Time Objective (RTO) is the

You May Also Find These Documents Helpful

  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    Describe the policies for securing the facilities and the policies of securing the information systems. Outline the controls needed for each category as relates to your selected scenario.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    It255 Final Study Guide

    • 843 Words
    • 4 Pages

    17. Which of the following is not a part of an ordinary IT security policy framework?…

    • 843 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Unit 4 P6

    • 757 Words
    • 4 Pages

    To make sure that information is managed appropriately, a number of policies and procedures have to be put in place, concerning security of information.…

    • 757 Words
    • 4 Pages
    Good Essays
  • Good Essays

    A policy is a statement of what an organisation will do to safeguard a child or young person to keep them safe.…

    • 1226 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Welding and Hot Work

    • 747 Words
    • 3 Pages

    Plan: Establish the objectives and processes necessary to deliver results in accordance with customer requirements and the organization’s policies.…

    • 747 Words
    • 3 Pages
    Good Essays
  • Good Essays

    final private security

    • 2763 Words
    • 9 Pages

    A successful information security policy provides several benefits to corporations. Enforceable policies ensure that vulnerabilities are identified…

    • 2763 Words
    • 9 Pages
    Good Essays
  • Good Essays

    Isos

    • 288 Words
    • 2 Pages

    De-facto standard would be "presumed practice", something widely-used, but not standard. For example, Microsoft Windows might be the de-facto standard for business applications. Yet, in some industries (telco and health care), Unix is the de-facto standard.…

    • 288 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Proper security measures play a huge role in the successful operation of an organization. As the security manager for a company that manufactures high-tech components for an international automobile manufacturer I have been tasked with finding new personnel to ensure security measures are met. There are two different types of security I can choose from; proprietary and contract security. I have done extensive research on the two, to help me make the correct decision for this company. There are some advantages and disadvantages to each type; so I had to find the one that best matches the needs of this company. Proprietary and contract security have the same objectives. They protect the company that they are providing security for. This includes protecting company assets, confident material, ensuring the safety of personnel and consumers, and building.…

    • 1248 Words
    • 5 Pages
    Better Essays
  • Better Essays

    This is defined by an expert or professional and relates to established standards and protocols. This type of need is often highlighted when a standard needs to be met or maintained.…

    • 2281 Words
    • 10 Pages
    Better Essays
  • Good Essays

    BPM VS. Workflow

    • 1603 Words
    • 7 Pages

    A business process is a sequence of one or more related, structured activities that has a clearly stated…

    • 1603 Words
    • 7 Pages
    Good Essays
  • Good Essays

    Operating Policies

    • 646 Words
    • 3 Pages

    Company policies and procedures are not something to be kept on a dusty shelf. In fact, policy and procedure handbooks…

    • 646 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Tort Negligence

    • 3525 Words
    • 15 Pages

    Policy is shorthand for 'public policy considerations'. Policy considerations were recognised in the Wilberforce test and the test in Caparo v Dickman.…

    • 3525 Words
    • 15 Pages
    Powerful Essays
  • Good Essays

    A policy is typically described as a principle or rule to guide decisions and achieve rational outcome(s). The term is not normally used to denote what is actually done, this is normally referred to as either procedure or protocol. Whereas a policy will contain the 'what' and the 'why', procedures or protocols contain the 'what', the 'how', the 'where', and the 'when'. Policies are generally adopted by the Board of or senior governance body within an organization where as procedures or protocols would be developed and adopted by senior executive officers.…

    • 2137 Words
    • 9 Pages
    Good Essays
  • Powerful Essays

    it255 study guide

    • 659 Words
    • 3 Pages

    17. Which of the following is not a part of an ordinary IT security policy framework?…

    • 659 Words
    • 3 Pages
    Powerful Essays
  • Best Essays

    The reason for choosing the issue-specific security policy was because it was the least investigated yet potentially the most important policy of all three key policies. The purpose of the task itself was to enable students to gain a deeper understanding of the effects and uses of security policies which in turn further expanded our knowledge of how rules and regulations are structured in the corporate world.…

    • 3522 Words
    • 15 Pages
    Best Essays