Preview

Is4231 Week 5

Powerful Essays
Open Document
Open Document
3436 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Is4231 Week 5
IS4231 INFORMATION SECURITY MANAGEMENT

05 Developing the Security Program

Objectives
2



Upon completion of this material you should be able to:
– – –

Explain the organizational approaches to information security List and describe the functional components of an information security program Determine how to plan and staff an organization’s information security program based on its size

IS4231 – 05 Developing the Security Program

Objectives (cont’d.)
3



Upon completion of this material you should be able to: (cont’d.)




Evaluate the internal and external factors that influence the activities and organization of an information security program List and describe the typical job titles and functions performed
…show more content…

An InfoSec program is sometimes at odds with the goals and objectives of the IT department as a whole

IS4231 – 05 Developing the Security Program

Placing Information Security Within An Organization (cont’d.)
25



Because the goals and objectives of the CIO and the CISO may come in conflict
– –

It is not difficult to understand the current movement to separate information security from the IT division The challenge is to design a reporting structure for the InfoSec program that balances the needs of each of the communities of interest

IS4231 – 05 Developing the Security Program

Placing Information Security Within an Organization (cont’d.)
26

IS4231 – 05 Developing the Security Program

Placing Information Security Within an Organization (cont’d.)
27

IS4231 – 05 Developing the Security Program

Placing Information Security Within an Organization (cont’d.)
28

IS4231 – 05 Developing the Security Program

Placing Information Security Within an Organization (cont’d.)
29

IS4231 – 05 Developing the Security Program

Placing Information Security Within an Organization (cont’d.)
30

IS4231 – 05 Developing the Security Program

Placing Information Security Within an Organization (cont’d.)
31



Other options
– – – – – –


You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    It321 Week 1

    • 640 Words
    • 3 Pages

    A long distance switch routes traffic through the long distance network. The types of interfaces that terminate on a long distance switch are intermachine trunks (ITMT’s); they can also connect to databases that are used to validate calling card calls.…

    • 640 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Week 5 Qnt351

    • 1843 Words
    • 8 Pages

    The instrument used to collect data from all 449 employees at DMC except upper management was an employee survey (UOPX Library, para 11). The survey was administered anonymously and at-will to 449 employees, and distributed with employee bimonthly paychecks within a six-week time frame. Only 78 responses out of 449 were returned to HR, which is a 17.3% response rate by the employees.…

    • 1843 Words
    • 8 Pages
    Better Essays
  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    and detailed work strategies, monitoring progress, and determining issues solutions. Finally, organizations should dedicate a team of security analysts directed by the expertise of a Chief information security office (CISO) that reports to the Chief information office (CIO) and provides detailed security information to management for assessment and further expansion opportunities to the security infrastructure. Thus, management and a team of dedicated security experts measure system goals, develop strategies towards a more secure organization environment that prevents risks of any magnitude by safeguarding every corner.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    IS3350 week 1

    • 287 Words
    • 3 Pages

    1. The purpose of identifying IT assets and inventory is to evaluate assets and track them.…

    • 287 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    POS421 Week 5 Individual

    • 1789 Words
    • 5 Pages

    In the Week 4, a domain model was created for Company Beta. When the domain model was created, it was thought to cover all the security concerns associated with the information contained on the network. Unfortunately, this is not the case. Recently, there has been some compromising activity to allow sensitive information to possibly get into the wrong hands. To help aid in eliminating the possibility of this occurring again, the entire domain model will be re-evaluated. This will provide security enhancements that are not present in the current domain model. In order to re-evaluate the current domain model, there are several aspects that we will have to discuss. These aspects include the type of domain model used for current domain model, the affects subnets may or may not have, how a new domain model can provide better security, how to improve the domain name system, the Internet domain name and its effect on the DNS name-resolution process, and can ISDN be improved. In addition, it will also be noted how domain controllers can be utilized to provide the company with adequate expansion in the future due to user population increase.…

    • 1789 Words
    • 5 Pages
    Better Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Psy315 Week 4

    • 972 Words
    • 4 Pages

    11. List the five steps of hypothesis testing, and explain the procedure and logic of each.…

    • 972 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Mkt421 week 5 individual

    • 1692 Words
    • 7 Pages

    Apple Inc. is a large corporation at the forefront of the electronics industry. It markets its products to both the business and consumer sectors of the market. The company has developed multiple lines of innovative technology such as computers, operating systems, and telecommunication devices. The company also produces diverse applications that enhance customer experience with their product line. These applications include workplace productivity, educational, health care, and personal uses. In order for such a large corporation to succeed in its industry, it must take into account many environmental factors that affect the successful operation of the company.…

    • 1692 Words
    • 7 Pages
    Powerful Essays
  • Good Essays

    Legt2741 Week 4

    • 1192 Words
    • 6 Pages

    Enjoys greater capital resources compared to sole traders ⋄ increases pool of funds available for financing. However this can also be seen as a disadvantage when compared to companies as they cannot raise funds from the general public and are limited by section 115 of the Corporations Act 2001 to a maximum of 20 partners. A and D…

    • 1192 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    NT 2580 Project Part 2

    • 2096 Words
    • 9 Pages

    Issue four. You must research and formulate a plan to implement monitoring and analysis based on the premise that all employees have Internet access to browse the Web, there is no policy on the use of removable media, and several of the branch offices have encountered issues with malware recently. You must determine system implementation and access in accordance with defined IT criteria as well as how to collect information for identification of and response to security breaches or events.…

    • 2096 Words
    • 9 Pages
    Powerful Essays
  • Satisfactory Essays

    Imagine University of Phoenix’s IT department has hired you. Your first task is to make sure the department is following the most important information security practices.…

    • 598 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    SOC413 Week 2

    • 695 Words
    • 3 Pages

    There are several agents of socialization; three of them are family, religion, and the workplace. Family is the most important of the social agents. A persons coming into society can be a negative one or a positive one and it begins with the relationships that person has at home. A person who is loved and nurtured at home is more than likely to grow into a loving and nurturing person and a productive person in society. A person who is neglected and not cared for at home has a greater chance of being a negative part of society. (Brinkerhoff, White, Ortega, and Weitz, 2011) A traditional family consists of a mother, father, and one or more children. More families are raised by a single parent, and in some of those homes the single parent is a male. The effects of a child growing up in a single parent home are low…

    • 695 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    As easy as it would be to say there is no effectiveness between the business and IT, I think this is a somewhat shortsighted perspective. Jenny clearly has an understanding of the needs of the business and how IT functions and may be able to help bridge the gap between these two departments. At the end of the case study it is clear that Farzad recognizes there are shortcomings as well, and appears to be willing to work to change and enhance the relationship between the two areas of the organization. It seems to me that the current management structure may be to blame for many of the shortcomings - it may be fine to bring technical gurus into meetings with the business side of the organization, but if their manager is not able to maintain a clear direction for the discussion, and spell out to the IT staff why talking about 3G and 4G, or security, is a waste of time for the meeting there is clearly a disconnect. Additionally, the information regarding CIOs changing with some amount of regularity indicates that an effective CIO has not been put in place - it seems as if they are generally too technical, and unable to see the forest through the trees (as it were) as far as cooperating with the business. While the structure itself is a shortcoming of IT, the fact that individuals who are both tech and business savvy have not been put into managerial positions is a failing of the business side of the organization. When putting together the structure for ANY departments, it is important to make sure that individuals are in place who can manage relationships and work with other departments and the business as a whole to make sure high level objectives are being met by specific…

    • 303 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Feedback: Typical organizations have an internal MIS department often called information technology (IT), information systems (IS), or management…

    • 1598 Words
    • 7 Pages
    Satisfactory Essays