Preview

Sec 402 Week 4 Assignment 1 Research Paper

Satisfactory Essays
Open Document
Open Document
514 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Sec 402 Week 4 Assignment 1 Research Paper
SEC 402 Week 4 Assignment 1 – Developing the Corporate Strategy for Information Security – Strayer Latest
Purchase this tutorial here: https://www.homework.services/shop/sec-402-week-4-assignment-1-developing-the-corporate-strategy-for-information-security-strayer-latest/ SEC 402 Week 4 Assignment 1 – Developing the Corporate Strategy for Information Security – Strayer Latest

Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.

As part of the Information Security Strategy development, you are
…show more content…
Examine three (3) specific functions a CISO and provide examples of when a CISO would execute these functions within the organization.
Specify at least three (3) competencies that the CISO could perform using the provided Website titled, “Information Technology (IT) Security Essential Body of Knowledge (EBK): A Competency and Functional Frame-work for IT Security Workforce Development.”
The Chief Information Officer (CIO) is responsible for several accountability functions within an organization:
Identify at least four (4) functions of the CIO using the EBK as a guide. Provide examples of how the CIO would execute these functions within an organization.
Classify at least two (2) security assurances that could be achieved by the CIO developing a formal security awareness, training, and educational program.
Suggest methods, processes, or technologies that can be used by the CIO to certify the security functions and data assets of an organization on a day-to-day basis.
Describe how the digital forensics function complements the overall security efforts of the

You May Also Find These Documents Helpful

  • Good Essays

    Nt1330 Unit 6 Paper

    • 853 Words
    • 4 Pages

    and detailed work strategies, monitoring progress, and determining issues solutions. Finally, organizations should dedicate a team of security analysts directed by the expertise of a Chief information security office (CISO) that reports to the Chief information office (CIO) and provides detailed security information to management for assessment and further expansion opportunities to the security infrastructure. Thus, management and a team of dedicated security experts measure system goals, develop strategies towards a more secure organization environment that prevents risks of any magnitude by safeguarding every corner.…

    • 853 Words
    • 4 Pages
    Good Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    IS3550 Final Project

    • 4998 Words
    • 19 Pages

    The purpose of this paper is to develop an information security policy that defines the requirements to make our organization's computer network compliant with National Institute of Standards and Technology (NIST) Security Standards. NIST regulations and instructions were reviewed in order to develop the requirements that are stated in this policy. The source documents used can be found in the references section.…

    • 4998 Words
    • 19 Pages
    Powerful Essays
  • Powerful Essays

    Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario.…

    • 4827 Words
    • 20 Pages
    Powerful Essays
  • Powerful Essays

    The Firm is a security services provider. Our clients included organizations of various sizes, but most clients are state and federal government agencies that must demonstrate compliance with specific security-related regulations. Our firm was founded 2002, as a small corporation with only four employees. At that time, the firm’s focus was to provide database performance tuning and security services, including assessments, penetration tests, policy creation, and regulatory compliance assistance. The firm’s current annual gross sales are currently million in U.S. dollars.…

    • 1810 Words
    • 8 Pages
    Powerful Essays
  • Good Essays

    2. How should IT be integrated with other functional areas to assure that the company can meet its business objectives?…

    • 3613 Words
    • 15 Pages
    Good Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Security is an ever moving target that must be continually managed and refined to ensure appropriate confidentiality, integrity, and availability of services and systems that are critical to business, as well as the valuable data.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    The Rookie Chief Iso

    • 3874 Words
    • 16 Pages

    Members of the Information Security Team assist the CISO with design, evaluation, implementation, and management of security programs for the organization.…

    • 3874 Words
    • 16 Pages
    Powerful Essays
  • Satisfactory Essays

    You are an information security analyst working for UNFO. UNFO expects to have over 6,000,000 transactions and online revenue in excess of $50,000,000 in sales for its sporting equipment and apparel during the course of the year. Additionally, it has been learned that customers will be able to call in by using credit card numbers to make an online purchase. The conversations will be recorded and stored in the organization's Private Branch Exchange (PBX) system. Your manager asks you to outline a Web security life cycle for the organization. This outline will later be compiled as part of the organization's overall security policy by the organization's Senior Security Engineer.…

    • 324 Words
    • 2 Pages
    Satisfactory Essays
  • Best Essays

    CB Hart has suffered major reputation problems because of disregarding the small security issues. Company has been affected by the event of data leakage. The information that leaked was not hugely confidential but that situation was damaging enough to cause a big decrease in the reputation of the CB Hart.…

    • 3482 Words
    • 14 Pages
    Best Essays
  • Good Essays

    Applying Risk Management

    • 1067 Words
    • 4 Pages

    References: Whitman,M.E., & Mattord, H. J. (2010). Management of information security(3rded.). Boston, MA: Course Technology/Cengage Learning…

    • 1067 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Danchev, d. (2003). Building and implementing a successful information security policy (P-7). Retrieved from: http://www.windowsecurity.com/pages/security-policy.pdf…

    • 1134 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Cis Studyguide

    • 1150 Words
    • 5 Pages

    1. Recognize the importance of information technology and understand who is responsible for protecting an organization’s information assets…

    • 1150 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Research on Security

    • 4956 Words
    • 20 Pages

    It is important to figure out who the right people are in organization so as to approach them for executing the security system. Showing other groups how their jobs can be easier while helping to manage risk and protect the company’s assets and can effectively extend the security. For example, Human Resources department are essential because it manages the relationship between a company and its employees. So when HR department performs function such as employee misconduct, terminations, and other delicate issues will surely consider to include information security…

    • 4956 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    Finally, as security failures increasingly impact on individual consumers and citizens, there is a developing regulatory agenda, particularly around the security of personal information. As a result, a business may need to shift its thinking from internal risk management to meeting external demands. (1)…

    • 782 Words
    • 2 Pages
    Good Essays