Question

In: Computer Science

An information security manager is assisting in the development of the request for proposal (RFP) for...

An information security manager is assisting in the development of the request for proposal (RFP) for a new outsourced service. This will require the third party to

have access to critical business information. The security manager should focus PRIMARILY on defining:

A. security metrics

B. service level agreements (SLAs)

C. risk-reporting methodologies

D. security requirements for the process being outsourced

Correct Answer: ?????????????

____________________

Answer A (security metrics) is believed to be the correct one (but often they are not)

■ But I do not believe that answer is the correct one

■ I am undecided on 2 answers:

   1) A. Service Level Agreements (SLAs): defines the level of service you expect from a vendor, laying out the "metrics" by which service is measured

   2) D. Security Requirements for the process being outsourced: Since the process is at the RFP step, the information security manager should focus on security requirements

■ Please enter an explanation of why that answer is correct and why the others are not.

Many Thanks!

Solutions

Expert Solution

Hi

As per my view answer should be "security requirements for the process being outsourced"

Reason:

Purpose of Information Security Manager to assist for the RFP for new outsources proejct , off course a security of data nothing else.As we know job of Security Manager is to overseeing and controlling all aspects of computer security in a business. The job entails planning and carrying out security measures that will protect a business’s data and information from deliberate attack, unauthorised access.

He will assess the all security measures and will be sure that there should not be lack of security for the data/information.

He will assist to :

-Assessing the risks to computer systems and planning to minimise possible threats

-Ensuring that international and national network security standards are met

-Preparing technical documentation and reports

Company would also be expected to be care of security aspect of the system by working closely with security managers on the overall security strategy of the business.

Why other options could be wrong:

1. service level agreements (SLAs): your said reason seems to be correct as there is not any role of security manager in this mainly.

risk-reporting methodologies: its about contents.what should be included in report or what shoudl not. no relation with ISM

Thanks

Thanks


Related Solutions

Employer RFP Paper: SCENARIO: You are responsible for the request for proposal (RFP) department in an...
Employer RFP Paper: SCENARIO: You are responsible for the request for proposal (RFP) department in an MCO. Several employers have come to you looking for health insurance benefit offerings to its employees. You are to provide a package of health care insurance benefit coverage recommendations based on the size of each company: small group, medium group, and large group. For each company size, recommend the services you would offer that sized company. Include how those services would be organized. You...
Compare and contrast the evaluation and selection of an external Request for Proposal (RFP) to an...
Compare and contrast the evaluation and selection of an external Request for Proposal (RFP) to an internal project selection criteria originate? How would a project manager know where to find them or how to develop them?
Compare and contrast the evaluation and selection of an external Request for Proposal (RFP) to an...
Compare and contrast the evaluation and selection of an external Request for Proposal (RFP) to an internal project. Should the processes be the same or different? Why or Why not?
Chapter 12 discusses and dissects an RFP (Request for Proposal). Once an organization decides to outsource...
Chapter 12 discusses and dissects an RFP (Request for Proposal). Once an organization decides to outsource project work, parties are frequently responsible for developing a Request for Proposal. This can be done from either the perspective of the company offering the work or the company “fighting” for the bid.
Differentiate between a request for information, request for proposal, and request for quotation, and describe the...
Differentiate between a request for information, request for proposal, and request for quotation, and describe the utility of each in the hospital purchasing process.
A request for proposal (RFP) is a formal document that describes in detail your logical requirements for a proposed system
REQUEST FOR PROPOSAL A request for proposal (RFP) is a formal document that describes in detail your logical requirements for a proposed system and invites outsourcing organizations to submit bids for its development. Research the Web and find three RFP examples. Briefly explain in a one-pagedocument what each RFP has in common and how each RFP is different.Please type this instead of posting pictures.
example of a cover letter to a RFP grant proposal
example of a cover letter to a RFP grant proposal
example of an executive summary of a RFP grant proposal
example of an executive summary of a RFP grant proposal
As a security manager or administrator of a fictitious company, write a Security Plan Proposal as...
As a security manager or administrator of a fictitious company, write a Security Plan Proposal as a project draft document. Briefly provide an overview/description of your fictitious company. Identify and discuss the importance of risk assessment to the organization’s security framework? Discuss the five layers of risk.
You hare creating a Request for proposal. You are a software development company upgrading an outdated...
You hare creating a Request for proposal. You are a software development company upgrading an outdated system. Below are the scope of services. Consultant shall assess existing functions and develop a system based on an Oracle platform in a Microsoft Windows 10 or later environment. Consultant shall deliver a complete system, beta tested, fully debugged, documented and deployable on remote computers around the globe. Training for system administrators shall be included as required. Documentation shall be CD based for printing...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT