Question

In: Accounting

Explain two fundamental concepts; why information security is a management issue, and the time-based model of...

Explain two fundamental concepts; why information security is a management issue, and the time-based model of information security.

Solutions

Expert Solution

Information Security is basically the practice of preventing unauthorized access, use, disclosure, disruption, modification, inspection, recording or destruction of information. Passwords, network and host-based firewalls, network intrusion detection systems, access control lists, and data encryption are examples of logical controls.

Information security is just a function of so many functions that work in harmony to help the company/organization achieves its goals, be it profit or any other non-profit goals. Security doesn’t stand on its own, it needs to be part of an organization, security might seem like a highly technical function – which is true in many aspects – the management fully controls it. Management sets the strategy for how the security should work, how many people will the security team have, how much money they will get, and how much authority they will have over the company operations. You can have brilliant security experts, but the management strategy and attitude can cripple them, rendering the entire security function useless. The management can be completely insensitive to the importance of security, and refuse to dedicate any resources to it.

.Every company which is incorporated has a board (also referred as executive management, senior management, or simply management) which has a due-care responsibility, under the Company Act . Now they have the liability from these cybersecurity issues, they become Accountable for these matters. That’s why it is a management problem. That is a “problem for the management”.

the time-based model of information security.- Implementing a set of preventative, detective, and corrective controls that allow an organization to recognize an attack and take steps to thwart it before any assets have been compromised

If P>(D+C), then security procedures are effective.

P= Time it takes to break through organization's preventative controls

D= Time it takes to detect that an attack in progress

C= Time to respond to the attack


Related Solutions

please explain deeply and clearly the security mechanisms to protect the fundamental objective of information security
please explain deeply and clearly the security mechanisms to protect the fundamental objective of information security
1. Discuss and explain the fundamental concepts of project management and the tasks required in managing...
1. Discuss and explain the fundamental concepts of project management and the tasks required in managing a project. 2. Outline the project process and evaluate projects, preparing and analysing project budgets. 3. Identify and apply project management tools in scheduling; understand and plan basic resource allocation. 4. Be able to report on a project’s progress; design and prepare closure evaluation and reports. Please can someone help me with this. Thank you very much
1. Discuss and explain the fundamental concepts of project management and the tasks required in managing...
1. Discuss and explain the fundamental concepts of project management and the tasks required in managing a project. 2. Outline the project process and evaluate projects, preparing and analysing project budgets. 3. Identify and apply project management tools in scheduling; understand and plan basic resource allocation. 4. Be able to report on a project’s progress; design and prepare closure evaluation and reports. Please can someone help me with this. Thank you very much
1. Discuss and explain the fundamental concepts of project management and the tasks required in managing...
1. Discuss and explain the fundamental concepts of project management and the tasks required in managing a project. 2. Outline the project process and evaluate projects, preparing and analysing project budgets. 3. Identify and apply project management tools in scheduling; understand and plan basic resource allocation. 4. Be able to report on a project’s progress; design and prepare closure evaluation and reports. Please can someone help me with this. Thank you very much
Discuss how the two concepts of intraoperative counts and res ipsa loquitur intersect. Explain the fundamental...
Discuss how the two concepts of intraoperative counts and res ipsa loquitur intersect. Explain the fundamental change the Patient Care Partnership introduced as related to the patient. Discuss the differences between morals and ethics. Give as many examples of each as you can think of. In a conversation with a CST fellow-worker, he relates a story about a recent case. You soon realize that the patient in question was one of your close family members. What do you do?
WHAT IS THE LITERATURE REVIEW OF Fundamental Concepts of FINANCIAL MANAGEMENT AND CONTROL SYSTEM ? 500...
WHAT IS THE LITERATURE REVIEW OF Fundamental Concepts of FINANCIAL MANAGEMENT AND CONTROL SYSTEM ? 500 WORDS
Explain why a database and a database management system are fundamental to business operations. Short Essay...
Explain why a database and a database management system are fundamental to business operations. Short Essay Question
21) The two-slit experiment illustrated several fundamental concepts in quantum mechanics. Explain what each of these...
21) The two-slit experiment illustrated several fundamental concepts in quantum mechanics. Explain what each of these is and how they are demonstrated in the experiments: Intrinsic Randomness Measurements Affect Reality Superposition Heisenberg’s Uncertainty Principle
What is meant by a dilutive security? Briefly explain why corporations issue convertible securities. Discuss the...
What is meant by a dilutive security? Briefly explain why corporations issue convertible securities. Discuss the similarities and the differences between convertible debt and debt issued with stock warrants. Finally, explain how the conversion feature of convertible debt has a value to (a) the issuer and (b) the purchaser.
Develop a revenue management (maximizing) model based on the information given in the scenario. How many...
Develop a revenue management (maximizing) model based on the information given in the scenario. How many seats should be allocated to each of the 16 itineraries to maximize revenue? What is the (maximum) expected revenue to be earned per day for all 16 flights? Assume operating costs for each of the legs is as follows: Leg 1 = $20,250 Leg 2 = $19,750 Leg 3 = $20,500 Leg 4 = $19,500 What is the expected operating income for each of...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT