Question

In: Computer Science

List three distinct places in the hierarchy of a large company where you could put a computer security team.


List three distinct places in the hierarchy of a large company where you could put a computer security team. Explain the pros and cons of positioning the team in each of these locations.

Define the role of a stakeholder in a security project. List five examples of stakeholders from the business, and explain why they have a vested interest in security policies and processes. Suggest how the CISO or the security team can work to build relations with and involve each stakeholder more in security projects.

Explain how the CISO should work with IT management and business units to get greater support for security projects. Be thorough and offer examples.

Solutions

Expert Solution

Once could place the security team in the following phases:

1) Design

2) Implementation and

3) Testing

The pros of positioning the team are as follows:

1) Finding the prospect is easier

2) Benefits for the decision makers

3) Efficient way of learning

4) It is highly compensated

Cons:

1) Extra work

2) Time consuming

When it come to the role of stakeholders in the Security Project below are the roles :

  1. They help to transfer the knowledge as well as insigts from an experienced view
  2. Help to share the knowledge with the shifts as well as functions
  3. Also reveal the security values if not immediately then atleast with respect to security personnel.
  4. Help to expand the security awareness of the work
  5. Checks the effectiveness as well as scope of the security training
  6. Also reinforces the purpose and build a team and structure.

Some of the examples of Stake holders are as follows :

Creditors, Directors, Employees, Government , Suppliers, Unions etc

As the stalk holders play a vital role in rules and regulations and also are involved in ICT hence involving them are needed.

The security team can involve the Stalk holders in the security projects for ISP development and testing and auditing for letting them know the structure of the team and functioning of the task.

The chief information security officers are help with respect to the risk and cost of the projects and business decisions with IT and provide the in-depth knowledge of the security environments.


Related Solutions

You are on the board of a computer software company that has three distinct divisions: home...
You are on the board of a computer software company that has three distinct divisions: home networks, small business systems and ERP systems. In a bid to encourage higher performance, it has been proposed that the company would benefit from creating a reward system with a profit- sharing component for divisional managers. At present, divisional managers are paid a fixed salary. The proposal is for the company to pool 5 per cent of the company’s profits each month and pay...
You would like to implement a list where you put in operations at any position to...
You would like to implement a list where you put in operations at any position to the list occur frequently. Would you use an array-based list? Explain why or why not?
Imagine that you are part of the management team for Econsoft, a computer software company. You...
Imagine that you are part of the management team for Econsoft, a computer software company. You are discussing one of your products, “Econblaster,” with the company’s CEO and the other managers. You have made the software available for download on your firm’s website for download for $9.99 and you are trying to figure out how to generate more revenue from the product. Half of the management team suggests increasing the price to $11.99. The other half advocates cutting the price...
You are the lead trainer for the software development team at a large telecommunications company. You...
You are the lead trainer for the software development team at a large telecommunications company. You have been tasked with preparing a training document that explains the principles of polymorphism, inheritance, and encapsulation. Research these principles and provide examples for each principle, showing how they would be used in software development. Be sure to answer the question of how each principle would be employed in the software development process. Java programmers use class hierarchies for the purposes of inheritance. For...
1. A large oil company has hired you as part of their engineering team that is...
1. A large oil company has hired you as part of their engineering team that is planning all of the details for a new drill site. The crude oil will be stored in large cylindrical tanks. The following restrictions apply to the tanks you can purchase: (a) Tank heights must be in full meters i. The maximum tank height for sale is 12 meters ii. The minimum tank height for sale is 7 meters (b) All tanks have a diameter...
Case Study: Assume that the company, where you are working as a team in Financial Department,...
Case Study: Assume that the company, where you are working as a team in Financial Department, is considering a potential project with a new product that is expected to sell for an average price of $22 per unit and the company expects it can sell 650 000 unit per year at this price for a period of 4 years. Launching this project will require purchase of a $3 500 000 equipment that has residual value in four years of $500...
Case Study: Assume that the company, where you are working as a team in Financial Department,...
Case Study: Assume that the company, where you are working as a team in Financial Department, is considering a potential project with a new product that is expected to sell for an average price of $22 per unit and the company expects it can sell 650 000 unit per year at this price for a period of 4 years. Launching this project will require purchase of a $3 500 000 equipment that has residual value in four years of $500...
Imagine the following scenario at a company where you are the computer specialist: Your company recently...
Imagine the following scenario at a company where you are the computer specialist: Your company recently installed high-speed Internet access at the office where you work. There are 50 workstations connected to the network and the Internet. Within a week, half the computers in the office were down because of a virus that was contracted by a screen saver. In addition, network personnel from a university in England contacted the company, claiming that your computer systems were being used as...
Q1: List three variables you could change to improve the effectiveness of the fractional distillation to...
Q1: List three variables you could change to improve the effectiveness of the fractional distillation to separating the ethanol from water? Q2: Why is 200 proof ethanol not food grade while 190 proof one is?
list three subjective data you could use to assess substance use and three subjective data questions...
list three subjective data you could use to assess substance use and three subjective data questions you would use to assess domestic violence.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT