Question

In: Computer Science

Q1. Define information security Q2. Describe the information security roles of professionals within an organization


Q1. Define information security

Q2. Describe the information security roles of professionals within an organization

Q3. Explain these Necessary tools: policy, awareness, training, education, technology

Q4. Explain why a successful information security program is the responsibility of both an organization’s general management and IT management

Q5. Identify the threats posed to information security and differentiate threats to the information within systems from attacks against the information within systems

Q6. Differentiate between laws and ethics

Q7. Explain the role of culture as it applies to ethics in information security

Solutions

Expert Solution

Ans1. Information security, to protect the confidentiality, integrity, and availability of information
assets, whether in storage, processing, or transmission.
It is achieved via the application of policy, education, training, and awareness, and
technology.

Ans2. There are various types of roles in an organization.

The chief information security officer (CISO) has primary responsibility for the assessment,
management, and implementation of information security in the organization.
1.Champion: A senior executive who promotes the project and ensures its support, both
financially and administratively, at the highest levels of the organization.
2.Team leader: A project manager, who may be a departmental line manager or staff
unit manager, who understands project management, personnel management, and
information security technical requirements.
3.Security policy developers: People who understand the organizational culture,
existing policies, and requirements for developing and implementing successful
policies.
4.Risk assessment specialists: People who understand financial risk assessment techniques,
the value of organizational assets, and the security methods to be used.
5. Security professionals: Dedicated, trained, and well-educated specialists in all aspects
of information security from both a technical and nontechnical standpoint.
6.Systems administrators: People with the primary responsibility for administering the
systems that house the information used by the organization.
7. End users: Those whom the new system will most directly affect. Ideally, a selection of
users from various departments, levels, and degrees of technical knowledge assist the
team in focusing on the application of realistic controls applied in ways that do not
disrupt the essential business activities they seek to safeguard.

Ans3. The primary tools needed to achieve the goals of reducing occupational injuries and illnesses
and promoting occupational safety and health have been characterized as the
“three E’s”—engineering, enforcement, and education. The three are interdependent and receive
varying levels of emphasis within different national systems. The overall rationale for
training and education is to improve awareness of safety and health hazards, to expand knowledge
of the causes of occupational illness and injury and to promote the implementation
of effective preventive measures. The specific purpose and impetus for training
will, however, vary for different target audiences.
Security awareness training is a formal process for educating employees about computer
security.

A good security awareness program should educate employees about corporate policies
and procedures for working with information technology (IT).

Ans 4. This is because there are roles to be taken care of which leads to the involvement of both
general management and IT management.
AS quoted in Ans2
Various roles of general management and IT management are such as time management
, resource mangement & team management comes under general management & all
technical job comes under IT management.

Ans. 5 A threat is an object, person, or other entity that represents a constant danger to an asset
. By examining each threat category in turn, management effectively protects its
information through policy, education and training, and technology controls.

An attack is the deliberate act that exploits the vulnerability
It is accomplished by a threat-agent to damage or steal an organization’s information or
physical asset.
An exploit is a technique to compromise a system.
A vulnerability is an identified weakness of a controlled system whose controls are not
present or are no longer effective.
An attack is then the use of an exploit to achieve the compromise of a controlled system.

Ans 6. Law- constitution, statutes, regulations, codes, cases.
Ethics- systems of acceptable behavior adopted by a group or profession.

Firstly, ethics comes from people’s awareness of what is right and what is wrong while
laws are written and approved by governments. It means that ethics may vary from people
to people because differentpeople may have different opinions on a certain issue, but laws
describe clearly what is illegal no matter how people arguing.

Nobody will be punished when they violate ethics; but whoever violates laws is going to
receive punishment carried out by relevant authorities.

Ethics and laws and closely related since laws represent minimum ethical
behaviors of human beings; but they are distinct from many aspects.

Ans 7.working with other cultures, it is important to recognize differences in values.
Cultural differences can make it difficult to determine what is and is not ethical—especially
when it comes to the use of computers. Studies on ethics and computer use reveal that people
of different nationalities have different perspectives; difficulties arise when one nationality’s
ethical behavior violates the ethics of another national group.


Related Solutions

Q1. Describe the legal forms of business organization. Q2. Discuss business taxes and their importance in...
Q1. Describe the legal forms of business organization. Q2. Discuss business taxes and their importance in financial decisions. Q3. What are the two primary activities of the financial manager that are related to the firm’s balance sheet?
Q1: Explain the different database structures in database management system (DBMS) Q2: What are the roles...
Q1: Explain the different database structures in database management system (DBMS) Q2: What are the roles of OSI layers to transmit data from one computer to another computer?
Define "Social Capital" in describe why you think it is important "intangible" within an organization. 2....
Define "Social Capital" in describe why you think it is important "intangible" within an organization. 2. Do you agree or disagree that personal relationships and trust are important to organizational culture? If so, why? If not, why not? Use examples from your experience and/or organization to explain
Define the standards and parameters that health care professionals must have in order to work within...
Define the standards and parameters that health care professionals must have in order to work within their scope of practice.
Professional or trade organizations can provide ethical guidelines for business or professionals within their selected organization....
Professional or trade organizations can provide ethical guidelines for business or professionals within their selected organization. Research a professional or trade organization. Provide one example of an ethical guideline supplied by the professional or trade organization. Include a hyperlink to your selected professional or trade organization with your example.
explain the role of information technology in an organization and the roles and responsibilities associated with...
explain the role of information technology in an organization and the roles and responsibilities associated with creating and managing information technology policies.
Q1. Explain in details the agency problems ? Q2. Define the debt ratio in your word...
Q1. Explain in details the agency problems ? Q2. Define the debt ratio in your word ?
Q1: What is meant by form should follow function? Give two business examples. Q2: Roles vs...
Q1: What is meant by form should follow function? Give two business examples. Q2: Roles vs People why is distinguishing them as seperate entities in business so important?
How often should IT security policies be reviewed within an organization? What is the impact if...
How often should IT security policies be reviewed within an organization? What is the impact if these policies are not reviewed on a regular basis?
Explain the importance of system security within an organization, including discussion of the legal and ethical...
Explain the importance of system security within an organization, including discussion of the legal and ethical implications the organization could face for failing to protect their systems and information. Identify and explain three strategies organizations can implement to protect their systems and information against threats.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT