Question

In: Computer Science

Discuss the reasons for information security policies. One reason is to enable the creation of other...

Discuss the reasons for information security policies. One reason is to enable the creation of other more specific planning documents. What would happen in the absence of a policy document?

Solutions

Expert Solution

>To establish a general approach to information security
>To detect and forestall the compromise of information security such as misuse of data, networks, computer systems and applications.
>To protect the reputation of the company with respect to its ethical and legal responsibilities.
>To observe the rights of the customers; providing effective mechanisms for responding to complaints and queries concerning real or perceived non-compliances with the policy is one way to achieve this objective

>Outcomes of interest are compared to expected or predicted outcomes (often constructed/modelled at the appraisal stage) of what would be expected if no action was taken (i.e. in the absence of the policy). Outcomes are only monitored for those experiencing the policy


Related Solutions

Discuss the importance of having security policies in place.
Discuss the importance of having security policies in place.
explain money creation,one by a depository and the other by the federal reserve
explain money creation,one by a depository and the other by the federal reserve
Information security policies are the core internal guidance for an organization and must be enacted prior...
Information security policies are the core internal guidance for an organization and must be enacted prior to the purchase of information security controls. There is a bit of a "chicken and egg" dispute in the information security community as to whether it is appropriate to first engage in risk assessment with policies created to address those findings or whether it is appropriate to first create policies against which a risk assessment can be performed. On a more granular level, security...
Discuss the economic reasons for male preference and economic policies that can equalize value of male...
Discuss the economic reasons for male preference and economic policies that can equalize value of male and female children.
Discuss the Homeland Security role of federal agencies other than DHS.
Discuss the Homeland Security role of federal agencies other than DHS.
briefly discuss the domestic agriculture policies which provide food security and stabilize agricultural markets.
briefly discuss the domestic agriculture policies which provide food security and stabilize agricultural markets.
Explain one of the reasons why policy makers usually focus on demand-side policies to achieve their...
Explain one of the reasons why policy makers usually focus on demand-side policies to achieve their macroeconomics goals as opposed to the supply-side ones.
For this discussion board, explain one of the reasons why policymakers usually focus on demand-side policies...
For this discussion board, explain one of the reasons why policymakers usually focus on demand-side policies to achieve their macroeconomic goals as opposed to the supply-side ones. Be sure to include concepts from the chapters. Provide one example of a demand-side policy and explain why and how it causes the aggregate demand to shift. Similarly for the supply side, you need to explain one of the reasons why some may prefer to use supply-side policies. Provide one example of a...
1) Discuss the macroeconomic policies and connect them with one another? 2) how can all policies...
1) Discuss the macroeconomic policies and connect them with one another? 2) how can all policies can be aligned to fine-tune the economy, let us say any dire time like ours?
What principles should the information security analyst apply in order to develop appropriate acceptable use policies...
What principles should the information security analyst apply in order to develop appropriate acceptable use policies for the client? Make sure to address confidentiality, integrity, and availability of information. Answer the following please; What should users generally be allowed to do with their computing and network resources? When and why would each example be allowable? What should users generally be prohibited from doing with their computing and network resources? When and why would each example require prohibition? When and why...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT