Management Of Information Security
6th Edition
ISBN: 9781337405713
Author: WHITMAN, Michael.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Question
Chapter 1, Problem 1EDM
Program Plan Intro
Code of ethics:
- The “ethics” word comes from the Greek term “duty”.
- The code of ethics means all the responsibilities that professional must respect when carrying out their work.
- It also contains the core value of the work and the behavior which should be adopted.
Example:
Professional and confidentiality secrecy are responsibilities contained in the code of ethics and conduct in numerous professions like accountants, lawyers, doctors and journalists.
Intent of the code of ethics:
- The intent of the code of ethics established by a professional order as a way to safeguard public and the status of the professionals.
- The employee who breach their code of ethics suffer disciplinary actions that can range from a warning or rebuke to dismissal or ejection from their professional order.
Privacy policy:
- A privacy policy denotes a statement that discloses some or all ways an organization would gather, use, disclose and manage data of customers as well as clients.
- It fulfills a legal requirement for protecting privacy of customers as well as clients.
- Personal information denotes anything that could be used to identify an individual.
- It represents a generalized treatment that tends to be more specific and detailed.
- The exact content of certain privacy policy will depend upon applicable law and need to address requirements across all boundaries.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
Damon Davis was working on the company's spreadsheet for Drano Drain and Sewer Service. Based on his estimates, he concluded that a net income of $50,000 would result. He totaled up the amounts in the Total Balance Sheet Columns, which indicated a deficit of $400,000 and a credit of $300,000, and came up with the following: We can only speculate as to the true cause of this disparity. If this isn't the case, then how can he tell where the issue is coming from?
Suppose you have to select one project partner from a set of four classmates, who have different GPAs. Assume you do not know any student’s GPA in advance but can get to know it after you have picked a student from that group
(a) Suppose you pick one of the four students at random and accept that student as your project partner. What is the probability that your partner is the one with the highest GPA?
(b) Suppose you decide to reject the first student and to then accept the next student if and
only if that student has a higher GPA. Note that you MUST have a partner, so if the first three are rejected by you, then you have to accept the fourth student. What is the probability that your partner will be the one with the highest GPA.
Question 1: pertains to the Cherokee School District scenario below. The school board for the Cherokee School District has made the decision to purchase 1370additional Macintosh computers for computer laboratories in all its schools. Based on the past experience, the school board has directed that these computers should be purchased from some combination of three companies Mc Comp, EduElectronics, and Macwin. In all three cases, the companies charge a discounted variable cost per computer and a fixed delivery and installation costs for these large sales to school districts. The table below shows these charges as well as the capacity (the maximum number of computers that can be sold from the limited inventory) for each of the companies.CapacityFixed cost variable costMcComp710 $45,000 $750 EduElectronics690$35,000$780
Macwin1000$50,000 $700
The school board wants to know the optimal plan for meeting its computer needs.
1.Identify the type of integer programming framework (Total Integer,…
Chapter 1 Solutions
Management Of Information Security
Ch. 1 - Prob. 1RQCh. 1 - Prob. 2RQCh. 1 - Prob. 3RQCh. 1 - Prob. 4RQCh. 1 - Prob. 5RQCh. 1 - Prob. 6RQCh. 1 - Prob. 7RQCh. 1 - Prob. 8RQCh. 1 - Prob. 9RQCh. 1 - Prob. 10RQ
Ch. 1 - Prob. 11RQCh. 1 - Prob. 12RQCh. 1 - Prob. 13RQCh. 1 - Prob. 14RQCh. 1 - Prob. 15RQCh. 1 - Prob. 16RQCh. 1 - Prob. 17RQCh. 1 - Prob. 18RQCh. 1 - Prob. 19RQCh. 1 - Prob. 20RQCh. 1 - Assume that a security model is needed to protect...Ch. 1 - Prob. 2ECh. 1 - Prob. 3ECh. 1 - Prob. 4ECh. 1 - Prob. 6ECh. 1 - Prob. 1DQCh. 1 - Prob. 2DQCh. 1 - Prob. 1EDM
Knowledge Booster
Similar questions
- Mr. Art Pang is the Accounts Receivables manager. We have been assigned to gather the system requirements for a new billing system, and we need to solicit facts from his subordinates. Mr. Pang has expressed his concern that, although he wishes to support us in your fact-finding efforts, his people are extremely busy and must get their jobs done. 1. Describe a fact-finding strategy with rationale, that we could follow to maximize your fact-finding while minimizing the time required from his subordinates. 2. Once we have gathered the requirements, they must be recorded. What techniques would we use to capture the requirements for the new billing system? Explain your rationale.arrow_forwardYou just started your summer internship with immunityPlus based in La Crosse, Wisconsin. You are working with forecasting team to estimate how many doses of an immunization drug will be needed. For each drug estimation, you will be provided the following information: 1. The size of the target population 2. The life expectancy, in yeras of an individual in the population 3. A file containig ages, in years, of a sample of 12 people infected in the population To calculate the number of doses needed: 1. Calulate the average age of infection from a sample of 12 years 2. Calculate the Base reproduction number(Ro) Ro = life expectancy / average age of infection 3. Calculate herd immunity threshold (Q) Q = 1 - 1/Ro 4. Calculate the numebr of doses Doses = Q * population size Construct a profram that allos a user to enter the size of the target population, the life expectancy of an individual in the population, and the name of the sample file. Once this information is obtained, perform the…arrow_forwardAccording to researches and law enforcement experts, the pedophiles use a grooming process while commiting thier crimes. Sort the steps of the grooming process according to the order in which they take place with 1 being the first one: 1. Friendship Phase options A 4 B 2 C 1 D 3 2. The Secrecy Phase options A 4 B 2 C 1D 3 3The Physical Contact Phase options A 4 B 2 C 1 D 3 4 The Pornography Phase options A 4 B 2 C 1 D 3arrow_forward
- Given the following business scenario, create a Crow's Foot ERD using a specialization hierarchy if appropriate. Two-Bit Drilling Company keeps information on employees and their insurance dependents. Each employee has an employee number, name, date of hire, and title. If an employee is an inspector, then the date of certification and certification renewal date should also be recorded in the system. For all employees, the Social Security number and dependent names should be kept. All dependents must be associated with one and only one employee. Some employees will not have dependents, while others will have many dependents.arrow_forwardJulia Robertson is a senior at Tech, and she’s investigating different ways to finance her final year at school. She is considering leasing a food booth outside the Tech stadium at home football games. Tech sells out every home game, and Julia knows, from attending the games herself, that everyone eats a lot of food. She has to pay $1,000 per game for a booth, and the booths are not very large. Vendors can sell either food or drinks on Tech property, but not both. Only the Tech athletic department concession stands can sell both inside the stadium. She thinks slices of cheese pizza, hot dogs, and barbecue sandwiches are the most popular food items among fans, and so these are the items she would sell. Most food items are sold during the hour before the game starts and during halftime; thus it will not be possible for Julia to prepare the food while she is selling it. She must prepare the food ahead of time and then store it in a warming oven. For $600 she can lease a warming oven for…arrow_forwardSuppose your class is made up of IT managers for a large organization such as a federal agency or a computer manufacturer. Senior managers want to restructure the organization's network to make it completely secure. It is decided to base the new system on a theoretical model. Which model would you choose for this assignment (see below on options), and why? Discuss your reasoning. Bell-LaPadula Model, Biba Integrity Model, Clark-Wilson Model, Chinese Wall Model, or State Machine Model.arrow_forward
- Mr. Art Pang is in charge of Receivables. His subordinates must provide information to help us collect system needs for a new billing system. Although Mr. Pang has indicated his desire to assist us in our fact-finding efforts, he has voiced worry about the fact that his employees are very busy and must get their tasks done.What is the best way to get the most out of your fact-finding efforts while requiring the least amount of time from his subordinates?The requirements should be documented after they have been collected. For the new billing system, what methods would we employ? Your reasoning should be explained.arrow_forwardDraw the ER/EER model for the given scenario. Manufacturer have unique name, an address, and a phone number. Products have a product_id, a name and price. Products may be classified into electronics and grocery. Electronic products have description, type attributes. Groceries have fssai_number, date_of manufacture, date_of_expiry. Each product is made by one manufacturer, and different manufacturers may produce different products.. Customers are identified by their unique social security number. They have email addresses, and physical addresses. Several customers may live at the same (physical) address, but we assume that no two customers have the same email address. An order has a unique order number, and a date. An order is placed by one customer. For each order, there are one or more products ordered, and there is a quantity for each product on the orderarrow_forwardBack at Attaway Airlines, the morning meeting ended with no agreement between the VP of finance and the marketing manager. In fact, a new issue arose. The VP now says that the new accounting system is entitled to the highest priority because the federal government soon will require the reporting of certain types of company-paid health insurance premiums. Because the current system will not handle this report, the VP insists that the entire accounting system is a nondiscretionary project. As you might expect, the marketing manager is upset. Can part of a project be nondiscretionary? What issues need to be discussed? The committee meets again tomorrow, and the members will look to you, as the IT director, for guidance.arrow_forward
- Using the Crow’s Foot methodology, create an ERD that can be implemented for a medical clinic, using at least the following business rules: A patient can make many appointments with one or more doctors in the clinic, and a doctor can accept appointments with many patients. However, each appointment is made with only one doctor and one patient. Emergency cases do not require an appointment. However, for appointment management purposes, an emergency is entered in the appointment book as “unscheduled.” If kept, an appointment yields a visit with the doctor specified in the appointment. The visit yields a diagnosis and, when appropriate, treatment. With each visit, the patient’s records are updated to provide a medical history Each patient visit creates a bill. Each patient visit is billed by one doctor, and each doctor can bill many patients. Each bill must be paid. However, a bill may be paid in many installments, and a payment may cover more than one bill. A patient may pay the bill…arrow_forwardYour country has adopted the World Trade Organisation (WTO) valuation methods for imports and exports.Write short notes on two of the following WTO customs valuation methods:(i) Method 1 – Transaction value (ii) Method 2 – Transaction value of identical goods (b) Owing to the high incidences of dumping goods in the country, the tax authority in your country has sought your professional advice on how to end this vice. Outline some of the measures that the authority can utilize in preventing dumping of goods. (c) (i) State the conditions which should be fulfilled before an exemption from payment of tax isgranted under the VAT and Customs and Excise Acts. (ii) Explain the procedure for applying for such an exemption under the VAT and Customs and Excise Acts.arrow_forwardDamon Davis was creating the Drano Plumbing Company's spreadsheet. According to his estimates, the net revenue would be $50,000. Who knows what the most probable cause of this mismatch was, but his Total Balance Sheet Columns showed a deficit of $400,000 and a credit of $300,000, which he summed together and calculated as follows: Why shouldn't this be the case, and what should he do to locate the issue's root cause?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,