Lms Integrated For Mindtap Information Security, 1 Term (6 Months) Printed Access Card For Whitman/mattord's Management Of Information Security, 5th
5th Edition
ISBN: 9781305949454
Author: Michael E. Whitman, Herbert J. Mattord
Publisher: Cengage Learning
expand_more
expand_more
format_list_bulleted
Question
Chapter 1, Problem 6E
Program Plan Intro
Security policy:
- A security policy defines an organization’s security requirements.
- It provides controls and consents needed for meeting requirements.
- A security policy is a well written document in an organization giving the guidelines to how to protect the organization from threats.
- It includes
computer security threats, and how to handle situations when they do occur. - A good security policy must identify all of a company's assets as well as all the potential threats to those assets.
- The employees of the company need to be kept updated on the company's security policies.
- The policies themselves should also be updated regularly.
Failure in identifying threats:
- The failure in identification of threats is a good sign.
- The detailed investigation of threats is required in this case.
- The threats may be in different fields shown below:
- Economic trends:
- It denotes research over economy in an area.
- The notion of economic shifts over market.
- Market trends:
- The change in market conditions.
- The new upcoming trends that may hurt the company.
- The amount of competition in market.
- Funding changes:
- It denotes decrease in grants annually.
- It checks whether this decrease may hurt company’s economy.
- Government regulations:
- It denotes checking of any new regulations that may hurt company.
- It may sense the kind of damage that can happen.
- Economic trends:
- After a detailed research over identification of threats, if nothing is been found then that may denote a positive escalation.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
List any 5 categories of threat with their corresponding attack examples.
Different answer then other post please.
Please find any article that relates to malware. Elaborate the attack and suggest a preventive effort that could have helped.
Chapter 1 Solutions
Lms Integrated For Mindtap Information Security, 1 Term (6 Months) Printed Access Card For Whitman/mattord's Management Of Information Security, 5th
Ch. 1 - Prob. 1RQCh. 1 - Prob. 2RQCh. 1 - Prob. 3RQCh. 1 - Prob. 4RQCh. 1 - Prob. 5RQCh. 1 - Prob. 6RQCh. 1 - Prob. 7RQCh. 1 - Prob. 8RQCh. 1 - Prob. 9RQCh. 1 - Prob. 10RQ
Ch. 1 - Prob. 11RQCh. 1 - Prob. 12RQCh. 1 - Prob. 13RQCh. 1 - Prob. 14RQCh. 1 - Prob. 15RQCh. 1 - Prob. 16RQCh. 1 - Prob. 17RQCh. 1 - Prob. 18RQCh. 1 - Prob. 19RQCh. 1 - Prob. 20RQCh. 1 - Assume that a security model is needed to protect...Ch. 1 - Prob. 2ECh. 1 - Prob. 3ECh. 1 - Prob. 4ECh. 1 - Prob. 6ECh. 1 - Prob. 1DQCh. 1 - Prob. 2DQCh. 1 - Prob. 1EDM
Knowledge Booster
Similar questions
- Explain the type of security attacks that can be performed by hackers, and determine the securitymechanisms to handle each attack!arrow_forwardIn addition to giving a definition of the term, can you provide some specific instances of how vulnerability might be measured?arrow_forwardCould you please explain the distinction between an attack and a threat?arrow_forward
- Please offer some historical background for the phrase "cybersecurity," as well as an explanation of what the term means and why it is relevant.arrow_forwardWhat may occur if you do NOT include the scope of the RA when defining it? attacks exploited threats losses missed deadlinesarrow_forwardDefine the terms "vulnerability" and "exposure."arrow_forward
arrow_back_ios
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Fundamentals of Information SystemsComputer ScienceISBN:9781337097536Author:Ralph Stair, George ReynoldsPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
- Principles of Information Security (MindTap Cours...Computer ScienceISBN:9781337102063Author:Michael E. Whitman, Herbert J. MattordPublisher:Cengage LearningPrinciples of Information Systems (MindTap Course...Computer ScienceISBN:9781285867168Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Fundamentals of Information Systems
Computer Science
ISBN:9781337097536
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning
Principles of Information Security (MindTap Cours...
Computer Science
ISBN:9781337102063
Author:Michael E. Whitman, Herbert J. Mattord
Publisher:Cengage Learning
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781285867168
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning