EBK MANAGEMENT OF INFORMATION SECURITY
6th Edition
ISBN: 9780357752869
Author: WHITMAN
Publisher: CENGAGE CO
expand_more
expand_more
format_list_bulleted
Question
Chapter 7, Problem 1EDM
Program Plan Intro
Code of ethics:
- The “ethics” word comes from the Greek term “duty”.
- The code of ethics means all the responsibilities that professional must respect when carrying out their work.
- It also contains the core value of the work and the behavior which should be adopted.
Example:
Professional and confidentiality secrecy are responsibilities contained in the code of ethics and conduct in numerous professions like accountants, lawyers, doctors and journalists.
Intent of the code of ethics:
- The intent of the code of ethics established by a professional order as a way to safeguard public and the status of the professionals.
- The employee who breach their code of ethics suffer disciplinary actions that can range from a warning or rebuke to dismissal or ejection from their professional order.
Privacy policy:
- A privacy policy denotes a statement that discloses some or all ways an organization would gather, use, disclose and manage data of customers as well as clients.
- It fulfills a legal requirement for protecting privacy of customers as well as clients.
- Personal information denotes anything that could be used to identify an individual.
- It represents a generalized treatment that tends to be more specific and detailed.
- The exact content of certain privacy policy will depend upon applicable law and need to address requirements across all boundaries.
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
As of the time of writing, Damon Davis was completing out the paperwork for Drano Plumbing. He estimated a $50,000 net profit would be made. He counted the columns of the balance sheet and knew how much was in the credit column ($300,000) and how much was in the negative column ($400,000). What, in your opinion, was the most plausible reason for the discrepancy in the results? What should he do next to identify the issue's cause if this wasn't the cause of the issue?
Plot the six risks on a probability/impact matrix. Also assign a numeric value for the probability and impact of each risk on meeting the main project objective. Use a scale of 1 to 10 in assigning the values, with 1 representing the lowest values. For a simple risk factor calculation, multiply the probability score and the impact score. Add a column called Risk Score to your risk register to the right of the impact column. Enter the new data in the risk register. Write your rationale for how you determined the scores for one of the negative risks and one of the positive risks.
Consider the following hypothetical scenario: When you attempted to explain weighted assessment models to a manager, she replied by asking you, "What's a weighted evaluation model?" "In the process of determining the relative value of many things, how do you decide which ones should take precedence? Is it simply my best guess?" In response, what would you say to that?
Chapter 7 Solutions
EBK MANAGEMENT OF INFORMATION SECURITY
Ch. 7 - Prob. 1RQCh. 7 - Prob. 2RQCh. 7 - Prob. 3RQCh. 7 - Prob. 4RQCh. 7 - Prob. 5RQCh. 7 - Prob. 6RQCh. 7 - Prob. 7RQCh. 7 - Prob. 8RQCh. 7 - Prob. 9RQCh. 7 - Prob. 10RQ
Ch. 7 - Prob. 11RQCh. 7 - Prob. 12RQCh. 7 - Prob. 13RQCh. 7 - Prob. 14RQCh. 7 - Prob. 15RQCh. 7 - Prob. 16RQCh. 7 - Prob. 17RQCh. 7 - Prob. 18RQCh. 7 - Prob. 19RQCh. 7 - Prob. 20RQCh. 7 - Prob. 1ECh. 7 - Prob. 2ECh. 7 - Prob. 3ECh. 7 - Prob. 4ECh. 7 - Prob. 5ECh. 7 - Prob. 6ECh. 7 - Prob. 7ECh. 7 - Prob. 1DQCh. 7 - Prob. 2DQCh. 7 - Prob. 1EDM
Knowledge Booster
Similar questions
- It is very critical to consider when PIP ends and when analysis begins. * True Falsearrow_forwardTake into consideration the following possibility: You made an effort to educate a manager on the concept of weighted evaluation models, and she responded to your explanation by asking for more information "So how exactly do you go about figuring out which factors carry more weight? Is it just a subjective estimate on my part?" In response to that question, what would you say?arrow_forwardWhy should the grant be handled by the management role rather than the user, let's say Satoshi, when a manager, let's say Satoshi, grants an authorization? Describe your thinking.arrow_forward
- It is not a one-to-one, one-to-many, or many-to-many relationship. There is no crowfoot on the ER diagram related to this table. However, there IS a relationship depicted in the ER diagram between the PROMOTION and the BOOKS tables. What kind of relationships do you think it is?arrow_forwardExplain this diagram in terms of proper and improper handoff.arrow_forwardA derived attribute can be stored in a table or calculated on each occasion that it is required. An example of a derived attribute is your Grade Point Average which is calculated by adding together a score for each unit (e.g., HD=4, D=3, C=2, P=1, N=0) and dividing that by the number of units you have completed. Explain how the decision as to whether the Grade Point Average would be stored in a table or calculated would be made. You are administering a database in a large retail company that records sales at each of the company’s stores. Tuning the database to improve performance by adding indexes and optimising query execution is an important ongoing aspect of the physical database design. Which attributes in a database such as this (apart from the primary key) are likely to BENEFIT from being indexed? Which attributes would you generally avoid indexing, and why?arrow_forward
- Think about the following case: Weighted evaluation models: you tried to describe them to a manager, who responded with "What's that?" "So, how do you go about calculating the relative importance of the variables? Is it simply my own personal guess?" In answer, what would you say?arrow_forwardPlease provide explicit examples of how calls and returns fit into the overall plan.arrow_forwardSuppose you tried to explain the concept of weighted evaluation models to a manager, and she responded by asking, “So, how do you set the weight factors? Is it just a subjective guess?” How should you reply? Explain in good detail.arrow_forward
- What is multiple issue? Write any two approaches.arrow_forwardThink about the following case: When you tried to explain weighted assessment models to a manager, she responded with, "What's a weighted evaluation model?" "When calculating the relative importance of items, how do you choose which ones to prioritize? Is it just my best guess?" In answer, what would you say?arrow_forwardPerform the following activities as part of the assignment • Read the case study at the end of Chapter 5, (which I will include below). You should use the 4 questions for the case study as a guide to the following: • Add new resort use case • Add book reservation use case • Activity diagrams • Sequence diagrams CRUD analysis. • Remember tables and diagrams always need a narrative to elaborate on them. This is what makes your document a narrative business document and not just a list of facts and ideas. Here is the case study. The Spring Breaks 'R' Us Travel Service The SBRU information system includes four subsys- they only plan to provide some design specifications and tems: Resort relations, Student booking, Accounting guidelines to each resort. The resort will be responsible and finance, and Social networking. The first three for connecting to the Internet and for providing a secur are purely Web applications, so access to those occurs wireless environment for the students.…arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,A Guide to SQLComputer ScienceISBN:9781111527273Author:Philip J. PrattPublisher:Course Technology PtrCOMPREHENSIVE MICROSOFT OFFICE 365 EXCEComputer ScienceISBN:9780357392676Author:FREUND, StevenPublisher:CENGAGE L
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
A Guide to SQL
Computer Science
ISBN:9781111527273
Author:Philip J. Pratt
Publisher:Course Technology Ptr
COMPREHENSIVE MICROSOFT OFFICE 365 EXCE
Computer Science
ISBN:9780357392676
Author:FREUND, Steven
Publisher:CENGAGE L