Sunday, March 10, 2019
Security and Mission Statement
Chapter 2 Due sequence 20 March 2012 1. What is Mission statement? wherefore is it important? What does it engage? Mission statement is a sentence that describes your administrations functions, markets, products/ run and advantages. Mission statement elucidates your line of descent, your goals and your objectives. It is used as a constant monitor lizard of why the company exists. Organizations tend to forget about the purpose of their strain after some time. Mission statement is important because it is used as a reminder of why the line of work exists.Read thisChapter 2 Why Security is NeededIt directs organizations to the initial course of their business as for many companies when the business is growing they tend to get lost and pursue something totally opposite from their business. Mission statement reflects every feature of your business. The type of product or service you offer, market position, quality of product or service, customers and more. Eg) Mission for McDonal ds is to be their customers favourite place to be and way to eat. McD exist because of their customers thats why they demonstrate appreciation by providing them with quality and a serious service in a clean, welcoming environment at a great value. . What is the primary objective of the secSDLC? What are its schooling steps, and what are the major objectives of each? secSDLC is a formal approach to solving problem exploitation a structured sequence of procedures to create inclusive security posture. investigation Management give directions by specifying the goals, processes and the expected outcomes of the project and the costs of the project. At the end of that anatomy you must have a feasibility study document. Analysis The analysis in the secSDLC is when project manager or the team analys the existing security policies, identifying current threats nd attacks and also Identifying, assessing and evaluating level of pretend within the organizations security. Logical Design This portray is when security blue print is developed and created and the feasibility study is also developed. Physical Design This phase is when the existing physical technology is evaluated and the new physical technology is evaluated also. alternating(a) solutions are generated and a final design is agreed upon. Implementation This stage is when the security solutions are tested and implemented and tested. Personnel issues are evaluated and homework is provided.Security solution are then packaged and sent to management for approval. aid After the Information security solutions are implemented they need to be continually tested, monitored and properly managed by means of established procedures. 3. What question may be asked to help identify and classify reading assets? Which is the around useful question in the list? Which information asset is most minute to the success of the organization? Which information asset generates the most revenue? Which information asset generates the most profitability? Which information asset would be the most pricy to replace? Which information asset would be the most expensive to protect? Which information asset would be most embarrassing or cause the greatest liability if revealed? The most useful question in the list is which information asset is most diminutive to the success of the organization? This question reflects to the mission statement of the organization. By saying the most critical asset to the success of the organization meaning if that asset breaks or it becomes dispatch the business stops.Eg) For a retail company say for arguments sake we have the work points, HR department, Accounts, Stalk etc. The till points are the most critical part of the organization because if the system is blue and the tills are not working it means that there is not business for that company for that day until they fix the problem. 4. What term is used to describe the hold back measure that reduces security incidents amongs t member of organization by familiarizing them with germane(predicate) policies and practises in an ongoing manner? SETA Program .
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment