Thursday, October 24, 2019
Security and Mission Statement
Chapter: 2 Due date: 20 March 2012 1. What is Mission statement? Why is it important? What does it contain? â⬠¢Mission statement is a sentence that describes your organizationââ¬â¢s functions, markets, products/services and advantages. Mission statement elucidates your business, your goals and your objectives. It is used as a constant reminder of why the company exists. â⬠¢Organizations tend to forget about the purpose of their business after some time. Mission statement is important because it is used as a reminder of why the business exists. Read thisà Chapter 2 ââ¬â Why Security is NeededIt directs organizations to the initial course of their business as for many companies when the business is growing they tend to get lost and pursue something totally different from their business. â⬠¢Mission statement reflects every feature of your business. The type of product or service you offer, market position, quality of product or service, customers and more. Eg) Mission for McDonaldââ¬â¢s is to be their customersââ¬â¢ favourite place to be and way to eat. McD exist because of their customers thatââ¬â¢s why they demonstrate appreciation by providing them with quality and a good service in a clean, welcoming environment at a great value. . What is the primary objective of the secSDLC? What are its major steps, and what are the major objectives of each? â⬠¢secSDLC is a formal approach to solving problem using a structured sequence of procedures to create inclusive security posture. â⬠¢Investigation: Mana gement give directions by specifying the goals, processes and the expected outcomes of the project and the costs of the project. At the end of that phase you must have a feasibility study document. â⬠¢Analysis: The analysis in the secSDLC is when project manager or the team analys the existing security policies, identifying current threats nd attacks and also Identifying, assessing and evaluating level of risk within the organizations security. â⬠¢Logical Design: This stage is when security blue print is developed and created and the feasibility study is also developed. â⬠¢Physical Design: This phase is when the existing physical technology is evaluated and the new physical technology is evaluated also. Alternative solutions are generated and a final design is agreed upon. â⬠¢Implementation: This stage is when the security solutions are tested and implemented and tested. Personnel issues are evaluated and training is provided.Security solution are then packaged and s ent to management for approval. â⬠¢Maintenance: After the Information security solutions are implemented they need to be continually tested, monitored and properly managed by means of established procedures. 3. What question may be asked to help identify and classify information assets? Which is the most useful question in the list? â⬠¢Which information asset is most critical to the success of the organization? â⬠¢Which information asset generates the most revenue? â⬠¢Which information asset generates the most profitability? Which information asset would be the most expensive to replace? â⬠¢Which information asset would be the most expensive to protect? â⬠¢Which information asset would be most embarrassing or cause the greatest liability if revealed? The most useful question in the list is which information asset is most critical to the success of the organization? This question reflects to the mission statement of the organization. By saying the most ââ¬Å" critical assetâ⬠to the success of the organization meaning if that asset breaks or it becomes absent the business stops.Eg) For a retail company say for argumentââ¬â¢s sake we have the till points, HR department, Accounts, Stalk etc. The till points are the most critical part of the organization because if the system is down and the tills are not working it means that there is not business for that company for that day until they fix the problem. 4. What term is used to describe the control measure that reduces security incidents amongst member of organization by familiarizing them with relevant policies and practises in an ongoing manner? â⬠¢SETA Program .
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment
Note: Only a member of this blog may post a comment.