Answered step by step
Verified Expert Solution
Question
1 Approved Answer
Note: Please give your own answer and I will dislike. Thank you. As one of the STM IT Company' team. Negotiate with the risk assessment
Note: Please give your own answer and I will dislike. Thank you.
As one of the STM IT Company' team. Negotiate with the risk assessment procedures and any integration with the risk management models To insure the reliability of the organization a data protection process and regulation must be understood by organization to insure that data is fairly, lawfully and transparently used. Your job is to specify how the data protection is used by organization. As one of the IT team, you are asked to resume the ISO 31000 risk management methodology and its application in IT security. Security audit is very important procedure that must be applied by organization. As one of the IT team you are asked to negotiate the possible impacts to organisational security from applying the security audit in the organization. Assume your manger asked you to examine how the IT security is connected with organizational policy. In your answer, you must show how misalignment of the organizational security may impact on the security of the organization. Note. That Mechanisms to control organizational IT security are mainly Risk assessment and integrated enterprise risk management, and Company regulations. You need to connect those two with policies in the organization then show the advantages and disadvantages of the alignment with organization's policies. Assume that you are the team member in STM Company. You are asked to outline a security policy for The STM. In your answer you need to explain first the policy concept, then the CIA triad that must be followed for make the policy. Afterward, the policy must mention the approved staff (how are allowed to read modify the data), the conditions of password creations, how STM employee will login in STM company, the changes that done in the firewall, how to measure the data breaches in data, and the physical securityStep by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started