Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Question 1 Search online for the security policy of an organization or company. Evaluate that security policy: How well does it cover the objectives and

Question 1

Search online for the security policy of an organization or company.

Evaluate that security policy:

How well does it cover the objectives and content of information security policy presented in the course:

What's good? What needs to be developed, what is missing? What questions arose?

What picture does the information security policy give of the level of information security and information security operations of the company/organization?

What things increased confidence in the level of information security

Was there something that reduced trust in the level of security

Add a link to the security policy used in your response.

Question 2

The company has conducted an information security audit of its information systems and identified the integrity of customer and financial data files as an object to be protected..

Make a risk analysis for that vulnerability and consider at least two possible threats/risks. The risk analysis should include the following steps: risk identification, risk analysis, risk evaluation. Include also the recommendations for the risk treatment.

You can apply the example of risk assessment report table presented in the lecture for the answer (the method of presentation can be other than a table).

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Algorithm Design And Applications

Authors: Michael T. Goodrich, Roberto Tamassia

1st Edition

1118335910, 978-1118335918

More Books

Students also viewed these Algorithms questions