Question: 5a. The author mentions the five information security objectives frameworks: 1. Security architecture SABSA 2. CobiT 3. Capability Maturity Model 4. ISO/IEC 27001, 27002 5.
| 5a. | The author mentions the five information security objectives frameworks: 1. Security architecture SABSA 2. CobiT 3. Capability Maturity Model 4. ISO/IEC 27001, 27002 5. National Cyber Security Summit Task Force Corporate Governance Framework Describe the current state of security using two of the five frameworks listed above. Express the objectives and matrices that should be used to evaluate the status of the organization. |
| 5b. | Research the use of gap analysis to mitigate risk in the context of information security. Explain how to conduct the gap analysis for risk mitigation, indicate what should be measured and suggest how to implement the results (Hint: what new governance processes can result? risk appetite, risk ownership, oversight, and risk culture) *Articulate your answer in a logical manner. Provide academic and industry sources to support your answer. |
| 5c. | Explain in your own words what attributes to information security strategy failure, provide one example of an organization that failed. |
| 5d. | Express in your own words what attributes to information security strategy success, provide one example of an organization that succeeded. List resources available and best practices for successful implementation. *Provide specific examples rather than a generic/vague answer. |
| 5e. | Explain in your own words strategic contains across the three categories (direct, consequential, and peripheral), provide two examples for each category. Also, provide five examples for each category of contextual and operational constrains. |
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
