Question: Note: Please give your own answer and I will dislike. Thank you. As one of the STM IT Company' team. Negotiate with the risk assessment

Note: Please give your own answer and I will dislike. Thank you.

Note: Please give your own answer and I will dislike. Thank you.

As one of the STM IT Company' team. Negotiate with the risk assessment procedures and any integration with the risk management models To insure the reliability of the organization a data protection process and regulation must be understood by organization to insure that data is fairly, lawfully and transparently used. Your job is to specify how the data protection is used by organization. As one of the IT team, you are asked to resume the ISO 31000 risk management methodology and its application in IT security. Security audit is very important procedure that must be applied by organization. As one of the IT team you are asked to negotiate the possible impacts to organisational security from applying the security audit in the organization. Assume your manger asked you to examine how the IT security is connected with organizational policy. In your answer, you must show how misalignment of the organizational security may impact on the security of the organization. Note. That Mechanisms to control organizational IT security are mainly Risk assessment and integrated enterprise risk management, and Company regulations. You need to connect those two with policies in the organization then show the advantages and disadvantages of the alignment with organization's policies. Assume that you are the team member in STM Company. You are asked to outline a security policy for The STM. In your answer you need to explain first the policy concept, then the CIA triad that must be followed for make the policy. Afterward, the policy must mention the approved staff (how are allowed to read modify the data), the conditions of password creations, how STM employee will login in STM company, the changes that done in the firewall, how to measure the data breaches in data, and the physical security

Step by Step Solution

There are 3 Steps involved in it

1 Expert Approved Answer
Step: 1 Unlock blur-text-image
Question Has Been Solved by an Expert!

Get step-by-step solutions from verified subject matter experts

Step: 2 Unlock
Step: 3 Unlock

Students Have Also Explored These Related Databases Questions!