21 Aug IT Security Policies
Answer all Eight (8) questions.
· Submission Requirements
ü All sentences must be grammatically correct, and free from spelling errors.
ü Your answer for each question should not exceed 250 words.
ü Submit a Single Microsoft Word Document.
ü Font: Times New Roman, Size 12, Double-Space.
ü Cite all references used in APA format.
1. What is the purpose of defining a framework for IT security policies?
2. Why should an organization have a remote access policy even if it already has an acceptable use policy (AUP) for employees?
3. What security controls can be implemented on your e-mail system to help prevent rogue or malicious software disguised as URL links or e-mail attachments from attacking the workstation domain? What kind of policy definition should you use?
4. Why should an organization have annual security awareness training that includes an overview of the organization’s policies?
5. Consider the following real world situation:
A retired Japanese Coast Guard boat (Takachiho) was sold to a pro-North Korean organization without having assurances that navigational data was deleted. The decommissioned patrol boat could have had as many as 6,000 locations recorded over the 250 days of use. The boat was presumably sold to be turned into scrap. Weapons and radio equipment were removed, but no procedures were in place to ensure that navigational data was securely deleted. It is unknown if navigational data were recovered from vessels disposed of through past sales (Muncaster, 2013).
- Why was the navigational data on the Japanese Coast Guard vessel not securely deleted?
- How could the lost navigational data compromise national security?
- How could the Japanese Coast Guard write an effective data disposal policy?
- Is a self-assessment of effective security policy a good predictor of actual security? Why or why not?
6. What is meant by Governance Framework? Why is ISO 27000 certification more attractive to companies than COSO or COBIT certification?
7. Locate and read NIST SP 800-53 Revision 4. What are the key benefits of this standard?
8. In your opinion, is the COBIT framework superior to the other standards and frameworks such as the ISO 27000 and NIST? Why or Why not?
References
Muncaster, P. (2013, April). Japan forgot data wipe on ship sold to Pyongyang. Retrieved September 18,
2014, from http://www.theregister.co.uk/2013/04/29/japan_coast_guard_forgets_wipe_data_norks/
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
About Wridemy
We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.
How It Works
To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Are there Discounts?
All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.
