Question

The primary focus of information security is the balanced protection of the confidentiality, integrity, and availability...

The primary focus of information security is the balanced protection of the confidentiality, integrity, and availability of data while maintaining efficient policy implementation and without disrupting organizational productivity. What are some of the best ways to keep this balance? 400 words or more please

0 0
Add a comment Improve this question Transcribed image text
Answer #1

One of the best ways to keep this balance is by having an information security strategic plan. This kind of plan can help the employees & the management to focus their efforts in the right direction & also accomplishment of goals.

This plan can position an organization to mitigate, transfer, accept or avoid risk relating to people, process or technology. They also provide adequate steps to protect the confidentiality, integrity & information availability of the organization. The business benefit of the plan is to provide competitive advantage to the organization. These would include complying with industry standards, avoiding a damaging security incident, retaining the business reputation & supporting the commitment of the shareholders, customers, suppliers etc.

Drivers supporting the plan can include:

  • Defining consistent and integrated methodologies for design, development and implementation;
  • Detection & resolution of problems.
  • Reducing time to delivery from solution concept through implementation;
  • Provisioning flexible and adaptable architectures;
  • Proactively making decisions to more efficiently deliver results;
  • Elimination of redundancy to support the achievement of objectives in a better manner.
  • Planning on human resources management by relying on external expertise when there is requirement to augment the internal staff.
  • Evolving into an organization where security is integrated as seamlessly as possible with applications, data, processes and workflows into a unified environment.

A gap assessment of an organization’s current state and existing efforts is an important first step in establishing a security strategic plan. A documented information security program assessment against a defined standard such as ISO/IEC 27002 — especially when that standard is a part of the strategy — enables more efficient planning. Additional steps to building a policy include defining the vision, mission, strategy, initiatives and tasks to be completed so they enhance the existing information security program.

An information security strategic plan can be more effective when a holistic approach is adopted. This method requires the integration of people, process and technology dimensions of information security while ensuring it is risk-balanced and business-based. It requires a clear alignment between business and IT strategies. The better the alignment and integration to strategic decision-making, the easier it is to meet expectations and get the right things done in a prioritized order.

Executing a security strategic plan is a critical success factor for organizations that truly want to maximize their ability to manage information risk. Committing to this process takes resources and time. To be fully effective, security leaders need to be viewed as adding value to the business and IT strategic planning processes, focusing on how their strategy can enhance the business and help it succeed.

Student,

Please let me know if this is sufficient by inserting a comment rather than rating thumbs down. Thanks.

Add a comment
Know the answer?
Add Answer to:
The primary focus of information security is the balanced protection of the confidentiality, integrity, and availability...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • Which role has the PRIMARY responsibility for the documentation of control implementation? Systems security engineer Control...

    Which role has the PRIMARY responsibility for the documentation of control implementation? Systems security engineer Control assessor Information System Owner (ISO) Information Owner/Steward When making determinations regarding the adequacy of common controls for their respective systems, Information System Owner (ISO) refer to the Common Control Providers’ (CCP) Privacy Impact Assessment (PIA) Business Impact Analysis (BIA) Authorization Packages Vulnerability Scans An organization-wide approach to identifying common controls early in the Risk Management Framework (RMF) process does which of the following? Considers...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • EXERCISE 10-7 Creating a Balanced Scorecard LO10-4 Ariel Tax Services prepares tax returns for individual and corporat...

    EXERCISE 10-7 Creating a Balanced Scorecard LO10-4 Ariel Tax Services prepares tax returns for individual and corporate clients. As the company has gradually expanded to 10 offices, the founder Max Jacobs has begun to feel as though he is losing control of operations. In response to this concern, he has decided to implement a performance measurement system that will help control current operations and facilitate his plans of expanding to 20 offices. Jacobs describes the keys to the success of...

  • Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around...

    Risk management in Information Security today Everyday information security professionals are bombarded with marketing messages around risk and threat management, fostering an environment in which objectives seem clear: manage risk, manage threat, stop attacks, identify attackers. These objectives aren't wrong, but they are fundamentally misleading.In this session we'll examine the state of the information security industry in order to understand how the current climate fails to address the true needs of the business. We'll use those lessons as a foundation...

  • Article A Recent study of productivity in the workplace revealed that workers spend on average eight...

    Article A Recent study of productivity in the workplace revealed that workers spend on average eight percent of their workday doing nothing. This statistic takes on greater significance when we find that health problems impact employee productivity loss by an even greater percentage. In light of this discovery, a group of leading experts from the emerging field of health and productivity research argues that the expansion of health care benefits represents a substantial investment opportunity for employers. Health and Work...

  • TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for...

    TRUE/FALSE QUESTIONS:  Foundations of Information Security and Assurance 1. There is a problem anticipating and testing for all potential types of non-standard inputs that might be exploited by an attacker to subvert a program. 2. Without suitable synchronization of accesses it is possible that values may be corrupted, or changes lost, due to over-lapping access, use, and replacement of shared values. 3. The biggest change of the nature in Windows XP SP2 was to change all anonymous remote procedure call (RPC)...

  • Attached is the memo that was covered briefly in the lecture video from this week. Open...

    Attached is the memo that was covered briefly in the lecture video from this week. Open the attachment and read the memo. Then, write a better memo, using the principles you learned from the chapter and video (you may completely write a new memo, using information found in the memo.). Hint: a better memo would be MUCH shorter than the original. The key to writing a good memo in this case is to keep in mind how you would want...

  • Aflac Insurance Company InformatIon: Aflac is a Fortune 500 insurance company founded in 1955 by three...

    Aflac Insurance Company InformatIon: Aflac is a Fortune 500 insurance company founded in 1955 by three brothers, John, Paul and Bill Amos. Today, Aflac employs more than 4,500 people and has more than 71,000 licensed independent agents throughout the United States and Japan. The following is an excerpt from the New York Stock Exchange business summary. “Aflac Incorporated is a general business holding company and acts as a management company, overseeing the operations of its subsidiaries by providing management services...

  • A new version of the operating system is being planned for installation into your department’s production...

    A new version of the operating system is being planned for installation into your department’s production environment. What sort of testing would you recommend is done before your department goes live with the new version? Identify each type of testing and describe what is tested. Explain the rationale for performing each type of testing. [ your answer goes here ] Would the amount of testing and types of testing to be done be different if you were installing a security...

  • Zara Organizational Structure Structure relates to a skeletal framework of activities and process...

    Zara Organizational Structure Structure relates to a skeletal framework of activities and processes in an organisation and specifies the roles of these in achieving goals and objectives of the organisation. According to (Mullins, 2009), a good structure is highly important due to the fact that decisions on structure are primary strategic decisions which can make or break an organisation. One important aspect of a good structure is the human element. Organisation structure should be designed so as to encourage employees...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT