Question

What constitutes a security policy framework? Discuss the elements of this summary, what elements are essential,...

What constitutes a security policy framework? Discuss the elements of this summary, what elements are essential, and which elements could be optional. It is imperative that the summary should have a professional look and should be precise.

0 0
Add a comment Improve this question Transcribed image text
Answer #1

Security policy framework consists of the policies for security for different organisational components like physical security, systems safety, roles and responsibilities of the stakeholders including employees, standards for compliance , procedures to follow for implementation of security policy framework and training of the team members and employees.

Security framework policy includes defining its scope by including the different parts covered through the security policy. The organisational components include the access to the premises, identification of employees, maintaining control over entry and exit, safety of employees. The systems part covered through systems policy framework include the software and hardware of the business to avoid any risk or harm and measures to be taken for maintaining control and safety. The standards to be followed for such safety measures are also necessary to be defined so that they can be reviewed for their effectiveness. The procedures in implementation of security policy help stakeholders and employees to implement the security policy. Roles and responsibilities of the team members is optional to be defined in security policy framework as it can develop as per the need and different issues faced by the organisation for security of its systems and assets. Training of employees is also optional as the security monitoring, control and implementation can be outsourced to a third party based on their capabilities and experience with proper agreement and goals defined. It can release the important resources and can involve impartial review of the organisational security shared with different stakeholders.

Add a comment
Know the answer?
Add Answer to:
What constitutes a security policy framework? Discuss the elements of this summary, what elements are essential,...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • What impact does maturity have on an organization's security policy framework and information security governance?

    What impact does maturity have on an organization's security policy framework and information security governance?

  • I want to discuss the FASB's conceptual framework. Let's start with this: what is the FASB's...

    I want to discuss the FASB's conceptual framework. Let's start with this: what is the FASB's conceptual framework? Why should we care? What specific items are in this framework that might be of use to us as practitioners? what specifically within the framework might be of use to us as practitioners? Pei mentioned SFAC 8 -- anything else as we let our eyes run through the various sections of the framework? I would like for us to look at Concept...

  • QUESTION 1 (30) Define, discuss and develop an Information Security Policy with all its elements. QUESTION...

    QUESTION 1 (30) Define, discuss and develop an Information Security Policy with all its elements. QUESTION 2 (30) Online payment systems for consumer electronic commerce are still evolving. Online businesses must offer their customers payment options that are safe, convenient, and widely accepted. Discuss some of the online payment methods these businesses offer.

  • Physical Security we will survey the security issues identified with the offices, that is, the framework...

    Physical Security we will survey the security issues identified with the offices, that is, the framework and utilities we requirement for our business, and how we can continue giving them at the same quality with no interference. It's implied that you ought to begin with an all around outlined occurrence reaction, calamity recuperation, and business congruity arrangement. In the event that you review the discourses from the security arranging module (part 4), excess is the catchphrase in all answers for...

  • Please choose 5 questions from 20 and answer them. 1. How can a security framework assist...

    Please choose 5 questions from 20 and answer them. 1. How can a security framework assist in the design and implementation of a security infrastructure? What is information security governance? Who in the organization should plan for it? 2. Where can a security administrator find information on established security frameworks? 3. What is the ISO 27000 series of standards? Which individual standards make up the series? 4. What are the issues associated with adopting a formal framework or model? 5....

  • Research the IT security policy used by your university or by some other organization you are...

    Research the IT security policy used by your university or by some other organization you are associated with. Identify which of the topics listed in Section 14.2 this policy addresses. If possible, identify any legal or regulatory requirements that apply to the organization. Do you believe the policy appropriately addresses all relevant issues? Are there any topics the policy should address but does not? [Note;  if you are unable to have direct access to an organization try to look one up...

  • If an organization is going to have a chance at a successful security program they need...

    If an organization is going to have a chance at a successful security program they need to develop policies that provide direction for all security efforts and guide the conduct of the users. These policies need to be well written to provide the organization with solid guidance to support their security objectives. Identify and briefly describe the three types of security policies. Your response should include a discussion of where each should be used. Where should policy writers look to...

  • Technology is constantly changing. It is essential to safeguard privacy, security and confidentiality in an ever-expanding mobile society. Select a mobile health IT application/program and submit for...

    Technology is constantly changing. It is essential to safeguard privacy, security and confidentiality in an ever-expanding mobile society. Select a mobile health IT application/program and submit for approval on the announcement board by June 16. Applications/Programs cannot be duplicated and are first come/first served. For your discussion post, discuss what you find in terms of privacy, security and confidentiality. Your post should be a minimum of 250 words and have all work use cited using APA format. Respond to (2)...

  • The discussion: 150 -200 words. Auditing We know that computer security audits are important in business....

    The discussion: 150 -200 words. Auditing We know that computer security audits are important in business. However, let’s think about the types of audits that need to be performed and the frequency of these audits. Create a timeline that occurs during the fiscal year of audits that should occur and “who” should conduct the audits? Are they internal individuals, system administrators, internal accountants, external accountants, or others? Let me start you: (my timeline is wrong but you should use some...

  • Using the framework in Table 6.1, explain which of the theories relate to Taiwan’s trade policy...

    Using the framework in Table 6.1, explain which of the theories relate to Taiwan’s trade policy during each of the eras described in the case. A check mark indicates that a theory of trade concerns itself with the question asked at the head of the column; if there’s a dash, it doesn’t. In the last four columns, you can see how each theory responds to the specific question; again, a dash indicates that the theory does not address the question....

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT