Objectives: 1. Key concepts of Information Assurance Course Learning Outcomes: 1. Student will be able to understand Des

Business, Finance, Economics, Accounting, Operations Management, Computer Science, Electrical Engineering, Mechanical Engineering, Civil Engineering, Chemical Engineering, Algebra, Precalculus, Statistics and Probabilty, Advanced Math, Physics, Chemistry, Biology, Nursing, Psychology, Certifications, Tests, Prep, and more.
Post Reply
answerhappygod
Site Admin
Posts: 899603
Joined: Mon Aug 02, 2021 8:13 am

Objectives: 1. Key concepts of Information Assurance Course Learning Outcomes: 1. Student will be able to understand Des

Post by answerhappygod »

Objectives: 1. Key concepts of Information Assurance Course
Learning Outcomes: 1. Student will be able to understand Design
Information Assurance Policies Tools or Equipment Needed: 1. PC 2.
Internet explorer or chrome 3. Internet Theoretical Background:
Information security management (ISM) describes controls that an
organization needs to implement to ensure that it is sensibly
managing these risks. The risks to these assets can be calculated
by analysis of the following issues: • Threats to your assets:
These are unwanted events that could cause the deliberate or
accidental loss, damage or misuse of the assets • Vulnerabilities:
How susceptible your assets are to attack • Impact: The magnitude
of the potential loss or the seriousness of the event. Components
of Information Security: 1. Conduct the business impact analysis
(BIA). The BIA helps identify and prioritize information systems
and components critical to supporting the organization’s
mission/business functions. 2. Risk Mitigation. Explain the
importance. 3. Develop an information system contingency plan. The
contingency plan should contain detailed guidance and procedures
for restoring a damaged system unique to the system’s security
impact level and recovery requirements. 5. Ensure plan maintenance.
The plan should be a living document that is updated regularly to
remain current with system enhancements and organizational changes.
Lab Manual No. 3 | Page 3 Lab Exercise 4: As an Information
Security Architect your task is to demonstrate the “Principles of
Information Security Governance ”, this should include the below
requirements. Address each requirement in detail, it should cover
the entire lifecycle of the below requirements. Also identify
relevant diagrams and presentation for your work. 1. Information
Security Governance Best Practices 2. Why Information Security
Governance is Needed 3. Roles and Responsibilities
Join a community of subject matter experts. Register for FREE to view solutions, replies, and use search function. Request answer by replying!
Post Reply