Developing IT Security Policy: Management Policies and Plans
10 Questions
2 Views

Choose a study mode

Play Quiz
Study Flashcards
Spaced Repetition
Chat to lesson

Podcast

Play an AI-generated podcast conversation about this lesson

Questions and Answers

What are the key considerations when developing a security plan?

Who generates and controls the information, existing policies, possible enhancements, acceptable risk levels, and the cost of potential risks.

What is the purpose of developing an implementation plan for security?

To outline the action steps for achieving security plan goals and to determine the necessary tools, technologies, policies, and procedures.

What is the role of the Security Organization Team in implementing the security plan?

To educate and train users, keep management aware of security threats, maintain the chosen security tools, and administer access controls, authentication procedures, and authorization policies.

What is the purpose of performing an MIS audit in the context of security?

<p>To examine the firm's overall security environment, review technologies, procedures, documentation, training, and personnel, and assess control weaknesses and their potential impact.</p> Signup and view all the answers

Give an example of an authorization management system and its purpose.

<p>An example can be found at <a href="https://www.novell.com/documentation/password_management31/">https://www.novell.com/documentation/password_management31/</a> and its purpose is to determine different levels of access to information for different users.</p> Signup and view all the answers

What are the steps involved in building an IT Security Plan?

<p>Risk Assessment, Develop an IT Security Policy, Security Audit, Create a Security Organization, Implementation Plan</p> Signup and view all the answers

What is the first step in performing a Risk Assessment for a security plan?

<p>Inventory the assets related to information and knowledge</p> Signup and view all the answers

What is the second step in performing a Risk Assessment for a security plan?

<p>Estimate the value of money involved for each asset, and the value of probability of the loss occurring</p> Signup and view all the answers

What does a Security Policy prioritize and identify?

<p>Prioritizes information risks, identifies acceptable risk targets, and identifies the mechanisms for achieving targets</p> Signup and view all the answers

What are the nature of the risks that firms must cover in their corporate IT policy?

<p>The nature of the risks, the information assets to protect, procedures to address the risk, implementation, and auditing mechanism</p> Signup and view all the answers

More Like This

Use Quizgecko on...
Browser
Browser