Complete both parts in one document1:Data GovernanceReview the Data Governance Institute's framework and apply this to information security. What are the key considerations when comparing it with the CISSP views ?Please give a brief response, between 1 and 2 pages, which provides an understanding between the organization and the security specialists within a medium-sized organization so that you can propose solutions for security threats. 2: Appraise and Improve a Security PolicyYou are the CIO of Fly-by-Night Doodads Company. Your accounting department maintains a list of customers' credit card numbers for repeat orders on an un-encrypted shared network folder with read/write access granted only to the accounting department.One day, everyone in accounting calls out sick and there are critical orders that you have a contractual need to fill. Unfortunately, your overseas client is not in the office due to a national holiday and cannot be reached to provide the credit card number again. Your CEO asks you to call one of the accounting folks at home and get his or her password to gain access to the stored credit card numbers.In a concise email, prepare a response to the CEO in which you explain the following:Whether or not it would be prudent (with justification) to carry out the request.If it would not be prudent, offer another solution that would still get the job done.Suggestions on a new policy, training, or guidance that would help prevent this issue in the future.
0 comments:
Post a Comment