Share
Explore BrainMass

Information Security

I would like some guidance and assistance with the following questions. Thank you!

Information Security is an expensive and difficult undertaking at best. Where would a CIO draw the line on what is sufficient and what steps should be taken to determine where that line is?

Of the several of the types of security threats to IT what measures can be taken as a CIO to eliminate or reduce them.

Access controls are good things and should be secure, but programmers continually add "backdoor access" to their programs. Is a good or a bad practice?

The government is continually making new laws regarding security controls. Is this a good or bad practice?

Solution Preview

Information Security is an expensive and difficult undertaking at best. Where would a CIO draw the line on what is sufficient and what steps should be taken to determine where that line is?

A CIO would draw the line on what is sufficient by conducting a cost benefit analysis of the expenditure on implementing information security systems. The CIO will evaluate the potential benefits associated with different level of costs and combine it with other factors, such as best practices followed in the industry, impact of security ...

Solution Summary

This solution discusses aspects of information security and assists with the questions provided below.

$2.19