Explore BrainMass
Share

Information Security Policies / Contingency Planning

This content was STOLEN from BrainMass.com - View the original, and get the already-completed solution here!

This solution provides the learner with an understanding of management's role in the development and enforcement of information security policies, standards, practices, procedures and guidelines. In particular, the solution describes how an organization institutionalizes policies, standards, and practices using education, training, and awareness. Further, this solution explains the concept of contingency planning and how contingency planning is related to incident response planning, disaster recovery planning, and business continuity planning.

© BrainMass Inc. brainmass.com October 16, 2018, 9:35 pm ad1c9bdddf
https://brainmass.com/computer-science/operating-systems/information-security-policies-contingency-planning-190255

Solution Preview

Management's responsibility goes beyond the basics of support. It is not enough just to bless the information security program; management must own up to the program by becoming a part of the process. Becoming part of the process involves showing leadership in the same manner that managers show leadership in other aspects of the organization.

Management has specific goals for the organization, and most security and information system professionals are not in the position to understand or appreciate these nuances. Because security is not something that can be wrapped into a package and ...

Solution Summary

This solution provides the learner with an understanding of management's role in the development and enforcement of information security policies, standards, practices, procedures and guidelines. In particular, the solution describes how an organization institutionalizes policies, standards, and practices using education, training, and awareness. Further, this solution explains the concept of contingency planning and how contingency planning is related to incident response planning, disaster recovery planning, and business continuity planning.

$2.19
Similar Posting

Other than hardware, what other considerations must an organization look at when setting their security policies?

View Full Posting Details