Describe three steps required for an organization to develop and information-centric security strategy

What will be an ideal response?

Any combination of the following.
1. Create and communicate an enterprise software security framework: The roles, functions, responsibilities, operating procedures, and metrics to deal with security threats and attacks must be clearly defined and communicated to all involved staffs.
2. Knowledge management training: To create a culture for enforcing IT security, an organization should improve the security knowledge of its IT staff and community of users: security policy, standards, design and attack patterns, threat models, etc.
3. Secure the information infrastructure: Along the IT-enabled business process or workflow, security checks using external programs should be identified to allow for monitoring and controls.
4. Assure internal security policy and external regulator compliance: The organization should make sure that, based on IT risk assessment, security requirements are translated into features of the software design to resist attack.
5. Governance: In any project that involves security, security experts must be called upon to participate in the design and implementation process of the system development or maintenance. Proper procedures should be clearly defined before any security breach occurs.

Business

You might also like to view...

______ are probably the most visible statements of ethical philosophy and beliefs for a company, business, or organization.

A. Ethical principles B. Codes of conduct C. Moral principles D. Morality codes

Business

In the context of doing business with people from other cultures, effective communicators ________

A) memorize a list of cultural difference between countries B) are ready to adapt to different cultural needs C) ignore cultural differences and treat everyone equally D) treat others as they would like to be treated E) follow exclusively the communication conventions of their own culture

Business