logo

Information Security and Governance: Part A Report

   

Added on  2023-01-13

10 Pages2346 Words40 Views
Running head: PART A REPORT
Information Security and Governance: Part A Report
Name of the Student
Name of the University
Author’s Note:

1
PART A REPORT
Table of Contents
Part A: Report............................................................................................................................2
1. Discussion on Benefits that are derived from the Security Management as the ongoing
procedure as well as Reasons to have a Security Program Policy.........................................2
2. Developing a Proper Security Policy as well as Security Management Plan....................3
3. Identifying the major Functionalities, Tasks, Responsibilities and Roles for Security
Management Program for PIA as well as Roles of the Various Groups or Individuals in
Governance............................................................................................................................4
4. Identifying Major Methods and Models for Developing Security Management Program 5
5. Discussing Implications of Legal and Statutory Requirements and Major Advantages of
the Formal Approach..............................................................................................................6
Summary....................................................................................................................................7
References..................................................................................................................................8

2
PART A REPORT
Part A: Report
1. Discussion on Benefits that are derived from the Security Management as the ongoing
procedure as well as Reasons to have a Security Program Policy
Some of the most important and significant advantages that could be derived from the
security management program as an ongoing procedure are given below:
i) Helps to Protect and Secure Every Form of Information: All the significant forms
of confidential information would be secured and protected for Power AI (Flores, Antonsen
and Ekstedt 2014).
ii) Increments Cyber Attack Resilience: This is the second significant advantage of
security management program. It helps in incrementing the cyber attack resilience.
iii) Provides Framework for Keeping Organizational Information Protected: The
security management program eventually provides a proper and subsequent framework for
effectively keeping all types of organizational information protected.
iv) Reducing Expenses: The ICT security management program would be reducing
the major expenses for information security.
There are some of the most significant reasons to have a proper policy and these
reasons are given below:
i) Protecting CIA of Information: CIA or confidentiality, integrity and availability of
the confidential information could be easily and promptly secured with a collection of
technical as well as physical controls and this is important for the organization (Whitman and
Mattord 2014).

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Security Management and Governance
|14
|3130
|34

Security Management and Governance
|10
|2029
|100

Security Management and Governance
|17
|3817
|35

Information Security Management and Governance
|10
|1280
|151

Cyber Security CIA: Confidentiality, Integrity, and Availability
|10
|2334
|49

IT Risk Management: Cyber Security
|20
|4610
|231