logo

Security Management and Governance

   

Added on  2023-01-13

14 Pages3130 Words34 Views
Running head: SECURITY MANAGEMENT AND GOVERNANCE
Security Management and Governance
Name of the Student
Name of the University
Author’s Note:
Security Management and Governance_1
1
SECURITY MANAGEMENT AND GOVERNANCE
Executive Summary
The main aim of this report is to know about the entire case study of Power AI or PAI. It
develops software for business, home as well as industrial utilizations. The major focus is
given on the subsequent development of several systems of artificial intelligence for
controlling storing, generating and utilization of power within separate environments. It has
developed several unique and significant solutions for the various applications. This report
has provided a detailed description of security awareness and governance program. A proper
risk analysis is also done in this report.
Security Management and Governance_2
2
SECURITY MANAGEMENT AND GOVERNANCE
Table of Contents
Part A: Report............................................................................................................................3
1. Discussion on Benefits that are derived from the Security Management as the ongoing
procedure as well as Reasons to have a Security Program Policy.........................................3
2. Developing a Proper Security Policy as well as Security Management Plan....................4
3. Identifying the major Functionalities, Tasks, Responsibilities and Roles for Security
Management Program for PIA as well as Roles of the Various Groups or Individuals in
Governance............................................................................................................................5
4. Identifying Major Methods and Models for Developing Security Management Program 6
5. Discussing Implications of Legal and Statutory Requirements and Major Advantages of
the Formal Approach..............................................................................................................7
Part B: Appendix........................................................................................................................8
1. Risk Management Plan......................................................................................................8
2. Threats, Vulnerabilities and Attacks of Formal Plan.........................................................9
3. Risk Management Plan......................................................................................................9
4. Responsibility for User and Vendor.................................................................................10
Summary..................................................................................................................................11
References................................................................................................................................12
Security Management and Governance_3
3
SECURITY MANAGEMENT AND GOVERNANCE
Part A: Report
1. Discussion on Benefits that are derived from the Security Management as the ongoing
procedure as well as Reasons to have a Security Program Policy
Some of the most important and significant advantages that could be derived from the
security management program as an ongoing procedure are given below:
i) Helps to Protect and Secure Every Form of Information: All the significant forms
of confidential information would be secured and protected for Power AI (Flores, Antonsen
and Ekstedt 2014).
ii) Increments Cyber Attack Resilience: This is the second significant advantage of
security management program. It helps in incrementing the cyber attack resilience.
iii) Provides Framework for Keeping Organizational Information Protected: The
security management program eventually provides a proper and subsequent framework for
effectively keeping all types of organizational information protected.
iv) Reducing Expenses: The ICT security management program would be reducing
the major expenses for information security.
There are some of the most significant reasons to have a proper policy and these
reasons are given below:
i) Protecting CIA of Information: CIA or confidentiality, integrity and availability of
the confidential information could be easily and promptly secured with a collection of
technical as well as physical controls and this is important for the organization (Whitman and
Mattord 2014).
Security Management and Governance_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
Information Security and Governance: Part A Report
|10
|2346
|40

Security Management and Governance
|10
|2029
|100

Security Management and Governance
|17
|3817
|35

Information Security Management and Governance
|10
|1280
|151

Information Assurance Awareness
|9
|1523
|26

Cyber Security: Attacks and Mitigation Techniques
|11
|2291
|301