Assignment 3: Private Sector Case Study

User Generated

tnzory

Engineering

Description

Fill in your name above, put your answer below each question, and then return this document for grading following the instructions in the syllabus. Use examples from the readings, or from your own research, to support answers.



When rolling out information security policies communications should be a priority. Looking at page 119 in the textbook, please explain the importance of this statement. (Write a 1 page paper discussing your answer).



Assignment Rubric ( 100 Points)

Synthesis of Concepts

80

Writing Standards - APA format

20

Timeliness - 10% penalty per week for late work

10

Unformatted Attachment Preview

ISSC481 - Week 3 Your Name: Fill in your name above, put your answer below each question, and then return this document for grading following the instructions in the syllabus. Use examples from the readings, or from your own research, to support answers. When rolling out information security policies communications should be a priority. Looking at page 119 in the textbook, please explain the importance of this statement. (Write a 1 page paper discussing your answer). information Security Policy Implementation Issues 119 When rolling out information security policies, make communications a priority. Be sure your approach includes these points: 1. Be clear—avoid technical jargon when possible. 2. Set the tone at the top—ask your leaders to help deliver the message. 3. Use many channels—reinforce the message as many times as possible. 4. Be forthcoming—be honest and candid about any impact the policy will have. 5. Say “thank you”—acknowledge the efforts both to create and to implement the security policies. This list is not exhaustive, but it highlights key points. To be successful in implementing security policies in a large organization, you must continually sell the message at each layer. You must build support at the top, middle, and bottom ranks. You must choreograph the review, approval, and release process so you continue to be part of the messaging. Remember, the message can change as it moves through the layers of the organization. For example, when dealing with senior leaders, a core part of the message could be cost avoidance and reduction in operating risks. Messages to other layers might have greater emphasis on regulatory compliance or meeting customer expectations of privacy. It’s important to tailor the benefit message to resonate with the audience. If workers can connect with the importance and priority they are more likely to follow the policy. Advantages of a Hierarchical Model There are some distinct advantages to a hierarchical model. The importance of specialization has been discussed. In a hierarchical model, communication lines are more clearly defined. When you encounter a problem, there is most likely a group that specializes in that area that can help solve it. The depth of knowledge in a subject area tends to be greater. This allows managers to predict and avoid problems before they occur. Managers can also create “centers of excellence.” These are small, specialized teams that focus on specific problems within an organization to help provide high-quality products and services. Large organizations often have teams dedicated to identifying the next big threat. These teams examine industry breaches and analyze if the company would be vulnerable to those types of attacks. In a small flat organization, these specialties and skills may not be available. (Johnson) Johnson, Robert. Security Policies and Implementation Issues, 2nd Edition. Jones & Bartlett Learning, 07/2014. VitalBook file.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

...


Anonymous
Just the thing I needed, saved me a lot of time.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags