1.Explain what an information security blueprint is, identify its major componen
ID: 3744889 • Letter: 1
Question
1.Explain what an information security blueprint is, identify its major components, and explain how it supports the information security program 2.Discuss how an organization institutionalizes its policies, standards, and practices using education, training, and awareness programs 3. Describe what contingency planning is and how it relates to incident response planning, disaster recovery planning, and business continuity plans 4. Explain how policies direct how issues should be addressed and how technologies should be used.You can use this book Michael E. Whitman, Principles of Information Security, 6th Edition 1.Explain what an information security blueprint is, identify its major components, and explain how it supports the information security program 2.Discuss how an organization institutionalizes its policies, standards, and practices using education, training, and awareness programs 3. Describe what contingency planning is and how it relates to incident response planning, disaster recovery planning, and business continuity plans 4. Explain how policies direct how issues should be addressed and how technologies should be used.
You can use this book Michael E. Whitman, Principles of Information Security, 6th Edition 1.Explain what an information security blueprint is, identify its major components, and explain how it supports the information security program 2.Discuss how an organization institutionalizes its policies, standards, and practices using education, training, and awareness programs 3. Describe what contingency planning is and how it relates to incident response planning, disaster recovery planning, and business continuity plans 4. Explain how policies direct how issues should be addressed and how technologies should be used.
You can use this book Michael E. Whitman, Principles of Information Security, 6th Edition
Explanation / Answer
Solution 1 : Information Security Blueprint is considered as a plan which mainly focusses on the overall organization's needs like requirements , strategies and opportunities.
Its Major Components are : Integrity , Availability , and Confidentiality.
These Major Components supports an information security program by :
(a) checking the consitency and validity of the program data.
(b) just providing cryptographic securities like Encryption and Decryption.
(c) just monitoring the constraints ( both Time and Budget ) appropriately.
(d) improving the flexibility , scalability and correctness of the program.
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.