SlideShare a Scribd company logo
Straver CIS 438 Week 9 Assignment 4:
Information Security Governance NEW
To purchase this material click below link
http://www.assignmentcloud.com/cis-438-
straver/cis-438-week-9-assignment-4-
information-securitv-governance-new
www.assignmentcloud.com/
For more classes visit
www.assignmentcloud.com
CIS 438 Week 9 Assignment 4: Information
Security Governance
Information security management and
governance are not simply implemented
tasks within organizations. An
information security governance program
is a program that must be thoroughly
planned, include senior-level management
involvement and guidance, be
implemented throughout the organization,
and be updated and maintained. The
International Organization for Standards
(ISO) and the International
Electrotechnical Commission (IEC) has
created information
y^ecmity ^errnrnce st
a„<lards
. Re^v the
information security governance
information provided by ISACA, located
athttp://www.isaca.org/Knowledge-
Center/Research/Documents/InfoSecGuid
anceDirectorsExecMgt.pdf.
Write a 3-5 page paper in which you:
1. Define the information security
governance and management tasks that
senior management needs to address.
2. Describe the outcomes and the
items that will be delivered to the
organization
through the information security
program.
3. Develop a list of at least five (5)
best practices for implementing and
managing wv
an
mformat
i°n security governance
program within an organization.
4. Develop a checklist of items that
needs to be addressed by senior
management,
including priorities and needed
resources.
5. Use at least three (3) quality
resources in this assignment. Note:
Wikipedia and
similar Websites do not qualify as
quality
resources.
Your assignment must follow these
formatting requirements:
• Be typed, double spaced, using Times
New Roman font (size 12), with one-inch
margins on all sides; references must
follow APA or school-specific format.
Check with your professor for any
additional instructions.
• Indude a
cover p
age cooMning fte dele of
the assignment, the student s name, the
professor's name, the course title, and the
date. The cover page and the reference
page are not included in the required page
length.
The specific course learning outcomes
associated with this assignment are:
• Examine the principles
requiring governance of
information within
organizations.
• Use technology and information
resources to research legal issues
in
information security.
• Write clearly and concisely about
information security legal issues andtopics using proper wrltlng mechanics and
technical styleconventions
• Examine the principles
requiring governance of
information within
organizations.
• Use technology and information
resources to research legal issues
in
information security.
• Write clearly and concisely about
information security legal issues andtopics using proper wrltlng mechanics and
technical styleconventions

More Related Content

DOC
Strayer cis 438 week 2 case study 1
PPT
Strayer cis-438-week-6-case-study-2-data-breaches-and-regulatory-requirements...
DOCX
Assignment 2 critical infrastructure protection
PPT
Strayer cis-438-week-3-assignment-1-privacy
DOC
Strayer cis 333 week 10 technical project paper
PPT
Cis 550-week-9-case-study-7
DOC
Devry cis 560 week 2 case study 1 stuxnet new
DOCX
What are baseline security requirements that should be applied to th
Strayer cis 438 week 2 case study 1
Strayer cis-438-week-6-case-study-2-data-breaches-and-regulatory-requirements...
Assignment 2 critical infrastructure protection
Strayer cis-438-week-3-assignment-1-privacy
Strayer cis 333 week 10 technical project paper
Cis 550-week-9-case-study-7
Devry cis 560 week 2 case study 1 stuxnet new
What are baseline security requirements that should be applied to th

Similar to Strayer cis-438-week-9-assignment-4 (20)

DOCX
Assignment 4 Information Security Governance Information securi.docx
DOCX
Cis 438 Enthusiastic Study / snaptutorial.com
DOCX
Cis 438 Technology levels--snaptutorial.com
DOCX
CIS 324 Success Begins / snaptutorial.com
DOCX
Cis 502 assignment 1 week 2 – strayer new
PPT
Cis 550-week-10-term-paper
DOC
Strayer cis 558 week 4 case study 1 mitigating cloud computing risks
DOC
Strayer cis 558 week 4 case study 1 mitigating cloud computing risks
DOC
Strayer cis 558 week 4 case study 1 mitigating cloud computing risks
DOC
Strayer cis 558 week 4 case study 1 mitigating cloud computing risks
DOCX
CIS 558 Education Organization / snaptutorial.com
DOC
Cis 558 Education Specialist-snaptutorial.com
PPT
Strayer cis-438-week-7-assignment-3-intellectual-property-laws-and-security-m...
PDF
Cis 558 Effective Communication-snaptutorial.com
DOCX
CIS 558 Enhance teaching / snaptutorial.com
DOC
Cis 558 Exceptional Education-snaptutorial.com
DOCX
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
DOCX
CIS 560 Massive Success--snaptutorial.com
DOCX
Cis 560 Enthusiastic Study / snaptutorial.com
DOCX
Cis 560 Technology levels--snaptutorial.com
Assignment 4 Information Security Governance Information securi.docx
Cis 438 Enthusiastic Study / snaptutorial.com
Cis 438 Technology levels--snaptutorial.com
CIS 324 Success Begins / snaptutorial.com
Cis 502 assignment 1 week 2 – strayer new
Cis 550-week-10-term-paper
Strayer cis 558 week 4 case study 1 mitigating cloud computing risks
Strayer cis 558 week 4 case study 1 mitigating cloud computing risks
Strayer cis 558 week 4 case study 1 mitigating cloud computing risks
Strayer cis 558 week 4 case study 1 mitigating cloud computing risks
CIS 558 Education Organization / snaptutorial.com
Cis 558 Education Specialist-snaptutorial.com
Strayer cis-438-week-7-assignment-3-intellectual-property-laws-and-security-m...
Cis 558 Effective Communication-snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.com
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
CIS 560 Massive Success--snaptutorial.com
Cis 560 Enthusiastic Study / snaptutorial.com
Cis 560 Technology levels--snaptutorial.com
Ad

More from infinityend3 (20)

PPT
Strayer cis-505-week-3-assignment-2-requirements-for-the-corporate-computing-...
PPT
Strayer cis-505-week-2-assignment-1-standards-research
PPT
Strayer cis-505-all-assignments
PPT
Strayer cis-499-week-5-project-deliverable-3-database-and-data-warehousing-de...
PPT
Strayer cis-499-week-2-project-deliverable-1
PPT
Strayer cis-498-week-2-project-deliverable-1-project-plan-inception-new
PPT
Strayer cis-438-week-10-term-paper-security-regulation-compliance
PPT
Strayer cis-438-week-4-assignment-2
PPT
Strayer cis-438-week-2-case-study-1
PPT
Strayer cis-417-week-10-term-paper-investigating-data-theft
PPT
Strayer cis-417-week-8-assignment-4-data
PPT
Strayer cis-417-week-7-case-study-3
PPT
Strayer cis-417-week-6-assignment-3-securing-the-scene-new
PPT
Strayer cis-417-week-4-assignment-2
PPT
Strayer cis-417-week-3-case-study-1-btk-new
PPT
Strayer cis-417-week-2-assignment-1
PPT
Stayer cis-443-week-10-term-paper
PPT
Stayer cis-443-week-9-case-study-2
PPT
Stayer cis-443-week-8-assignment-4
PPT
Stayer cis-443-week-7-assignment-3
Strayer cis-505-week-3-assignment-2-requirements-for-the-corporate-computing-...
Strayer cis-505-week-2-assignment-1-standards-research
Strayer cis-505-all-assignments
Strayer cis-499-week-5-project-deliverable-3-database-and-data-warehousing-de...
Strayer cis-499-week-2-project-deliverable-1
Strayer cis-498-week-2-project-deliverable-1-project-plan-inception-new
Strayer cis-438-week-10-term-paper-security-regulation-compliance
Strayer cis-438-week-4-assignment-2
Strayer cis-438-week-2-case-study-1
Strayer cis-417-week-10-term-paper-investigating-data-theft
Strayer cis-417-week-8-assignment-4-data
Strayer cis-417-week-7-case-study-3
Strayer cis-417-week-6-assignment-3-securing-the-scene-new
Strayer cis-417-week-4-assignment-2
Strayer cis-417-week-3-case-study-1-btk-new
Strayer cis-417-week-2-assignment-1
Stayer cis-443-week-10-term-paper
Stayer cis-443-week-9-case-study-2
Stayer cis-443-week-8-assignment-4
Stayer cis-443-week-7-assignment-3
Ad

Recently uploaded (20)

PDF
Insiders guide to clinical Medicine.pdf
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Basic Mud Logging Guide for educational purpose
PPTX
master seminar digital applications in india
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
Anesthesia in Laparoscopic Surgery in India
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PPTX
Pharmacology of Heart Failure /Pharmacotherapy of CHF
PPTX
Pharma ospi slides which help in ospi learning
PDF
RMMM.pdf make it easy to upload and study
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Classroom Observation Tools for Teachers
PPTX
Renaissance Architecture: A Journey from Faith to Humanism
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Lesson notes of climatology university.
PDF
01-Introduction-to-Information-Management.pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
Supply Chain Operations Speaking Notes -ICLT Program
Insiders guide to clinical Medicine.pdf
O5-L3 Freight Transport Ops (International) V1.pdf
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Basic Mud Logging Guide for educational purpose
master seminar digital applications in india
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
Anesthesia in Laparoscopic Surgery in India
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Pharmacology of Heart Failure /Pharmacotherapy of CHF
Pharma ospi slides which help in ospi learning
RMMM.pdf make it easy to upload and study
human mycosis Human fungal infections are called human mycosis..pptx
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Classroom Observation Tools for Teachers
Renaissance Architecture: A Journey from Faith to Humanism
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Lesson notes of climatology university.
01-Introduction-to-Information-Management.pdf
Microbial diseases, their pathogenesis and prophylaxis
Supply Chain Operations Speaking Notes -ICLT Program

Strayer cis-438-week-9-assignment-4

  • 1. Straver CIS 438 Week 9 Assignment 4: Information Security Governance NEW To purchase this material click below link http://www.assignmentcloud.com/cis-438- straver/cis-438-week-9-assignment-4- information-securitv-governance-new www.assignmentcloud.com/ For more classes visit www.assignmentcloud.com CIS 438 Week 9 Assignment 4: Information Security Governance Information security management and governance are not simply implemented tasks within organizations. An
  • 2. information security governance program is a program that must be thoroughly planned, include senior-level management involvement and guidance, be implemented throughout the organization, and be updated and maintained. The International Organization for Standards (ISO) and the International Electrotechnical Commission (IEC) has created information y^ecmity ^errnrnce st a„<lards . Re^v the information security governance information provided by ISACA, located athttp://www.isaca.org/Knowledge- Center/Research/Documents/InfoSecGuid anceDirectorsExecMgt.pdf. Write a 3-5 page paper in which you:
  • 3. 1. Define the information security governance and management tasks that senior management needs to address. 2. Describe the outcomes and the items that will be delivered to the organization through the information security program. 3. Develop a list of at least five (5) best practices for implementing and managing wv an mformat i°n security governance program within an organization. 4. Develop a checklist of items that needs to be addressed by senior management, including priorities and needed resources. 5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
  • 4. Your assignment must follow these formatting requirements: • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions. • Indude a cover p age cooMning fte dele of the assignment, the student s name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required page length. The specific course learning outcomes associated with this assignment are:
  • 5. • Examine the principles requiring governance of information within organizations. • Use technology and information resources to research legal issues in information security. • Write clearly and concisely about information security legal issues andtopics using proper wrltlng mechanics and technical styleconventions
  • 6. • Examine the principles requiring governance of information within organizations. • Use technology and information resources to research legal issues in information security. • Write clearly and concisely about information security legal issues andtopics using proper wrltlng mechanics and technical styleconventions