Management Of Information Security
6th Edition
ISBN: 9781337405713
Author: WHITMAN, Michael.
Publisher: Cengage Learning,
expand_more
expand_more
format_list_bulleted
Expert Solution & Answer
Chapter 3, Problem 9RQ
Explanation of Solution
Top-down strategic planning:
- Top-down approach is the process in which the problem is decentralized to sub parts to solve it in a less time and more efficiency...
Explanation of Solution
Difference between top-down strategic planning and bottom-up strategic planning:
Top-down strategic planning | Bottom-up strategic planning |
In this, the process is started at the top-level and continues to bottom-level. | In this, the process is started at the bottom-level and continues to top-level... |
Explanation of Solution
Effective approach for implementing security in the organization:
On comparing, top-down strategic planning is more effecti...
Expert Solution & Answer
Trending nowThis is a popular solution!
Students have asked these similar questions
The question is how a company's plan for information security becomes a project strategy.
How exactly does an organization's information security plan function as the project's overall strategy?
How does the role of a Security Consultant integrate with that of a Systems Architect in ensuring project robustness?
Chapter 3 Solutions
Management Of Information Security
Ch. 3 - Prob. 1RQCh. 3 - Prob. 2RQCh. 3 - Prob. 3RQCh. 3 - Prob. 4RQCh. 3 - Prob. 5RQCh. 3 - Prob. 6RQCh. 3 - Prob. 7RQCh. 3 - Prob. 8RQCh. 3 - Prob. 9RQCh. 3 - Prob. 10RQ
Ch. 3 - Prob. 11RQCh. 3 - Prob. 12RQCh. 3 - Prob. 13RQCh. 3 - Prob. 14RQCh. 3 - Prob. 15RQCh. 3 - Prob. 16RQCh. 3 - Prob. 17RQCh. 3 - Prob. 18RQCh. 3 - Prob. 19RQCh. 3 - Prob. 20RQCh. 3 - Prob. 1ECh. 3 - Prob. 2ECh. 3 - Prob. 3ECh. 3 - Prob. 4ECh. 3 - Prob. 5ECh. 3 - Prob. 1DQCh. 3 - Prob. 2DQCh. 3 - Prob. 1EDM
Knowledge Booster
Similar questions
- Q: Describe top-down strategic planning. How does it differ from bottom-up strategic planning? Which is usually more effective in implementing security in a large, diverse organization?arrow_forwardHow does the security incident plan fits into the overall organization?arrow_forwardHow can risk assessment play a crucial role in developing a continuity plan?arrow_forward
- The information security plan of an organization serves as a project strategy, but how is this accomplished?arrow_forwardIn which phase of secSDLC is contingency planning carried out? Multiple answers : A: planning B: analysis C: design D: implementationarrow_forwardA project plan is a company's information security blueprint, but how does this occur?arrow_forward
- A. What conditions must be met to ensure that risk acceptance has been used properly? B. Discuss the concept of an organisation’s competitive advantage against competitors and how it has evolved over the years with the ongoing development of the IT industry. C. Explain why networking components need more examination from an information security perspective than from a systems development perspective. Why must this practice be periodically reviewed? D. With the aid of a diagram, discuss the contingency planning hierarchy. E. What is the DMZ? Discuss whether this is a good name for the function that this type of subnet performs.arrow_forwardChain Link Consulting is an information technology consulting company that focuses on system security concerns. When the company's president asks you to assist her with the preparation of a presentation for a group of potential clients at a trade show meeting next month, you say "yes." First and foremost, she would like you to examine system security concerns in light of all six security levels. Afterwards, she wants you to come up with a list of methods that Chain Link might evaluate a client's security procedures in order to obtain an accurate evaluation of their level of exposure.It was her way of making the situation more intriguing by saying that it was fine to be imaginative in your ideas, but that you should avoid proposing anything that would be unlawful or immoral. Example: It might be OK to pretend as a job candidate with phony references to see whether they were being reviewed, but it would be inappropriate to steal a lock and access the computer room to check on things.Your…arrow_forwardIn the threat assessment, what is the difference between capacity and capability?arrow_forward
- It is important to have a strategic strategy in the event that information centers want to automate part or all of their activities. Are you in agreement or disagreement? Give your reasoning.arrow_forwardWhat security measures should be integrated into a comprehensive system management strategy?arrow_forwardA. Why should continuity plans be tested and rehearsed? B. Identify and briefly discuss three UK laws relevant to the practice of information security. C. Discuss the financial considerations required to implement an information security project. D. What are the main benefits for an organisation that assure from undertaking information security project management?arrow_forward
arrow_back_ios
SEE MORE QUESTIONS
arrow_forward_ios
Recommended textbooks for you
- Management Of Information SecurityComputer ScienceISBN:9781337405713Author:WHITMAN, Michael.Publisher:Cengage Learning,Principles of Information Systems (MindTap Course...Computer ScienceISBN:9781305971776Author:Ralph Stair, George ReynoldsPublisher:Cengage Learning
Management Of Information Security
Computer Science
ISBN:9781337405713
Author:WHITMAN, Michael.
Publisher:Cengage Learning,
Principles of Information Systems (MindTap Course...
Computer Science
ISBN:9781305971776
Author:Ralph Stair, George Reynolds
Publisher:Cengage Learning