docx
keyboard_arrow_up
School
Collin County Community College District *
*We aren’t endorsed by this school
Course
2341
Subject
Information Systems
Date
Apr 3, 2024
Type
docx
Pages
1
Uploaded by DeaconTurkey1941
Module 4 – Governance and Organization
Enterprise Information Security Program - Roles and Responsibilities
1.
Define the following terms:
a.
Availability-
b.
Confidentiality-
c.
Integrity-
d.
Authenticity-
e.
Accountability-
f.
Non-repudiation-
g.
Reliability-
2.
List the five core components of an effective information system security program? 3.
What are the Board of Directors responsibilities in regards to information security governance? 4.
What are the five identified National Associate of Corporate Directors (NACD) Cyber Risk Oversight Principles? 5.
What are the five principles are identified in the “Guiding Principles for Cyber Risk Governance: Principles for Directors in Overseeing Cybersecurity” document? 6.
What are Executive Management responsibilities in regards to information security governance? 7.
What is a charter outline according to the text? 8.
What are the benefits in having a Security Steering Committee? 9.
What are the responsibilities of a CISO? 10. List the different Organizational Structures where a CISO may be placed and describe the
pros and cons of each? 11. What are some of the steps one can take to align the Information Security organization within the company’s overall structure? 12. What does RACI stand for and define element? 13. What is the purpose of a RACI? 14. How many A’s can any RACI tasks have? 15. What is Security Configuration Management? 16. Why is Security Configuration Management important? 17. What are Center for Internet Security Benchmarks and why are they important? 18. What are Security Technical Implementation Guides and why are they important? 19. What two things occur if one does not have sound Configuration Management process and procedures in place and positively acted upon? 20. What is (define) Information Technology Asset Management (ITAM)? 21. What two CIS Top 20 controls deal with Asset Management and what is the order of importance in the CIS Top 20? 22. What seven items are addressed in Cyber Resilience Review, Asset Management domain?
Discover more documents: Sign up today!
Unlock a world of knowledge! Explore tailored content for a richer learning experience. Here's what you'll get:
- Access to all documents
- Unlimited textbook solutions
- 24/7 expert homework help