IS4550

Security Policies and Implementation

Unit 2 (June 24, 2016)
Risk Mitigation and Business Support Processes

Learning Objective
  • Analyze how security policies help mitigate risks and support business processes in various domains in the IT infrastructure.
Key Concepts
  • Business challenges in each IT domain
  • Risk mitigation in seven IT domains
  • Organizational hurdles to policy implementation
  • Policy implementation issues related to humans in the workplace
  • Executive management 
Assigned Reading
Keywords
  • Risk Mitigation 
  • Information Technology (IT) Risks, Threats, Vulnerabilities
  • Security Countermeasures
  • Strategies
  • Cyber Criminals
  • Vulnerability Window
  • Compliance Officer
  • Data Custodian
  • Data Manager
  • Data Owner
  • Information Technology (IT) Domain
  • Business Challenges
Assignments and Study Materials
  • Unit 2 Lecture Slides
  • Unit 2 Discussion 2.1: Risk Mitigation
  • Unit 2 Lab 2.2: Develop an Organization-Wide Policy Framework Implementation Plan
  • Unit 2 Assignment 2.3: Good Policy Implementation
Questions and Feedback
Use the form below to ask questions or provide feedback about the concepts covered during Unit 2's session of class:

Your browser is out-of-date!

You need to update your browser to view Foliotek correctly. Update my browser now

×