Proposing questions to assess your organization’s security technology

[et_pb_section fb_built="1" specialty="on" _builder_version="4.9.3" _module_preset="default" custom_padding="0px|0px|0px|||"][et_pb_column type="3_4" specialty_columns="3" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_row_inner _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet" custom_padding="28px|||||"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" hover_enabled="0" sticky_enabled="0"]
  1. Proposing questions to assess your organization’s security technology    

    QUESTION

    The financial and reputational costs associated with legal non-compliance make it clear that legal compliance and adherence to best practices need to be addressed at a senior managerial level. discuss the types of questions that you could ask your chosen organization’s senior managers and general counsel to gauge the organization’s exposure to the risks associated with legal compliance, and the adequacy of their preparations.

[/et_pb_text][et_pb_text _builder_version="4.9.3" _module_preset="default" width_tablet="" width_phone="100%" width_last_edited="on|phone" max_width="100%"]

 

Subject Business Pages 3 Style APA
[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner module_class="the_answer" _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" width="100%" custom_margin="||||false|false" custom_margin_tablet="|0px|||false|false" custom_margin_phone="" custom_margin_last_edited="on|desktop"]

Answer

ACCESSING ORGANIZATIONAL IT SECURITY

                Regulatory compliance is a factor which is ever-increasing and impacting how firms conduct their business. Information technology firms face a challenge when it comes to establishing a policy based on the new requirements as they struggle to establish concrete controls that can be effectively deployed within the firm. Information security is a critical asset that the firm’s management should consider protecting to uphold legal considerations.[1] This paper documents the questions which the senior managers within a firm can be asks to understand the level of firm’s exposure to risks related with legal compliance. The questions are focused on establishing if the firm is adequately prepared to handle the best practices needed for the legal and non-legal compliance.

Are the critical IT systems within the organization able to observe data confidentiality?

                This is an important question as it seeks to determine if the confidentiality of the data held within the system can be managed. Evidently, cases involving confidentiality breach is one of the common cases reported by the media which suggest non-compliance to the required measures aimed at protecting sensitive customer information.[2] With this question, the senior management will be required to explore other set of sub questions as outlined below.

Can third party users access the information available on the system without proper authorization?

What actions are undertaken to ensure that only authorized people will have an access to sensitive data?

What are some of the back-up plans that the firm is prepared to initiate in the events where they learn of a potential confidentiality breach to prevent the loss of sensitive data?

How is the firm prepared to handle integrity issues?

                With information systems, unauthorized users can have access to the system and hence make alterations to its source. Firms ought to be prepared to show a legal and regulatory compliance to avoid instances of potential integrity breach and concerns. Additional questions to be explored under this area are outlined below.

How can you verify that the information source is genuine and has not alterations whatsoever before trusting the content?

What measures do you have in place to keep off attackers from the system to prevent any form of malicious activities related with the breach of data integrity?

How often do you schedule checks and auditing procedures to ensure that the data integrity is maintained at the required minimum and that the content of information on the system is legit?

Is information always available to the authorized users?

                Information availability is an important element of computer systems suggesting a legal and regulatory compliance.[3] Therefore, this is one of the important areas which should be examined to prevent potential litigations in the event of a breach. Some of the potential questions to be explored in this case are outlined below.

What measures do you have in place to prevent instances of denial of service attacks?

Natural disasters may be beyond your control. However, how do you plan to promote the availability of data and information to all authorized users in the events of a natural disaster or unexpected human actions?

Do you engage in constant system updates?

What measures do you have in place to ensure the normal use of the systems and data availability in the events of system failures?

 

 

[1] Jim, Breithaupt and Merkow, Mark. Information Security Principles of Success. Pearson, 2014

[2] Ibid.

[3] Jim, Breithaupt and Merkow, Mark. Information Security Principles of Success. Pearson, 2014

 

References

Breithaupt, Jim. and Merkow, Mark. Information Security Principles of Success. Pearson, 2014

[/et_pb_text][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px|false|false" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|desktop" custom_padding="60px||6px|||"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_text _builder_version="4.9.3" _module_preset="default" min_height="34px" custom_margin="||4px|1px||"]

Related Samples

[/et_pb_text][et_pb_divider color="#E02B20" divider_weight="2px" _builder_version="4.9.3" _module_preset="default" width="10%" module_alignment="center" custom_margin="|||349px||"][/et_pb_divider][/et_pb_column_inner][/et_pb_row_inner][et_pb_row_inner use_custom_gutter="on" _builder_version="4.9.3" _module_preset="default" custom_margin="|||-44px||" custom_margin_tablet="|||0px|false|false" custom_margin_phone="" custom_margin_last_edited="on|tablet" custom_padding="13px||16px|0px|false|false"][et_pb_column_inner saved_specialty_column_type="3_4" _builder_version="4.9.3" _module_preset="default"][et_pb_blog fullwidth="off" post_type="project" posts_number="5" excerpt_length="26" show_more="on" show_pagination="off" _builder_version="4.9.3" _module_preset="default" header_font="|600|||||||" read_more_font="|600|||||||" read_more_text_color="#e02b20" width="100%" custom_padding="|||0px|false|false" border_radii="on|5px|5px|5px|5px" border_width_all="2px" box_shadow_style="preset1"][/et_pb_blog][/et_pb_column_inner][/et_pb_row_inner][/et_pb_column][et_pb_column type="1_4" _builder_version="3.25" custom_padding="|||" custom_padding__hover="|||"][et_pb_sidebar orientation="right" area="sidebar-1" _builder_version="4.9.3" _module_preset="default" custom_margin="|-3px||||"][/et_pb_sidebar][/et_pb_column][/et_pb_section]