Home » Downloads » Information Security Governance

Information Security Governance

Information Security Governance

Topic “Information Security Governance”
Please download the instruction.

Information Security Governance
Write a 3–5-page paper that examines research on information security governance and provides a critical analysis of that research.
By focusing on the topic of information security governance, this assignment is designed to help you explore and critically analyze research literature that will support your course project. Three citations to scholarly and relevant practitioner literature per page is a recommended guideline to adequately support your writing.
Apply online resource tools to research existing scholarly and relevant practitioner literature. In your critical analysis, address the following issues:
1. Compare literature in information security governance to examine what is meant by security governance from theoretical and practitioner perspectives. Provide examples.
2. Discuss how information security governance can supply a critical link between business management objectives and IT objectives. Based on relevant resources, include an analysis of the strengths and weaknesses inherent in this relationship.
3. Discuss how information security governance, a subset of business governance, can and should affect the policies and internal controls to protect information assets.
Scoring Guide

Criteria Non-performance Basic Proficient Distinguished Comments
Evaluate sources to select relevant scholarly and practitioner literature.

Does not identify sources to select relevant scholarly and practitioner literature. Identifies, but does not evaluate, sources to select relevant scholarly and practitioner literature. Evaluates sources to select relevant scholarly and practitioner literature. Evaluates sources to select relevant scholarly and practitioner literature, and provides scholarly evidence and relevant examples.
Compare literature in information security governance.
Does not identify literature in information security governance. Identifies, but does not compare, literature in information security governance. Compares literature in information security governance. Compares literature in information security governance, and synthesizes the findings in a manner that demonstrates insight and clarity.
Define information security governance from theoretical and practitioner perspectives.

Does not define information security governance from theoretical or practitioner perspectives. Define information security governance from theoretical or practitioner perspective, but not from both. Defines information security governance from theoretical and practitioner perspectives. Defines information security governance from theoretical and practitioner perspectives, and provides relevant examples to support the argument.
Analyze strengths and weaknesses of information security governance as applied to business management and IT objectives.

Does not identify the strengths or weaknesses of information security governance as applied to business management and IT objectives. Identifies, but does not analyze the strengths or weaknesses of information security governance as applied to business management and IT objectives. Analyzes strengths and weaknesses of information security governance as applied to business management and IT objectives. Analyzes strengths and weaknesses of information security governance as applied to business management and IT objectives, and demonstrates insight into current issue in the field by identifying opportunities for further research.
Analyze strategic effect of information security governance on organizational policies and controls.

Does not identify strategic effect of information security governance on organizational policies and controls. Identifies, but does not analyze strategic effect of information security governance on organizational policies and controls. Analyzes strategic effect of information security governance on organizational policies and controls. Analyzes strategic effect of information security governance on organizational policies and controls, and demonstrates an insight into current issues in the field by identifying new opportunities for research.
Demonstrate effective academic writing and communication skills, making few, if any, grammatical or mechanical errors.

Does not demonstrate adequate academic writing and communication skills with significant grammatical and mechanical errors. Inconsistently demonstrates effective academic writing and communication skills, makes a significant number of grammatical or mechanical errors. Demonstrates effective academic writing and communication skills, making few if any grammatical or mechanical errors. Demonstrates effective academic writing and communication skills, making few if any grammatical or mechanical errors, and uses language, tone, and organization that enhances the reader’s ability to locate and understand key material.

 

 

………………….Answer preview………………………

Today, more than a few organizations face a comprehensive upheaval in governance that affects their information management practices. In that case, there is an increased need to focus on the whole value of information protection and delivery. Over the past three decades, regulators, legislatures, and statutory authorities created a complex collection of novel laws and regulations designed to influence or impact improvement in the organizational governance and security…………………

APA

954 words