Discussion With 2 replies.

I don’t understand this Computer Science question and need help to study.

From your research, discuss whether or not your organization has ISO 27001 certification. Outside of overall protection from cyber-attacks, describe, in detail, some other benefits your organization will achieve in obtaining this certification. If your company does not have this certification, how can they go about obtaining it?

Present your discussion post as if you were presenting to senior leaders of your company.

Please make your initial post and two response posts substantive.

Initial post: Due July 15th, and Response post: Due Duly 19th

A substantive response post will do at least TWO of the following:

  • Answer a question (in detail) posted by another student or the instructor
  • Provide extensive additional information on the topic
  • Explain, define, or analyze the topic in detail
  • Share an applicable personal experience
  • Provide an outside source (for example, an article from the cu Library) that applies to the topic, along with additional information about the topic or the source (please cite properly in APA)
  • Make an argument concerning the topic.

At least one scholarly source should be used in the initial discussion thread.

Be sure to use information from your readings and other sources from the cu Library. Use proper citations and references in your post.

Objectives for Week 3 are:

  1. Students shall learn the importance of articulating an organization’s goals, values and risk position as well understanding how they assist in setting an organization’s materiality standard.
  2. Students will assess effectiveness of an organization’s information security risk assessment methodologies.
  3. Students will define the relationship between an organization’s operational informational security requirements and the ISO 27001.

Week 3 Required Readings

Lopes, M., Guarda, T. & Oliveira, P. (2019). How ISO 27001 Can Help Achieve GDPR Compliance. 2019 14th Iberian Conference on Information Systems and Technologies (CISTI), pp. 1-6. https://ieeexplore.ieee.org/document/8760937?arnumber=8760937

Al-Ahmad, W., & Mohammad, B. (2013). Addressing Information Security Risks by Adopting Standards. International Journal of Information Security Science, 2(2), 28–43. http://search.ebscohost.com/login.aspx?direct=true&AuthType=shib&db=a9h&AN=93598603&site=eds-live

Posted in Uncategorized