Given that limited access rights will not satisfy the business owner, suggest a
ID: 3910808 • Letter: G
Question
Given that limited access rights will not satisfy the business owner, suggest a statement of control and describe how the business would manage the after- hours access by an external vendor providing ERP support What would a productive course of action be if the business owner requests access to resources that the security manager will definitely not approve? There is a trend to outsource more support services to vendors. How would you suggest raising awareness within the business to encourage more business owners to look at security issues up front, rather than at the end of their contract negotiations when security is considered a roadblock? . When a large corporation acquires a smaller company or splits into distinct divisions, the corporation can choose centralized infrastructure, services, and policies or allow each division to have its own policies, standards, and IT infrastructure "and perhaps its own Internet demilitarized zone (DMZ). State why it is better for a company to either maintain centralized IT governance distribute IT governance, or federalize itExplanation / Answer
Solution: -
a) Now-a-days large size MNCs acquire or takes over small or medium size business and implemented their own policies on those acquired companies. There is a policy that no one is permitted to see the security management of an organization. Business owner is also not an exception. Since, he is the business owner, he has the right to have an idea regarding the security provided by his/her organization. He doesn’t have the right to access the resources from outside the business network as it can lead to breaching of data. Here is the course of action that can be taken when a business owner request for a resource.
b) Now medium size businesses outsource the support services to third party vendor which can be an MNC. It is really important that business owner must be aware of what’s security measures is being implemented by those vendors. Here are the few things which can be implemented to check the security awareness:
c) When a large company acquire smaller companies, sometimes based upon the situation the company choose whether to go for centralize, distributed or federalize IT governance. Let’s talk about what situations, one of these IT governances can be chosen.
So, based on the situation or the demands or at the profit percentage, one of these three models are implemented.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.