One factor often overlooked in creating and implementing information security policy is the human factor. Your reading this week explores

One factor often overlooked in creating and implementing information security policy is the human factor.
Your reading this week explores this factor.
One tool to help manage the human factor is the separation of duties (also called segregation of duties).
Explain what separation of duties is and why it is important.
What three functions should be separate in all transactions?
Give an example of how duties can be separated using an example you might find in an organization.
Your main post needs to be around 300 words and you need to make at least one reply to your classmates that is 100 words long.
See the links below for more information:
https://www.isaca.org/Journal/archives/2012/Volume-6/Pages/What-Every-IT-Auditor-Should-Know-About-Proper-Segregation-of-Incompatible-IT-Activities.aspx
https://www.csoonline.com/article/2123120/separation-of-duties-and-it-security.html
https://www.accountingtools.com/articles/what-is-separation-of-duties.html
https://www.computerworld.com/article/2532680/the-key-to-data-security–separation-of-duties.html
https://www.aicpa.org/interestareas/informationtechnology/resources/value-strategy-through-segregation-of-duties.html

Share This Post

Email
WhatsApp
Facebook
Twitter
LinkedIn
Pinterest
Reddit

Order a Similar Paper and get 15% Discount on your First Order

Related Questions

Obtain the general solution of the following DEs: i. y′′′ + y′′ − 4y′ + 2y = 0 ii. y(4) + 4y(2) = 0 iii. x(x − 2)y′′ + 2(x − 1)y′ − 2y = 0; use y1 = (1 − x) iv. y′′ − 4y = sin2(x) v. y′′ − 4y′ + 3y = x ; use y1 = e3x vi. y′′ + 5y′ + 6y = e2xcos(x) vii. y′′ + y = sec(x) tan(x)

Obtain the general solution of the following DEs: i. y′′′ + y′′ − 4y′ + 2y = 0 ii. y(4) + 4y(2) = 0 iii. x(x − 2)y′′ + 2(x − 1)y′ − 2y = 0; use y1 = (1 − x) iv. y′′ − 4y = sin2(x) v. y′′