About This Chapter
Information Security Strategy Development - Chapter Summary
Learn about or get reacquainted with information security strategy development with help from fun lessons. You can gain greater insight into security SWOT analysis, information security models and more. As you navigate the lessons, take mini quizzes to find out how well you comprehend main concepts. For a broader review of the lessons, be sure to take the chapter exam. The dashboard traces your steps through this chapter and lets you submit any lesson questions you have to our experts. After completing this chapter, you will be able to do the following:
- Discuss the impact organizational vision, mission and values have on security strategy
- Describe the strategy and influence of security SWOT analysis
- Explain how to engage stakeholders in security strategy development and management
- Provide a description of the architecture and governance of information security models
- Detail the roles and responsibilities of information security strategy development
1. Impact of Organizational Vision, Mission & Values on Security Strategy
An organization's mission, vision and values are only as good as the strategies that support them. In this lesson, you'll learn more about how these high-level statements impact information security strategy.
2. Security SWOT Analysis: Strategy, Influence & Examples
A SWOT analysis is a useful tool for strategic planning in information security as well as business. In this lesson, you'll learn more about this tool and how it can be used to develop information security strategies.
3. Engaging Stakeholders in Security Strategy Development & Management
Engaging stakeholders in security development is critical for a strategy's long-term success. In this lesson, you'll learn more about how to identify key stakeholders and the importance of engaging them.
4. Information Security Models: Architecture & Governance
The information we use in the course of a day is important, and so is securing that information. In this lesson, we'll take a look at information security, and how models, architecture, and governance are related.
5. Information Security Strategy Development: Roles & Responsibilities
Not every position in an organization manages day-to-day security strategy, but every position has security responsibilities. In this lesson, you'll learn more about the roles important in security strategy.
Earning College Credit
Did you know… We have over 200 college courses that prepare you to earn credit by exam that is accepted by over 1,500 colleges and universities. You can test out of the first two years of college and save thousands off your degree. Anyone can earn credit-by-exam regardless of age or education level.
To learn more, visit our Earning Credit Page
Transferring credit to the school of your choice
Not sure what college you want to attend yet? Study.com has thousands of articles about every imaginable degree, area of study and career path that can help you find the school that's right for you.
Other chapters within the Computer Science 332: Cybersecurity Policies and Management course
- Intro to Cybersecurity
- The Cybersecurity Threat Landscape
- Information Security Policy
- Cybersecurity Policy, Governance & Management
- Cybersecurity Risk Management
- Data Access Control
- Partner & Vendor Security Management
- Security Awareness Training
- Information Security Compliance
- Information Security Performance Metrics
- Required Assignments for Computer Science 332