Discuss the problem with strategic management.

What will be an ideal response?


The problem with strategic management is that a lot of key information security functions, such as information technology, as well as the personnel security and physical security functions operate divorced from each other. In many cases, these are separately managed units, which in some instances will even reside in disconnected parts of the organization. The role of strategic management is to ensure that these various functions work together in the most harmonious and effective manner.

Computer Science & Information Technology

You might also like to view...

Which of the following agencies regulates state-chartered banks?

A) Federal Trade Commission (FTC) B) Commodity Futures Trading Commission (CFTC) C) National Credit Union Administration (NCUA) D) Federal Deposit Insurance Corporation (FDIC)

Computer Science & Information Technology

Following up on a tip that there is drug trafficking going on in a particular apartment, you knock on the door and ask if it is okay to enter. The person who answers the door gives you permission and even says it's okay to look around. Under the couch cushions in the living room you discover a baggie containing illegal drugs. You arrest all residents of the apartment for possession. At the trial, the defense attorney argues that the person who answered the door was only a roommate and did not have the authority to give permission for the search without all other residents being present. This argument is dismissed on what principle?

a. The concept of actual authority b. Landlord/Tenant authority c. Common authority d. The argument won't be rejected. The search was clearly illegal.

Computer Science & Information Technology

With which of the following devices may the administrator explicitly assigns an IP address manually by associating a client's hardware address with a specific IP address to be leased to that client?

A. dynamic address lease B. manual address lease C. IP gateway D. discovery broadcast

Computer Science & Information Technology

The ____ model is the most fundamental process model used to build software.

A. XP B. CLASP C. AOP D. waterfall

Computer Science & Information Technology