Application-incorporating security into it processes

Assignment Help Basic Computer Science
Reference no: EM131086009

Application: Incorporating Security Into IT Processes

Security in an organization does not reside in a silo; it is affected by other processes and vice versa. Therefore, security should be integrated into the overall IT process to make it effective.

You have already investigated the functionality and capabilities of identity and access management tools. The process for creating and removing supplier IDs should be incorporated into an identity and access management tool. 

To prepare for this Assignment, refer to the case study "Developing a Monthly Vulnerability Scanning Process" from the media Selection and Evaluation of IT Solutions. This case study will provide you with an example of how to incorporate a security feature into the overall IT process.

For this Assignment, provide a 3- to 5-page report describing a process that incorporates security for managing supplier credentials into an identity and access management tool. Be sure to do the following in your report:

  • Develop a numbered outline with the steps in a workflow.
  • Identify the teams involved in this process, and explain the steps each team performs.
  • Explain shortcomings in the process that you may  need to overcome.

Readings

  • Brotby, K. (2009). Information security governance: A practical development and implementation approach.  Hoboken, NJ: Wiley.
    • Chapter 8, "Risk Management Objectives"
      • Section 8.3.1, "Recovery Time Objectives"
      In this section, you are introduced to the recovery time objectives. You will explore the organizational considerations for determining such objectives.
  • Hawkins, S. M., Yen, D. C., & Chou, D.C. (2000). Disaster recovery planning: A strategy for data security.Information Management & Computer Security,8(5), 222-230. Information Management and Computer Security Volume 8 by Hawkins, Yen, & Chow.  Copyright 2000 by EMERALD GROUP PUBLISHING LIMITED. Reprinted by permission of EMERALD GROUP PUBLISHING LIMITED via the Copyright Clearance Center. In this paper, you will investigate the importance of disaster recovery planning in the business world. You will also explore a strategic planning process that an organization could follow to develop its own disaster recovery plan.
  • Document: Sample Presentation Template (PowerPoint file)Note: You will use this document to complete this unit's Project.

Optional Resources

  • Bahan, C. (2003). The disaster recovery plan. Retrieved fromhttps://www.sans.org/reading_room/whitepapers/recovery/disaster-recovery-plan_1164 In this article, you will be introduced to the important aspects of a disaster recovery plan.
  • Devlen, A. (2003, March 10). 12 key elements of an enterprise-wide disaster recovery program.ITManagementNews. Retrieved from https://archive.itmanagementnews.com/articles/0310ad.html In this article, you will explore the essential elements that an organization's disaster recovery program should include in order to be effective.

Reference no: EM131086009

Questions Cloud

Developing deployment proposal : Many organizations use graphical representation for discussing important proposals. The presentation of your recommendation about investing in an appropriate IT solution to the stakeholders is equally important to the recommendation generating pro..
Where does customized adaptable vocation work viably : HI6007 Assessment - How does Customized adaptable work advantage both the association and representatives and where does Customized adaptable vocation work viably?
Calculate the increase in the rate of heat transfer : A solution with a boiling point of 180°F boils on the outside of a 1-in. tube with a No. 14 BWG gauge wall. On the inside of the tube flows saturated steam at 60 psia. The convective heat transfer coefficients are 1500 Btu/(h ft2 °F) on the steam ..
How is this affecting their overall brand perception : Nordstrom utilizes branding to create a more positive work environment leading to a brand-driven organization. Discuss another organization that does this well. Conversely, discuss an organization that does not do this well. How is this affecting ..
Application-incorporating security into it processes : Security in an organization does not reside in a silo; it is affected by other processes and vice versa. Therefore, security should be integrated into the overall IT process to make it effective.
Determine the amount of entropy produced, in kj/kg k : The temperature rise is brought about adiabatically by stirring the air with a paddle wheel. Determine the amount of entropy produced, in kJ/kg ? K.
Recommend for naming files in business : What kinds of rules would your recommend for naming files in business? For personal use?
How does mcommerce facilitate the purchase : Determine whether these values encourage or discourage use or ownership and why. Is mCommerce an advantage or disadvantage to the purchase?
Find a maximum weight perfect matching in the graph : ASSIGNMENT 5. Consider the complete bipartite graph K4,4 with vertex partition (A, B) where A = {a, b, d, f}, B = {g, h, i, j}. Use this to find a maximum weight perfect matching in the graph, and an optimal solution for the dual problem

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd