Application-incorporating security into it processes

Assignment Help Basic Computer Science
Reference no: EM131086009

Application: Incorporating Security Into IT Processes

Security in an organization does not reside in a silo; it is affected by other processes and vice versa. Therefore, security should be integrated into the overall IT process to make it effective.

You have already investigated the functionality and capabilities of identity and access management tools. The process for creating and removing supplier IDs should be incorporated into an identity and access management tool. 

To prepare for this Assignment, refer to the case study "Developing a Monthly Vulnerability Scanning Process" from the media Selection and Evaluation of IT Solutions. This case study will provide you with an example of how to incorporate a security feature into the overall IT process.

For this Assignment, provide a 3- to 5-page report describing a process that incorporates security for managing supplier credentials into an identity and access management tool. Be sure to do the following in your report:

  • Develop a numbered outline with the steps in a workflow.
  • Identify the teams involved in this process, and explain the steps each team performs.
  • Explain shortcomings in the process that you may  need to overcome.

Readings

  • Brotby, K. (2009). Information security governance: A practical development and implementation approach.  Hoboken, NJ: Wiley.
    • Chapter 8, "Risk Management Objectives"
      • Section 8.3.1, "Recovery Time Objectives"
      In this section, you are introduced to the recovery time objectives. You will explore the organizational considerations for determining such objectives.
  • Hawkins, S. M., Yen, D. C., & Chou, D.C. (2000). Disaster recovery planning: A strategy for data security.Information Management & Computer Security,8(5), 222-230. Information Management and Computer Security Volume 8 by Hawkins, Yen, & Chow.  Copyright 2000 by EMERALD GROUP PUBLISHING LIMITED. Reprinted by permission of EMERALD GROUP PUBLISHING LIMITED via the Copyright Clearance Center. In this paper, you will investigate the importance of disaster recovery planning in the business world. You will also explore a strategic planning process that an organization could follow to develop its own disaster recovery plan.
  • Document: Sample Presentation Template (PowerPoint file)Note: You will use this document to complete this unit's Project.

Optional Resources

  • Bahan, C. (2003). The disaster recovery plan. Retrieved fromhttps://www.sans.org/reading_room/whitepapers/recovery/disaster-recovery-plan_1164 In this article, you will be introduced to the important aspects of a disaster recovery plan.
  • Devlen, A. (2003, March 10). 12 key elements of an enterprise-wide disaster recovery program.ITManagementNews. Retrieved from https://archive.itmanagementnews.com/articles/0310ad.html In this article, you will explore the essential elements that an organization's disaster recovery program should include in order to be effective.

Reference no: EM131086009

Questions Cloud

Developing deployment proposal : Many organizations use graphical representation for discussing important proposals. The presentation of your recommendation about investing in an appropriate IT solution to the stakeholders is equally important to the recommendation generating pro..
Where does customized adaptable vocation work viably : HI6007 Assessment - How does Customized adaptable work advantage both the association and representatives and where does Customized adaptable vocation work viably?
Calculate the increase in the rate of heat transfer : A solution with a boiling point of 180°F boils on the outside of a 1-in. tube with a No. 14 BWG gauge wall. On the inside of the tube flows saturated steam at 60 psia. The convective heat transfer coefficients are 1500 Btu/(h ft2 °F) on the steam ..
How is this affecting their overall brand perception : Nordstrom utilizes branding to create a more positive work environment leading to a brand-driven organization. Discuss another organization that does this well. Conversely, discuss an organization that does not do this well. How is this affecting ..
Application-incorporating security into it processes : Security in an organization does not reside in a silo; it is affected by other processes and vice versa. Therefore, security should be integrated into the overall IT process to make it effective.
Determine the amount of entropy produced, in kj/kg k : The temperature rise is brought about adiabatically by stirring the air with a paddle wheel. Determine the amount of entropy produced, in kJ/kg ? K.
Recommend for naming files in business : What kinds of rules would your recommend for naming files in business? For personal use?
How does mcommerce facilitate the purchase : Determine whether these values encourage or discourage use or ownership and why. Is mCommerce an advantage or disadvantage to the purchase?
Find a maximum weight perfect matching in the graph : ASSIGNMENT 5. Consider the complete bipartite graph K4,4 with vertex partition (A, B) where A = {a, b, d, f}, B = {g, h, i, j}. Use this to find a maximum weight perfect matching in the graph, and an optimal solution for the dual problem

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Calculate the length of the remaining side

The hypotenuse of a right angle triangle is 5m and the length of one of its sides is 3m. Calculate the length of the remaining side.

  Developing the subnet calculator using visual studio

Create a Visual Basic .NET Windows Application with the following user requirements:

  Find all the information for the homework

Have to write a small program that prompts the user to enter a temperature in degrees Fahrenheit and then prints a massage as to whether Attached you will find all the information for the homework.

  Explaining it solutions to enhance workflows

The final method to include IT is not to go "looking for IT solutions" just for sake of using IT. But to have IT at the table to truly think about ways to develop workflows.

  Review julie hilden arguments

Review Julie Hilden's arguments

  Width and distance text boxes for vertical

You are to write a software application using the Java programming language that enables a user to  design a flag. The user draws circles or ellipses, horizontal or vertical bars on the flag. The user chooses the colour, width, height and location..

  Classify the following vulnerabilities using the risos model

Classify the following vulnerabilities using the RISOS model. Assume that the classification is for the implementation level. Justify your answer.

  Calculates how many km had went a man

Write a program that calculates how many km had went a man and how far he was from the initial point .

  Applications in an imperative programming language

There are a range of issues to consider when developing multi-threaded applications in an imperative programming language such as Ada, C++ or Java.

  Explaining slash dotted and flash crowd

What do terms slash dotted and flash crowd signify to?

  Create a new file called testwork

Create a new file called TestWork.scr Change the permissions on this new file to add the execute bit for user, group, and owner.

  The power of computers to solve big problems

A field in which people use the power of computers to solve big problems.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd