Craft a security management plan for your organization

Assignment Help Management Information Sys
Reference no: EM131258724

Information Security Management

You have a course project that conflicts with the Syllabus. You will NOT be creating a project based on your own fictitious company as identified in the Unit 1 IP Assignment. You will complete the assignment based on the scenario in the Course Information page:

Here are the specifics:

Optiotronics Inc. of Seeton, California, started business in 1998. Optiotronics, a private firm, offers a revolutionary product leveraging state-of-the-art microtransmitters and video pixilation technology. Optiotronics' product provides a video display similar to a computer monitor embedded into a transparent contact lens. Optiotronics is a pioneer in the field of wearable computing with practical applications that provide heads-up, dashboard displays to several career fields, including the military.

Optiotronics faces a significant problem in managing the growth and security of its company. The company has spent an extraordinary amount of capital in resources & development; it has amassed volumes of intellectual property (copyrights, patents, and trademarks) that directly contribute to its competitive position. However, to accommodate growth, technology has been acquired and deployed without a great deal of centralized planning. Securing the electronic information system has become a paramount importance to the company's investors.

Responding to this threat, Dr. Melissa Broussard, CEO, has funded the executive position of Chief Security and Compliance Officer (CSCO), and has established the formation of an autonomous department independent of the internal IT structure. It is the mission of the CSCO to implement an information systems security program, manage, and audit the program. Also, the mission includes alleviating risks to the information system. Billions of dollars in potential revenues and the reputation of a world-class wearable computing manufacturer are on the line. Congratulations! You have been hired as the CSCO.

As you begin to craft a Security Management Plan for your organization to secure and protect the quality and integrity of the data, you will take this opportunity in the first assignment to create the shell of your Security Management Plan.

The assignments each week build upon the work and knowledge from the weeks beforehand. You will create 1 document that contains all of the weekly assignments-in separate sections-culminating with the final submission being a single document containing all of the weekly assignments.

You are responsible for adding each of these ongoing Individual Project assignments into your Key Assignment document that will contain a security plan for the organization to be used to protect the organization's assets.

The project deliverables are as follows:

• Security Management Plan

o Use Word
o Title page

- Course number and name
- Project name
- Your name
- Date

o Table of Contents (TOC)

- Use an autogenerated TOC.
- This should be on a separate page.
- This should be a maximum of 3 levels deep.
- Be sure to update the fields of the TOC so that it is up-to-date before submitting your project.

o Section Headings (create each heading on a new page with "TBD" as content, except for Section 1)

- Section 1: Information Security Management (Week 1)
- This section will be used to describe the organization and will establish the security model to be used by the organization.

Reference no: EM131258724

Questions Cloud

Describe what audit data is and how it is used : Describe what audit data is and how it is used. In the framework of the network and servers what devices should audit data be collected and where it should be stored. Describe a process or policy for how and when audit data should be reviewed.
What are the variable costs per unit : The variable costs per unit are $18 when a company produces 24,000 units of product. What are the variable costs per unit when 26,000 units are produced? The fixed costs per unit are $20 when a company produces 20,000 units of product. What are the f..
What training will need to be done prior to implementation : Now that you have identified the data sets, discussed the electronic health record (EHR) and computerized physician order entry (CPOE), and identified patient demographic information data elements that are necessary for the new system, you will be..
What are three basic approaches to negotiations : What is vertical integration? Give examples of backward and forward integration ? What are three basic approaches to negotiations?
Craft a security management plan for your organization : As you begin to craft a Security Management Plan for your organization to secure and protect the quality and integrity of the data, you will take this opportunity in the first assignment to create the shell of your Security Management Plan.
What is the value of online auctions in e commerce : What is the difference between postponement and channel assembly? What is CPFR? - What is the value of online auctions in e-commerce?
What will be the concentration of tce in the aqueous phase : After the system equilibrates, what will be the concentration (in units of pg/L) of TCE in the aqueous phase?
The nature and extent of required planning activities : According to PCAOB standards, the nature and extent of required planning activities for an issuer audit are influenced by all of the following factors, except for:
How does walmart use drop shipping : How does Walmart use drop shipping?- What are blanket orders?- How do they differ from invoiceless purchasing?- What can purchasing do to implement just-in-time deliveries?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd