Create a cyber-security policy describing the principle

Assignment Help Management Information Sys
Reference no: EM131404318 , Length: 5

Project Deliverable 5: Cybersecurity Policy Catalog

Project Deliverable 5 is a two-part deliverable using MS Word and MS Project, or their open source equivalents. This assignment focuses on information as an asset and logical security techniques for a hypothetical law firm. The goal of this deliverable is to secure an information security policy, suggesting the fundamental guidelines should an untoward event occur.

It can be seen that information assets security management can be reduced down to three (3) basic principles: integrity, confidentiality, and availability. Structure a policy around and within computers and associated equipment, as well as the people using it. Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.

Submission Requirements

Infrastructure Document (MS Word)

Security Project Plan (MS Project)

Section 1

Write a three to five (4-5) page full paper in which you:

Create a cyber-security policy describing the principle, the objective, and policy statement for the law firm's company network.

Describe the roles and responsibilities by groups (e.g., position director of network security, the network security manager, network security engineers, IT area), defining roles and responsibilities.

Suggest the cyber-security policy statement, an explanation of the policy statement, and the reasons why the policy statement may be controversial.

Determine the security testing methodology you would use to facilitate the assessment of technical controls.

Section 2

Use Microsoft Project, or an open source alternative such as OpenProj, to create a security project plan for the law firm. The project plan should include:

Tasks, subtasks, resources, and predecessors.

An outline of the planning, analysis, design, and implementation phases.

The use of cyber-security in the information systems development life cycle.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), no spacing before or after paragraphs, with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date.

The cover page and the reference page are not included in the required assignment page length.

Reference no: EM131404318

Questions Cloud

How ever is not observation of children wishful thinking : How ever, isn't this just wishful thinking? How can teachers with myriad of tasks to do every day possibly squeeze in observation and assessment of children? How will you accomplish this when you are responsible for a classroom of children?
Probability that they have left area before the next defect : If they remain at the machine long enough to observe 32 feet of aluminum being produced, what is the probability that they will have left the area before the next defect occurs?
Probability next highway fatality experienced by association : What is the probability that the next highway fatality experienced by the association will not occur until more than a year from now? Until more than 2 years from now?
Explain act or state of team member ticking together tightly : Explain The act or state of team members ticking together tightly. Describe the most important insights about yourself in the group using the theories and models in this course and applying them to your insights.
Create a cyber-security policy describing the principle : Project Deliverable 5 is a two-part deliverable using MS Word and MS Project, or their open source equivalents. This assignment focuses on information as an asset and logical security techniques for a hypothetical law firm. The goal of this delive..
Probability that cheese will actually contain given ounce : What is the probability that a randomly selected package of this cheese will actually contain at least 20.5 ounces?
How the productivity standards will be calculated : Create a policy/procedure for coder's productivity and performance standards. Be sure to address IP, OP, and ER coders. How the productivity standards will be calculated?
Probability that he will be paired with someone : Madan has scored 83.0 on the test. What is the probability that he will be paired with someone whose score was within 5.0 points of his own?
Is the smaller press sufficient for this operation : Is the smaller press sufficient for this operation? If not, what recommendations would you make to allow the use of the smaller press?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Q1review which relates to the myths about business ethics

q1.review which relates to the myths about business ethics. select three myths and show why they represent a general

  Information technology - payroll and order entrypayroll and

information technology - payroll and order entrypayroll and order entry are types of transaction processing systems.

  State the functional dependencies in this table

Assume that students can take multiple courses and has only one major; also assume that one course is taught by one professor. Describe deletion, update, and insertion problems for this table. In what normal form is this table?

  Identify appropriate management solutions to address

Identify the appropriate management Solutions to address identified issues (20%)

  Show the impact of information systems

Show the impact of information systems/technology on automobile industry. Focus on Ford Motor Company and give recommendations on how to improve there information technology

  Analyze primary ways in which key federal initiatives impact

Determine the main advantages and disadvantages of the adoption of The HITECH (the Health Information Technology for Economic and Clinical Health) Act for health care professionals. Next, suggest one (1) strategy that the medical staff members cou..

  Why an internet system developer might choose one technology

Explain why an Internet systems developer might choose one technology over another technology. Explain how these technologies can bring value to the business or organization.

  How the use of e-commerce shopping cart has impacted

Apply the content from the articles to an essay about how the use of e-Commerce Shopping cart has impacted the way we do business.

  Technology use to solve business problems

Write paper on Technology use to solve business problems and increase efficiency

  Key components of disability access and inclusion plan

CSG3204 INFORMATION SERVICES MANAGEMENT. In Assignment, you were required to analyse the business practice known as a Disability Access & Inclusion Plan (DAIP) and to find an organisation with such a plan, discussing key components of this Plan

  Who are some targets or victims of hate crimes

Who are some targets or victims of hate crimes? What are some of the causes and effects of these crimes? What actions can be taken to minimize the occurrence of hate crimes?

  Explain what management strategies may be adopted

In addition to technical instruments, what management strategies may be adopted in order to prevent employees from compromising information security?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd