Create a cyber-security policy describing the principle

Assignment Help Management Information Sys
Reference no: EM132080993

Project Deliverable : Cybersecurity Policy Catalog

Project Deliverable is a two-part deliverable using MS Word and MS Project, or their open source equivalents. This assignment focuses on information as an asset and logical security techniques for a hypothetical law firm.

The goal of this deliverable is to secure an information security policy, suggesting the fundamental guidelines should an untoward event occur.

It can be seen that information assets security management can be reduced down to three (3) basic principles: integrity, confidentiality, and availability. Structure a policy around and within computers and associated equipment, as well as the people using it.

Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.

Submission Requirements

Infrastructure Document (MS Word)

Security Project Plan (MS Project)

Section 1

Write a three to five (3-5) page paper in which you:

Create a cyber-security policy describing the principle, the objective, and policy statement for the law firm's company network.

Describe the roles and responsibilities by groups (e.g., position director of network security, the network security manager, network security engineers, IT area), defining roles and responsibilities.

Suggest the cyber-security policy statement, an explanation of the policy statement, and the reasons why the policy statement may be controversial.

Determine the security testing methodology you would use to facilitate the assessment of technical controls.

Section 2

Use Microsoft Project, or an open source alternative such as OpenProj, to create a security project plan for the law firm. The project plan should include:

Tasks, subtasks, resources, and predecessors.

An outline of the planning, analysis, design, and implementation phases.

The use of cyber-security in the information systems development life cycle.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Determine the strategy for cybersecurity and public policy development in the U.S.

Use technology and information resources to research issues in information assurance.

Write clearly and concisely about information assurance topics using proper writing mechanics and technical style conventions.

Reference no: EM132080993

Questions Cloud

Characterized by multicultural and multilingual teams : INcreasingly the global business environment is characterized by multicultural and multilingual teams.
Claims the game can beat a human chess : The maker of a computer chess game claims the game can beat a human chess champion 35% of the time.
What amount must invest in given issue : Tony Baustita needs $25,000 in 4 years. What amount must he invest today if his investment earns 12% compounded annually?
Discuss whether drug dogs at the traffic stops : Discuss whether drug dogs at the traffic stops and the drones are constitutional under the 4th Amendment.
Create a cyber-security policy describing the principle : The goal of this deliverable is to secure an information security policy, suggesting the fundamental guidelines should an untoward event occur.
Obtains the accompanying data : She records the height of both the father and son in inches and obtains the accompanying data. Are sons taller than their? fathers?
Estimates and costs considered as detailed estimates-costs : Why are rough estimates and costs considered as detailed estimates and costs?
Evaluation of unethical behavior in accounting profession : Write a 750-word evaluation of unethical behavior in the accounting profession. You may use examples from Enron, WorldCom, Adelphia, Tyco International.
Calculate and show the confidence interval : Calculate and show the confidence interval based on the significance level given above.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Explain how do the teams manage their team boundaries

Consider the different teams presented in your reading assignment. How do the teams manage their team boundaries?

  How do the physical and logical diagrams differ and why

How do the physical and logical diagrams differ, and why?Does your organization have guest WiFi? If so, describe what a guest must do to get onto the network. Do you think that access method is reasonable for guest WiFi, and if not how would you i..

  Analyze types of organizational and computer architectures

Examine the proposed business ethical problem that the Brazilian Federal Data Processing Service is presently experiencing. Determine whether you agree or disagree that Brazil's problem is an ethical one that should be corrected. Provide a rationa..

  Keeping the recent major investment in crm

In preparation for the meeting, you hire an outside consultant experienced in BI and CRM to give you an idea of what position you should take.

  Briefly describe the type of e-commerce

Briefly describe the type of e-commerce. Could the threat have been prevented by utilizing the steps of the security life cycle model? Why, or why not?

  Describe the seven critical characteristics of information

Describe the seven critical characteristics of information. How are they used in the study of computer security? What is risk appetite? Explain why risk appetite differs for every organization.

  Present your management plans and leadership strategies

Present your management plans and leadership strategies to inform stakeholders and gain buy-in.

  Discuss about article - the sorry side of sears

discuss specific ethical issues from the article and make recommendations for improvements.

  Explain risk assessment and risk management strategy

Develop a 10 pages comprehensive written risk assessment and risk management strategy for a particular infrastructure system(s).

  This post addresses windows 7 and backup terminologybriefly

this post addresses windows 7 and backup terminology.briefly describe the following three types of windows 7 updates

  Analyzing and contrasting cmm models

Identifying the key elements of BPM organizational infrastructure, including training and certification for master black belts, black belts and green belts.

  Describe important elements of an information security plan

Identify, define, and describe the three or four most important elements of an Information Security Plan. Be sure to identify and support why your selected.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd