Create a section in the plan to list all of the policies

Assignment Help Management Information Sys
Reference no: EM131385241

Assignment # 1

IP: The Network Security Policy

For this assignment, you will create 2 additional sections for the Network Security Plan document.

First, you will create a 2-3-page section in the plan to list all of the policies that you would have for your organization and a brief description of what each policy will contain. After the risks, have been identified within an organization, you must devise a plan that will provide the best possible protection without significantly impacting daily operations. Then, you must write and implement written policies that will inform everyone within the organization what can and cannot be done while they are connected to the Internet.

Written polices need to adhere to the following guidelines:

o No more than 2 pages

o Clearly identified rules

o Clearly identified punishments if rules are not followed.

o A way to monitor the network for violations of the policy.

The following are the first task's deliverables:

o Update previous sections based upon your peers' and instructor's feedback

o Update the table of contents.

o Update date on the cover page.

Security Policies Section

o Identify what written polices need to be created for your organization.

o For each policy, you will address how you plan to monitor the policy.

o For each policy, you will provide what you feel the appropriate punishment should be for violators. These punishments must be able to be enforceable, not just a threat.

o For each policy, you will identify a timetable for when each policy should be reviewed and updated and who will do the review.

The second task this week is to prepare for how you would handle an incident. It is best to have a thorough, rehearsed plan to be prepared for a potential incident. This will help to limit the damage and it will help recovery afterward.

You will create an Incident Response section of 2-3 pages that includes the actions that need to occur when an incident is in progress.

The following are the second task's deliverables:Incident Response Section

o Identify the process of how your organization will identify an incident.

o Identify the process for classifying the incident.

What are the criteria for each classification within the organization?

o Identify what the response will be for each classification identified.

o Identify a general plan to recover from the incident.

o Identify a process for evaluating the incident response plan after each incident has been mitigated.

o Discuss how the incident response plan will be tested and updated.

o Name your document "Yourname_CS653_IP4.doc."

• Objectives:

o Develop a network security policy.

o Recognize the fundamentals of privacy, confidentiality, and access required to establish and sustain network security.

Assign #2

Software Information Assurance: Week 4 IP

As part of the development of an information security plan, you need to develop a strategy for identifying and promptly remediating information security vulnerabilities to minimize information security breaches. For this assignment, you will continue the planning process by adding the Vulnerability Management section to the Information Security Assurance Implementation Plan. Based on the work from Weeks 2 and 3, you will select a solution strategy for the organization to implement information security quality assurance. As part of the solution strategy, you will make recommendations for prioritizing, budgeting, implementing, and maintaining risk-reducing countermeasures.

The project deliverables for Week 4 are as follows:

• Update the Information Security Assurance Implementation Plan title page with the new date.

• Update the previously completed sections based on the instructor's feedback.

• Vulnerability Management
Select and describe a solution strategy for the organization to implement information security quality assurance based on your previous work from Weeks 2 and 3.

Recommend and justify your recommendations for prioritizing, budgeting, implementing, and maintaining risk-reducing countermeasures.

• Name the document "yourname_CS661_IP4.doc."

• Be sure to cite all references in APA format.

Reference no: EM131385241

Questions Cloud

What is the most serious weakness in interviewing process : What steps and/or topics would you recommend for inclusion in the orientation program of a printing firm with 65 employees?
Whether adequate provisions have been made for replacement : Determine whether adequate provisions have been made for replacement of key management personnel when it becomes necessary. Is the firm using any form of executive development?
What problems are involved in using incentive plan : Is the use of a profit-sharing plan desirable in a small business? What might lessen such a plan's effectiveness in motivating employees?
How we attempt to solve problems when richard feinberg said : Pointing to the tough realities, such as globalization, faced by one or two nations studied during throughout the course, explain what you think Richard Feinberg meant about how we attempt to solve problems when he said.
Create a section in the plan to list all of the policies : create a 2-3-page section in the plan to list all of the policies that you would have for your organization and a brief description of what each policy will contain. After the risks, have been identified within an organization, you must devise a p..
What are the greatest benefits of employee leasing : How does employee leasing differ from using a temporary help agency? What are the greatest benefits of employee leasing?
To what extent should a small firm use old timers : To what extent should a small firm use "old-timers" to help introduce new employees to the workplace? Is it inevitable that newcomers will look to old-timers to find out how things really work?
Explain step-by-step process of conducting dismissal meeting : Describe a step-by-step process of conducting the dismissal meeting. Determine the compensation that the fictitious company may provide to the separated employee.
How will an employees age affect the appeal of given plan : How will an employee's age affect the appeal of this plan? What other factors are likely to strengthen or lessen its motivational value? Should it be changed in any way?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Five-component model of information systems and their

five-component model of information systems and their useslist and briefly explain the five-component model of an

  Discuss of benefits and disadvantages of using group policy

Pick on of the policy that is available in Windows 2012 Server and explain it. Why do you think this policy is an important one to implement in an organization? What are the negative consequences for not setting this up properly?

  Show benefit of leveraging organizational diversity

Benefit of Leveraging Organizational Diversity - This solution discusses the most significant benefit(s) of leveraging organizational diversity. The most important challenges in regards to diversity are also discussed.

  Differences between java and other languageswhat are the

differences between java and other languageswhat are the major differences between java programming language and any

  Estimate the percentage of people in india

Estimate the percentage of people in India who will eventually be on the Internet. Is Internet usage in India past the inflection point?

  Describe to the management what is involved in pbm

CIS3003 2016 Assignment. Research and describe to the management what is involved in PBM (Policy Based Network Management) approach to network management.  In your explanation provide a description of the benefits of the process, benefits to the ..

  Compare the different programming languages

conduct a detailed analysis base on the choosing programming language criteria and discuss any addition factor needed in order to compare the different programming languages and give final decision that could help the owner of the company to take ..

  Write a memo to the ceo of the company

Write a memo to the CEO of the company describing what you believe are the three most serious threats to the company from cyberattacks. These could be attacks directly against the company, or attacks against others than have indirect effect on the..

  Explain why is mis one of the most important courses for a

why is mis one of the most important courses for a business student?your response should be at least 200 words in

  What are my key development needs in my current role

What are my key development needs in my current role? As I consider my long term aspirations, what are my key development areas I should address now to move ahead?

  Draw a process model for the existing process

Draw a process model for the existing process using correct Business Process Modelling Notation - what changes could be made to make this process more efficient?

  What are privacy laws related to information technology use

What are the privacy laws related to Information Technology use and how do they impact you personally? Why and how it is used, the legal issues surrounding its use, and impacts on employer and employee?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd