Define comprehensive security management plan

Assignment Help Computer Engineering
Reference no: EM132263354

Question: Key Assignment

You will submit the Key Assignment Final Draft. In addition, a summary of 3-5 pages for the Security Training module section of the Comprehensive Security Management Plan will be included as the final section.

The final step in developing the Comprehensive Security Management Plan is to define a training module. Begin by defining all roles (management, developers, administrators, clerical, etc.) that have security training and awareness needs. Then, suggest a list of courses and workshops. With the list of roles and list of courses and workshops, create a cross-reference in the form of a matrix that includes all of the training needs. In 3-5 pages for the training module, include the list of roles, courses with detailed information, and the training matrix.

The project deliverables are the following:

1. Update the Comprehensive Security Management Plan title page with new date.

2. Update the previously completed sections based on the instructor's and your peers' feedback.

3. Use the subheading "The Training Module."

• Define a training module.

• Include a list of roles (developers, administrators, clerical, etc.).

• Include a list of courses and workshops.

• Include a cross-reference matrix of training.

4. Finalize the Comprehensive Security Management Plan.

• Review the entire document for any changes and improvements to be made.

• Ensure that this final version of the plan is sufficiently detailed to allow the organization to confidently move forward with the implementation of the Comprehensive Security Management Plan based on recommendations.

• Any previous feedback should be addressed with appropriate changes.

5. Be sure to update the table of contents before submission.

6. Name the document "yourname_CS654_IP5.doc."

Part 1 Tasks (Objectives from Weeks 1-4)

This course has been comprised of a series of Individual Project assignments that have contributed to a Key Assignment submission at the end of the course. Each week, you have completed a part of a Comprehensive Security Management Plan. The Key Assignment should include the following tasks:

1. Week 1: Security Working Group (WG)

• Discussion of the enterprise security management responsibilities implemented as a service with contributions from roles throughout the enterprise using the WG model applied to the project

• A definition of roles and responsibilities for management of security using the WG model applied to the project

• An understanding of communication flows with the WG model with application to the project

2. Week 2: Needs Assessment

• Description of existing organization and what it already has in place for a security architecture

3. Week 3: Security Policy Content and Risk

• An overview of the content that should exist in security policy, security standards, security procedures, other related security documentation

4. Week 4: Security Models and Design Principles

• Key Assignment First Draft for peer review

• Relate security design principles to their proposed system changes

Part 2 Tasks (Objective from Week 5):

1. Security Training

• Submit the Key Assignment Final Draft.

• Analyze previous submissions, and make changes as necessary to the final paper to be prepared this week.

• Continue development of the Comprehensive Security Management Plan with a training module for explaining the roles and security training and behavioral needs for each.

Reference no: EM132263354

Questions Cloud

Present the budget at a high level by payer type : Prepare an executive summary which should give background information on the hospital and how Medicare inpatient reimbursement is structured.
Demonstrate the lru page replacement algorithm : Demonstrate the LRU page replacement algorithm for the given example. There are 8 pages and 4 frames. Consider the page referencing string.
Routing algorithm may use one of three possible metrics : In order to select the "best" path a routing algorithm may use one of three possible metrics: (1) the minimum number of hops, (2) the minimum delay
Types of breakthroughs in artificial intelligence : What types of breakthroughs in artificial intelligence do you think you will see in your lifetime?
Define comprehensive security management plan : You will submit the Key Assignment Final Draft. In addition, a summary of 3-5 pages for the Security Training module section of the Comprehensive Security.
Sample code for each of the three hazards : In CDC6600, describe how the WAR, WAW and RAW are handled by using a sample code for each of the three hazards.
Develop a detailed Capstone Project Proposal and Plan : ITC571 Emerging Technologies And Innovation Assignment - Project Proposal and Plan, Charles Sturt University, Australia. Develop a Capstone Project Proposal
Business administration concentration in human resources : What is the desired field of study(which is Business Administration concentration in Human Resources), specific events that led you to that field
Discuss the team dynamics for a highly ineffective team : Discuss the team dynamics for a highly effective or ineffective team of which you were a member. Can you explain why the team performed so well or so poorly?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Discuss how cryptography has been used for good

Cryptography has a long history, stemming from ancient times until the present day. It has had many uses, from keeping military secrets to helping plan terroris

  Discuss the testing process of mobile applications in detail

Discuss the difference in UI Design between IOS and Android. Discuss the UIKit framework in IOS and the different classes associated with it.

  Analyzing the attack using given information

Attack Analysis: After collecting evidence and analyzing the attack, the third party was able to recreate the attack. No-Internal-Controls, LLC has a number.

  Make program that take in a date in the format yyyymmdd

make program that take in a date in the format YYYYMMDD and output it as MM/DD/YYYY, where YYYY stands for year, MM stands for month, and DD stands for day.

  Discuss several definition mobile device forensics

In this assignment you will be required to research on state of the art in undertaking mobile device forensics. Specifically you may wish to consider the following items in your research: Discuss several definition mobile device forensics

  Store the given pizza names in a list

Think of at least three kinds of your favorite pizza. Store these pizza names in a list, and then use a for loop to print the name of each pizza.

  How to produce a work breakdown structure

How to produce a Work Breakdown Structure. Ensure main WBS tasks headings are the 5 PMBOK® process areas.

  List the possible formats for presenting menus to a user arc

List the possible formats for presenting menus to a user arc' explain under what circumstances each might be appropriate.

  Questioncustomer id number name varchar10001 akash

questioncustomer id number name varchar10001 akash kumar10002 vijay chopra10003 rahul mishratransactionsid number

  Show the sine of any angle typed on the keyboard

design a randome file of the sines of all angles from 0 degrees to 90 degrees. Make each entry accurate to three places. Write a program that will display the sine of any angle typed on the keyboard.

  How to insert a row into the student table

Make yourself a student by writing and executing an INSERT statement to insert a row into the STUDENT table with data about you. Use one of the zip codes you inserted.

  Implement a drop-out stack using an array

The array implementation in Introduction to Collections - Stacks, keeps the top variable pointing to the next array position above the actual top of the stack.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd