Define comprehensive security management plan

Assignment Help Computer Engineering
Reference no: EM132263354

Question: Key Assignment

You will submit the Key Assignment Final Draft. In addition, a summary of 3-5 pages for the Security Training module section of the Comprehensive Security Management Plan will be included as the final section.

The final step in developing the Comprehensive Security Management Plan is to define a training module. Begin by defining all roles (management, developers, administrators, clerical, etc.) that have security training and awareness needs. Then, suggest a list of courses and workshops. With the list of roles and list of courses and workshops, create a cross-reference in the form of a matrix that includes all of the training needs. In 3-5 pages for the training module, include the list of roles, courses with detailed information, and the training matrix.

The project deliverables are the following:

1. Update the Comprehensive Security Management Plan title page with new date.

2. Update the previously completed sections based on the instructor's and your peers' feedback.

3. Use the subheading "The Training Module."

• Define a training module.

• Include a list of roles (developers, administrators, clerical, etc.).

• Include a list of courses and workshops.

• Include a cross-reference matrix of training.

4. Finalize the Comprehensive Security Management Plan.

• Review the entire document for any changes and improvements to be made.

• Ensure that this final version of the plan is sufficiently detailed to allow the organization to confidently move forward with the implementation of the Comprehensive Security Management Plan based on recommendations.

• Any previous feedback should be addressed with appropriate changes.

5. Be sure to update the table of contents before submission.

6. Name the document "yourname_CS654_IP5.doc."

Part 1 Tasks (Objectives from Weeks 1-4)

This course has been comprised of a series of Individual Project assignments that have contributed to a Key Assignment submission at the end of the course. Each week, you have completed a part of a Comprehensive Security Management Plan. The Key Assignment should include the following tasks:

1. Week 1: Security Working Group (WG)

• Discussion of the enterprise security management responsibilities implemented as a service with contributions from roles throughout the enterprise using the WG model applied to the project

• A definition of roles and responsibilities for management of security using the WG model applied to the project

• An understanding of communication flows with the WG model with application to the project

2. Week 2: Needs Assessment

• Description of existing organization and what it already has in place for a security architecture

3. Week 3: Security Policy Content and Risk

• An overview of the content that should exist in security policy, security standards, security procedures, other related security documentation

4. Week 4: Security Models and Design Principles

• Key Assignment First Draft for peer review

• Relate security design principles to their proposed system changes

Part 2 Tasks (Objective from Week 5):

1. Security Training

• Submit the Key Assignment Final Draft.

• Analyze previous submissions, and make changes as necessary to the final paper to be prepared this week.

• Continue development of the Comprehensive Security Management Plan with a training module for explaining the roles and security training and behavioral needs for each.

Reference no: EM132263354

Questions Cloud

Present the budget at a high level by payer type : Prepare an executive summary which should give background information on the hospital and how Medicare inpatient reimbursement is structured.
Demonstrate the lru page replacement algorithm : Demonstrate the LRU page replacement algorithm for the given example. There are 8 pages and 4 frames. Consider the page referencing string.
Routing algorithm may use one of three possible metrics : In order to select the "best" path a routing algorithm may use one of three possible metrics: (1) the minimum number of hops, (2) the minimum delay
Types of breakthroughs in artificial intelligence : What types of breakthroughs in artificial intelligence do you think you will see in your lifetime?
Define comprehensive security management plan : You will submit the Key Assignment Final Draft. In addition, a summary of 3-5 pages for the Security Training module section of the Comprehensive Security.
Sample code for each of the three hazards : In CDC6600, describe how the WAR, WAW and RAW are handled by using a sample code for each of the three hazards.
Develop a detailed Capstone Project Proposal and Plan : ITC571 Emerging Technologies And Innovation Assignment - Project Proposal and Plan, Charles Sturt University, Australia. Develop a Capstone Project Proposal
Business administration concentration in human resources : What is the desired field of study(which is Business Administration concentration in Human Resources), specific events that led you to that field
Discuss the team dynamics for a highly ineffective team : Discuss the team dynamics for a highly effective or ineffective team of which you were a member. Can you explain why the team performed so well or so poorly?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd