Describe the details regarding the type of business

Assignment Help Other Subject
Reference no: EM132216277

Question: Security Needs and Objectives

Imagine you are a newly appointed Security Officer (SO). The Chief Information Security Officer (CISO) has given you sixty days (60) days to deliver a security policy plan to address the organizational growth that the company is anticipating. Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.

Use the Internet to research the process that leads to the identification of security needs in an organization. Also, research an organization with a security policy in place, and review how this organization laid down the foundation for its security policy. Review the business requirements for the security project plan. You will be asked to describe the detailed project including the scope of the project; possible security risks, constraints, and assumptions; integration with other systems and infrastructure; and relevant terms that were used throughout the security project.

Submission Requirements: • Document (MS Word)

Write a three to four (3-4) page paper in which you:

1. Explain the process that leads to the identification of security needs and how those needs lay down a foundation for a policy.

2. Describe the details regarding the type of business in which the company you researched is engaged.

3. Provide a description about the current system requirements activities within the organization you researched.

4. Describe the types of data that the company you researched collects to support the business. The description should include the following:

a. Operational systems

b. Analytics and interfaces

c. Infrastructure and security

5. Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA format.

Course learning outcomes associated with this assignment are:

• Discuss cybersecurity strategies and the various frameworks.

• Analyze the information planning concepts of change control in cybersecurity.

• Analyze the process of security need identification and determine its impact on a specific field of business.

• Use technology and information resources to research issues in information assurance.

• Write clearly and concisely about information assurance topics using proper writing mechanics and technical style conventions.

Reference no: EM132216277

Questions Cloud

How is corporate it governance different from usual practice : How is corporate IT governance different from the usual practice? What are the elements of risk analysis? To what extent are common risk factors.
What are computer-assisted audit solutions : In what possible ways can an IT auditor collect audit evidence in order to express opinions? List three (3) different techniques for project scheduling.
How aggregate functions help the organization understand : Suppose you have been hired as an IT professional to support database reporting functionality for a Human Resources system.
List specific fields that you would index : List specific fields that you would index. Analyze what would occur if the proper index is not included, with respect to your example.
Describe the details regarding the type of business : Describe the details regarding the type of business in which the company you researched is engaged. Provide a description about the current system requirements.
What evidence can you find to support your opinion : Steve Jobs was a strong, charismatic leader who co-founded Apple and is credited with much of the success of the company. Some believe that Tim Cook.
Develop a careful design before you begin the project : The project described below is from the American Computer Science League which was used in one of their early competitions. The project demands careful reading.
What is revenue model in business management : What is a revenue model in business management?
Enter employment and rise to leadership positions : Discuss the pros and cons in the trend for more women to enter employment and rise to leadership positions.

Reviews

Write a Review

Other Subject Questions & Answers

  Describe what sources the investigator used

Describe what sources the investigator used, what patterns of behavior were identified, and what information was given to law enforcement.

  Environmental problem

I have to write a paper on cognative dissonance and how it relates to a environmental problem occuring today. But I can't seem to connect the two and decide on a topic. What would some good topics be to write about?

  Discuss about the forum of equal employment

the ADA made were adequate in protecting and standing up for the rights of those with disabilities mainly through the forum of equal employment

  Encoding emotional experiences

The _____ plays an important role in encoding emotional experiences, such as fear responses.

  Discuss the importance of their role as advocate

Choose one legislator on the state or federal level who is also a nurse, and discuss the importance of their role as advocate for improving health care delivery

  Announced the recognition of a new disease

Imagine a fictional situation where a group of experts announced the recognition of a new disease, "Feline Imitation Disorder."

  Describe any of the experiences

Remember, do not describe any of the experiences, ideas, thoughts, or feelings that the self has, describe that self that has those experiences, ideas, thoughts

  Does the content include links to outside material

Does the content include links to outside material? Do the links lead to other credible sites? IF NOT, then the information is less credible.

  Explain the concept of cohort effects

Explain the concept of cohort effects. What cohort effects (e.g. historical or social events) might have influenced the parenting practices of each generation you described?

  Non-unionized environments

Explain why cooperative approaches may stand up to legal review more easily in unionized plants than in non-unionized environments?

  Essential to break cycle of poverty and population growth

Which of the following is NOT now considered essential to break the cycle of poverty and population growth in developing countries?

  Discuss school issues that influence at-risk children

For this unit, you will discuss school issues that influence at-risk children and youth and examine school structures, programs

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd