Describe the principles of security management

Assignment Help Computer Network Security
Reference no: EM13974761

As you begin to craft a Security Management Plan for your organization to secure and protect the quality and integrity of the data, you will take this opportunity in the first assignment to create the shell of your Security Management Plan.

The assignments each week build upon the work and knowledge from the weeks beforehand. You will create 1 document that contains all of the weekly assignments-in separate sections-culminating with the final submission being a single document containing all of the weekly assignments.

You are responsible for adding each of these ongoing Individual Project assignments into your Key Assignment document that will contain a security plan for the organization to be used to protect the organization's assets.
The project deliverables are as follows:

Security Management Plan
Use Word
Title page
Course number and name
Project name
Your name
Date
Table of Contents (TOC)
Use an autogenerated TOC.
This should be on a separate page.
This should be a maximum of 3 levels deep.

Be sure to update the fields of the TOC so that it is up-to-date before submitting your project.

Section Headings (create each heading on a new page with "TBD" as content, except for Section 1)

Section 1: Information SecurityManagement (Week 1)

This section will be used to describe the organization and will establish the security model to be used by the organization.

Section 2:Security Program (Week 2)

This section will focus on existing frameworks that can help in the implementation of a security plan and what a security organization should look like.

Section 3:Security Policies (Week 3)

This section looks at security policies and their creation.

Section 4:Assessing Risk (Week 4)

This section will focus on risk assessments and methodologies used to perform one.

Section 5: ControllingRisk (Week 5)

This final section combines all of the previous sections and gives the opportunity to look at mechanisms to control risk.

Create the following section for Week 1:

Section 1: Information Security Management

Describe an organization of your choosing, for which you will implement a security program.

Describe the principles of security management, including the following:

People
Process

Technology

Describe the role of project management with respect to implementing security management.

Describe how you plan to instill a secure mentality into an organization, including a tie into the project management discussion about when security concepts should be introduced into the project lifestyle.

You should provide at least 2-3 pages of discussion for this information.

Reference no: EM13974761

Questions Cloud

Analyze the business-level strategies for nikon corporation : Analyze business-level strategies for the NIKON corporation you chose to determine the business-level strategy you think is most important to the long-term success of the firm and whether or not you judge this to be a good choice.
How many times is the basic operation executed : Consider the following algorithm ALGORITHM Enigma(A[0...n-1,0...n-1])) for j=0 to n-2 do for k=j+1 to n-1 do If A[j,k] (not equals to) A[k,j] return false return true- What does this algorithm compute? What is its basic operation?
What are the companys reviews on glassdoor like : What are the company's reviews on glassdoor.com like? What information do you find using social media such as Twitter, Facebook and LinkedIn?
Marginal cost of borrowing : A bank offers two 30 year, fixed rate, fully amortizing LPMs: an 85% LTV loan at 6%, and an 80% LTV loan at 5.5%. What is the marginal cost of borrowing if the loan is going to be held for 10 years?
Describe the principles of security management : Describe how you plan to instill a secure mentality into an organization, including a tie into the project management discussion about when security concepts should be introduced into the project lifestyle.
Important aspect to companies : The first discussion is all about working capital. Working capital is the money needed to fund the normal, day to day operations of your business.
Examine the budgetary constraints : Examine the budgetary constraints that correctional officials work with as they operate correctional facilities. Determine the major trade-offs made between the policy for proper funding and the practice of proper funding to prevent recidivism. Pr..
Company interest expense for the year : Income Statement (EBIT) was $6 million, and the company pays a 40 percent tax rate. What was the company's interest expense for the year? [Hint: Divide $3 million by (1 - T) = 0.6 to find taxable income.]
Calculate the price elasticity of demand for type b : Calculate the price elasticity of demand for Type B consumers at the monopolist's profit maximizing price.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd