Determine enterprise areas of security responsibility

Assignment Help Computer Networking
Reference no: EM132349425

For this task you will be required to manage the security, privacy and compliance of a cloud service, and will require access to the following:

• The cloud information and communications technology (ICT) business specifications
• The cloud ICT security assurance specifications
• Management-related scenarios
• A cloud-focused security environment, including threats to security that are, or are held to be, present in the environment
• Information on the security environment, including:
o Laws or legislation
o Existing enterprise security policies
o Enterprise expertise
• Risk analysis tools and methodologies currently used in industry.

To demonstrate that you can effectively manage the security, privacy and compliance of a workplace cloud service, you will need to demonstrate how you:

1. Identify, document and discuss the cloud security issues, including both the business and commercial issues, that relate to the types of delivery and deployment models relevant to your workplace. (discuss this with your assessor)

2. Determine the specific enterprise areas of security responsibility and conduct some research into the relevant security controls and measures for each identified area.

3. Implement the most relevant security controls and measures identified.

4. Identify and document the compliance regulations that are relevant to data storage in your workplace.

5. Determine the business continuity and data recovery plans that are most relevant to your industry and enterprise.

6. Identify what logs and audit trails are available, secure them appropriately and develop a plan to maintain them.

7. Conduct some research to investigate and review the legislation, organisational and jurisdictional policy and procedures that relate to management of the following areas, to ensure that they meet the enterprise policy:
a. Cloud-related privacy issues relevant to your enterprise.
b. Relevant codes of ethics and conduct.
c. The principles of equal employment opportunity, equity and diversity.
d. Financial management requirements.
e. Governance requirements.

8. Implement any changes identified as required by the research conducted, and integrate them appropriately to the business continuity of operation program (COOP) and existing security plans.

9. Develop an ongoing performance measurement and evaluation review process to evaluate the security effectiveness of the implemented security controls.

10. Collect and collate all the relevant documentation required as part of the COOP as would be required for audit tracking purposes.
While you are demonstrating each of the above actions, you will need to keep a journal outlining each point. Ensure that you detail each point clearly outlining how you performed the action and what the outcome was. You must submit your journal as part of this assessment.

Reference no: EM132349425

Questions Cloud

Write a program to implement the secure unicast protocol : Write a program with two interfaces (one for sender, and the another for receiver) to implement the above secure unicast protocol
Is anything still unclear that could be clarified : What were the most compelling topics learned in this course? How did participating in discussions help your understanding of the subject matter?
Relationship between population increases and climate change : What is the relationship between population increases and climate change? Do you think fertility control is an effective strategy to halt climate change?
What type of vendor support you need after implementation : What type of vendor support and vendor maintenance will you need after implementation? How long will this be needed? Write 5 questions that your facility can.
Determine enterprise areas of security responsibility : Determine the specific enterprise areas of security responsibility and conduct some research into the relevant security controls and measures
Effectively to environmental or organizational pressures : In order for managers to respond effectively to environmental or organizational pressures that can be disruptive to an organization,
Create a data governance framework : From this chapter, in addition, the previous ones, we continue to enhance our knowledge and understanding about IG best business practices, and how good data.
Find you have difficulty listening effectively : In what situations do you find you have difficulty listening effectively? how do you think your own cultural values and experiences influence the way you listen
Briefly state organizations identified as targeted victims : According to the authors, privacy and security go hand in hand; and hence, privacy cannot be protected without implementing proper security controls.

Reviews

Write a Review

Computer Networking Questions & Answers

  Networking and types of networking

This assignment explains the networking features, different kinds of networks and also how they are arranged.

  National and Global economic environment and ICICI Bank

While working in an economy, it has a separate identity but cannot operate insolently.

  Ssh or openssh server services

Write about SSH or OpenSSH server services discussion questions

  Network simulation

Network simulation on Hierarchical Network Rerouting against wormhole attacks

  Small internet works

Prepare a network simulation

  Solidify the concepts of client/server computing

One-way to solidify the concepts of client/server computing and interprocess communication is to develop the requirements for a computer game which plays "Rock, Paper, Scissors" using these techniques.

  Identify the various costs associated with the deployment

Identify the various costs associated with the deployment, operation and maintenance of a mobile-access system. Identify the benefits to the various categories of user, arising from the addition of a mobile-access facility.

  Describe how the modern view of customer service

Describe how the greater reach of telecommunication networks today affects the security of resources which an organisation provides for its employees and customers.

  Technology in improving the relationship building process

Discuss the role of Technology in improving the relationship building process Do you think that the setting of a PR department may be helpful for the ISP provider? Why?

  Remote access networks and vpns

safekeeping posture of enterprise (venture) wired and wireless LANs (WLANs), steps listed in OWASP, Securing User Services, IPV4 ip address, IPV6 address format, V4 address, VPN, Deploying Voice over IP, Remote Management of Applications and Ser..

  Dns

problems of IPV, DNS server software, TCP SYN attack, Ping of Death, Land attack, Teardrop attack, Smurf attack, Fraggle attack

  Outline the difference between an intranet and an extranet

Outline the difference between an intranet and an extranet A programmer is trying to produce an applet with the display shown in Figure 1 below such that whenever one of the checkboxes is selected the label changes to indicate correctly what has..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd