Develop appropriate access control protocols

Assignment Help Computer Engineering
Reference no: EM131502093

Assignment: STATEMENTS OF POLICY

You will submit your plan pertaining to statements of policy. You will recommend protocols and mitigating factors to the organization. Justify how the disaster response protocols will mitigate the threats to and vulnerabilities of the organization. You will focus on disaster and incident response protocols as well as access control. Assess your proposed method for maintaining the success of the plan going forward. Justify how your method will ensure the ongoing effectiveness of the information assurance plan.

One of the most important aspects of information assurance is ensuring that proper policies and procedures are established within an organization. Without proper policies and procedures, there would be no order. By implementing appropriate statements of policy and developing effective procedures, IT administrators ensure that incidents can be appropriately responded to, and that individuals within the organization understand their roles within the information assurance plan. Individuals in an organization would not be able to adequately understand their roles without the establishment of these statements of policy.

Prompt: In Module Seven, you will submit your plan pertaining to statements of policy. You will recommend protocols and mitigating factors to the organization and justify how the disaster response protocols will mitigate the threats to and vulnerabilities of the organization. You will focus on disaster and incident response protocols as well as access control. Assess your proposed method for maintaining the success of the plan going forward and explain how your method will ensure the ongoing effectiveness of the information assurance plan.

Specifically, the following critical elements must be addressed:

I. Statements of Policy

a) Develop appropriate incident response protocols to respond to the various threats and vulnerabilities identified within the organization.

b) Justify how the incident response protocols will mitigate the threats to and vulnerabilities of the organization. Support your justification with information assurance research and best practices.

c) Develop appropriate disaster response protocols to respond to the various threats and vulnerabilities identified within the organization.

d) Justify how the disaster response protocols will mitigate the threats to and vulnerabilities of the organization. Support your justification with information assurance research and best practices.

e) Develop appropriate access control protocols that provide an appropriate amount of protection while allowing users to continue to operate without denial of service.

f) Justify your access control protocols. Support your justification with information assurance research and best practices.

g) Recommend a method for maintaining the information assurance plan once it has been established.

h) Justify how your maintenance plan will ensure the ongoing effectiveness of the information assurance plan. Support your justification with information assurance research and best practices.

use double spacing, 12-point Times New Roman font, and one-inch margins. Sources should be cited according to APA citation method. Page-length requirements:4-5pages excluding cover page and reference page. Make sure you cite if you take a piece of someone's work, very important and also your reference should relate to your writing (don't cite a reference because it relates to the course and not this very paper) at least 4 references.

Reference no: EM131502093

Questions Cloud

Discuss the role of ports within intermodal transportation : Discuss the role of ports within intermodal transportation and the importance effective network design has on port operations.
Create a flowchart of the original supply chain : Create a flowchart of the original supply chain and how Chipotle supplies each of the restaurant chains. Provide your own commentary.
Members in a strategic hrm environment : How might organizations work with unions to achieve strategic HRM goals, and how might unions prepare to represent their members in a strategic HRM environment?
Describe the impact of cultural on communication : Describe the impact of cultural on communication and identify strategies you can use to demonstrate cultural sensitivity when working in human services settings
Develop appropriate access control protocols : Develop appropriate access control protocols that provide appropriate amount of protection while allowing user to continue to operate without denial of service.
Technology and the legal implications : Assess at least three factors that companies must consider with respect to ease of use, ease of management, integration, scalability, mobility, vendor support.
Legal liability issues for employers : What are legal liability issues for employers when their employees have drug or alcohol problems?
Compensation liability which still exist today : What are some employer defenses to worker compensation liability which still exist today? What role can a drug-free workplace policy play?
Problem regarding the independent contractor : How does a company determine if a worker is an employee rather than an independent contractor? What legal standards or rules are used?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd