Discuss each component and the specific information

Assignment Help Other Subject
Reference no: EM132239256

Question: You will need at least five scholarly references for the paper, to back up your assertions or ideas. You are free to use as many other references as needed, as long as you have five scholarly sources properly included.

Review information assurance policy templates via the SANS policy template site (https://www.sans.org/security-resources/policies) and select a template of your choice; such as the General / Acceptable Encryption Policy to download either the doc or pdf file. Utilize the downloaded template, from the SANS Policy website, and the Course Project Grading Rubric as a guide to provide a 5-page write-up highlighting key components that should be included during the development of an information assurance policy. Key components will include the following:

- Overview

- Purpose

- Scope

- Policy Compliance

- Related Standards

- Definitions

- Terms

Discuss each component and the specific information that can be included within each section of the policy.

Support your paper with five resources. In addition to these specified resources, other appropriate scholarly resources, including older articles, may be included.

Length: 5 pages not including titles page(s) and reference pages

Your paper should demonstrate thoughtful consideration of the ideas and concepts that are presented in the course and provide new thoughts and insights relating directly to this topic. Your response should reflect scholarly writing and current APA standards.

Please follow the attached Reflective Article Example Format, using whatever level one headers you like, that makes sense. Please keep in mind that you will not have an Article Reference header at the top of the paper, but you should still have a references section at the end.

Be sure to have a title page with running head and do not use a real company or organization name, make one up.

The purpose of this paper is to develop an information assurance policy. It should read like real guidance; you would deliver to your future or present company someday. The citations should be used to give clarity or credibility to a statement you are making, do not just cite something because you saw them say it that way or format their paper that way. Make a statement, then back it up with a citation from a scholarly source. Be sure to cover all that is described in the instructions for the assignment. It may be helpful to search the library for scholarly sources that describe what is in an "Information Assurance Policy," "Information Security Plan" or "Information Security Policy."

You might also want to search in the library for "Information Assurance Policy "and "Security Plan" and look for relevant examples, but be careful to not copy/paste, cite all borrowed ideas and use scholarly sources for at least 5 of those citations.

Reference no: EM132239256

Questions Cloud

Discuss the traditional areas of criminology : CJ-655 Perspectives in Criminology - Southwest University - Discuss the traditional areas of criminology and address popular topics such as policy debate
Explain the difference between sensation and perception : Explain the difference between sensation and perception. Why should user interface designers pay attention to users' perception of their interface?
Did you find any of these reasons or causes surprising : The decline in sheep and lamb numbers in the U.S. can be attributed to multiple reasons and causes.
How the different healthcare organizations within community : Discuss how three different healthcare organizations within your community use marketing tools to promote their products and services.
Discuss each component and the specific information : Discuss each component and the specific information that can be included within each section of the policy. Support your paper with five resources.
How internal monitoring and auditing is conducted : How internal monitoring and auditing is conducted. How compliance and practice standards are implemented.
Explaining the threat modeling techniques : Write a 3 to 5 page paper with proper APA formatting using the threat modeling techniques we have gone over thus far to uncover any threats that jump out.
Determine the percentage of ever-smoker males : Determine the percentage of ever-smoker males 65-75 years of age who have undergone CT screening.
Demonstrating a connection to your current work environment : Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

Reviews

Write a Review

Other Subject Questions & Answers

  Discuss the weaknesses of your envisioned design and methods

The strengths and weaknesses of your envisioned design and methods. Quantitative: threats to validity and how your design will address them. Quantitative: constructs you will measure and what you will do in order to determine how to operationalize th..

  Identify and discuss strategies for promoting ebp

How can you use EBP in your practice. - Identify and discuss strategies for promoting EBP in your practice.

  What was the best part of your internship experience

What was the best part of your internship experience? What was the worst part of your internship experience

  Identify two different kinds of mnemonic devices

Identify two different kinds of mnemonic devices that could help Dan remember dates for his history test.

  How universal health care came into being in saskatchewan

Explain how universal health care came into being in Saskatchewan. Who opposed it? How was this conflict resolved? Are you in favour of universal health care? Why or why not

  What is the most significant issue facing african americans

this essay should have at least three paragraphs and should have an introduction and a conclusion.at the start of the

  Research and examine current information security systems

Research and examine current information security systems designed to address social engineering security threats. Discuss the vulnerabilities of these systems and if they are capable of protecting businesses

  What’s the purpose of breakeven analysis

What’s the purpose of “breakeven analysis” (Hatten, 2009, p. 379)? How can it be used in a business’ pricing strategy?

  Stated purpose and use of the instrument

How is this test valid? How is it reliable?What steps were taken to ensure reliability?Normative data (on who was this test normed, if it was?)

  How should those who benefit from the past injustice respond

Give a concrete example of an intergenerational injustice. How should those who benefit from the past injustice respond to it in the present?

  Designing an exchange management program

Designing an Exchange Management Program. Review the "Case Application" at the end of Chapter 9: Exchange Risk Management at Merck.

  The result of many different types of actions

Forgetting can occur as the result of many different types of actions; for example, you may not have the correct cue for retrieval.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd