Examine what should not be included in the policy

Assignment Help Other Subject
Reference no: EM131826587

Question: Group Work (135 points) - This is an group assignment. My part of the assignment is the highlighted and underlined portion in the assignment details below called Social Engineering Safeguards. My part should only be 2-3 pages.

Ignore the 7-10 pages portion of instructions. That's what we will turn in as a group.

Assignment Details: Your group is working for a global organization that handles highly classified intellectual property. In many situations and scenarios, the implementation and operations teams have been creating and setting up environments that violate your vision for security. After discussing the situation with various parties, they all admit they do not fully know or understand what is expected from them as they set up and configure the environment. To solve this situation, your group has been asked to create a network security policy for the organization.

Each group member will choose an element of the policy to design and the group will collaborate on what the overall design and outline should look like and include components from end user behavior and training plan, file and folder access, social engineering safeguards, bring your own device policies, use of external drives on company assets, security hardware, penetration testing, and affiliation of the information security department with law enforcement agencies. Students may either interview someone in the local FBI field office or research the FBI and DHS Web sites related to information sharing programs that the government offers, as this could be advantageous to the organization's information security program.

To keep the scope narrow, your group should first describe what should be included and what should not be included in the policy (remember that a policy should clearly set management's expectations).

After the scope has been defined, research the various components, and create an appropriate policy.

Prepare a Word document of 7-10 pages (excluding title page, abstract and references page) that includes the network security policy for an organization that addresses all of the stated design requirements. It should be in APA format, including an introduction and conclusion.

Reference no: EM131826587

Questions Cloud

Spam mail percentages : The National Technology Readiness Survey sponsored by the Smith School of Business at the University of Maryland surveyed 418 randomly
Discuss employee and management responsibilities : Discuss employee and management responsibilities with regards to Information Security and combatting SE. Make sure your work clarifies your opinion.
Unemployment and relationship problems : Unemployment and relationship problems. A USA Today/Gallup poll conducted between 2010 and 2011 asked a group of unemployed and underemployed Americans.
Point estimate can be statistically significant : "With large sample sizes, even small differences between the null value and the point estimate can be statistically significant."
Examine what should not be included in the policy : To keep the scope narrow, your group should first describe what should be included and what should not be included in the policy.
Write and run SQL statements - What is the max balance : Task - Write and run SQL statements to complete the following tasks - Find the customers whose balance is greater than $300 but less than $400
Conduct a hypothesis test based on a sample : Same observation, different sample size. Suppose you conduct a hypothesis test based on a sample where the sample size is n = 50, and arrive.
Interpret this interval in context of the data : (a) Interpret this interval in context of the data. (b) What does "95% confident" mean? Explain in the context of the application.
Review problem on human-computer interface journal : Keep a human-computer interface (HCI) journal with your weekly observations of HCI issues that pertain to you, your work, your family, and your friends.

Reviews

Write a Review

Other Subject Questions & Answers

  Cmpare at least two countries where sex tourism can be

compare and contrast at least two countries where sex tourism can be found thailand and brazil. is it legal or illegal?

  Understanding of the problem of evil

We will improve our understanding of the problem of evil if we compare our answers for questions 1-4 with answers given by followers of faiths other than Christianity. Find an internet site sponsored by a religion other than your Christianity. Res..

  Social impacts and controversies

Baase states that it is not only technologies and systems that change quickly, but also the social impacts and controversies that are inherent in such rapid development. Discuss some of the positive and negative aspects that the pace of advancement h..

  How global fashion is currently influencing india

Can anyone else provide examples of how global fashion is currently influencing India and how Indian fashion is influencing global fashion trends

  Significant use of extended monologues

In Hamlet, Shakespeare makes significant use of extended monologues, or soliloquies, to express the thoughts and feelings of Hamlet in dramatic form. For this assessment, write an essay in which you explore the use of this technique in three disti..

  What is the importance of expert testimony

Provide specifics about the investigation/background of the case. Were there any problems associated with handling the evidence in this case?

  Ethics codes and codes of conducts contribute

Do you feel ethics codes and codes of conducts contribute to an ethical environment? Why or why not?

  Popular culture and art issues

What list of found objects and imagery would you use if you were creating an art work about your daily experience?

  What is the maximum time that can be crashed

What is the bookstore's optimal order quantity given this quantity discount information? Why? What will be its annual inventory cost (including the holding cost, ordering cost and cost of the sweatshirts) for this optimal order quantity?

  Define equatorial celestial coordinates-right ascension

Describe the concept of the Celestial Sphere and the various point & lines defined on its surface. What are constellations? How come most constellations don't look much like the persons/animals/objects... that they're named after? Define the equatori..

  Define political ecology

Define "political ecology" IN YOUR OWN WORDS. Be as concise and complete as possible. Apply this definition and analyze an event that was reported in this week's news. Include a link to the news report upon which you have based your analysis.

  Analyzing terrorism

Eric Robert Rudolph is a serial bomber whose terrorist acts included bombing Centennial Park during the 1996 Olympic Games in Atlanta

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd