Reference no: EM13963256
One of the most important aspects of information assurance is ensuring that proper policies and procedures are established within an organization. Without proper policies and procedures, there would be no order. By implementing appropriate statements of policy and developing effective procedures, IT administrators ensure that incidents can be appropriately responded to, and that individuals within the organization understand their roles within the information assurance plan. Individuals in an organization would not be able to adequately understand their roles without the establishment of these statements of policy.
Prompt: In Module Seven, you will submit your plan pertaining to statements of policy. You will recommend protocols and mitigating factors to the organization and justify how the disaster response protocols will mitigate the threats to and vulnerabilities of the organization. You will focus on disaster and incident response protocols as well as access control. Assess your proposed method for maintaining the success of the plan going forward and explain how your method will ensure the ongoing effectiveness of the information assurance plan.
Specifically, the following critical elements must be addressed:
Statements of Policy-
a) Develop appropriate incident response protocols to respond to the various threats and vulnerabilities identified within the organization.
b) Justify how the incident response protocols will mitigate the threats to and vulnerabilities of the organization. Support your justification with information assurance research and best practices.
c) Develop appropriate disaster response protocols to respond to the various threats and vulnerabilities identified within the organization.
d) Justify how the disaster response protocols will mitigate the threats to and vulnerabilities of the organization. Support your justification with information assurance research and best practices.
e) Develop appropriate access control protocols that provide an appropriate amount of protection while allowing users to continue to operate without denial of service.
f) Justify your access control protocols. Support your justification with information assurance research and best practices.
g) Recommend a method for maintaining the information assurance plan once it has been established.
h) Justify how your maintenance plan will ensure the ongoing effectiveness of the information assurance plan. Support your justification with information assurance research and best practices.
Detailed brief for your organization board of directors
: You are the CISO (and Incident Response manager) for this organization. Your task is to prepare a detailed brief for your organization's board of directors, describing & discussing: What happened. The impact of what happened
|
What is the current drawn by a 75.0-w light bulb
: An object is placed 20 cm from a converging spherical lens. Give the general characteristics of the image for a lens with a focal length of f = 25 cm.
|
Write review about involving security policies and planning
: Write review about involving security policies, planning, and implementation to include multilevel security processes. Add 2 pages of information to your previously submitted updated outline.
|
What angle should the boad head
: A ferryboat sails between two towns directly opposite each other on a river. if the boat sails at 15 km/h relative to the water, and if the current flows at 6.3 km/h, at what angle should the boad head?
|
How incident response protocols will mitigate the threats
: Justify how the incident response protocols will mitigate the threats to and vulnerabilities of the organization. Support your justification with information assurance research and best practices
|
Speech on role of students in nation building
: Speech on role of students in nation building
|
Cost of capital for the division
: The return on capital in the division is 15 percent, and the corporate tax rate is 40 percent. If the cost of capital for the division is 9 percent, estimate the following:
|
Write the function definition as a recursive search
: Write the function definition as a recursive search, assuming a linked list implementation. After you have corrected the function, trace the execution of NumPaths with n = 4 by hand. Why is this algorithm inefficient?
|
Relative details of the firms in the drugstore industry
: You have been asked to assess whether Walgreen, a drugstore chain, is correctly priced relative to its competitors in the drugstore industry. The following are the price/sales ratios, profit margins, and other relative details of the firms in the ..
|