Identify a hypothetical organization

Assignment Help Management Information Sys
Reference no: EM131669193

Question:

The first step will be to select a real or hypothetical organization as the target for your Comprehensive Security Management Plan document.

This organization will be used as the basis for each of the assignments throughout the course and should conform to the following guidelines:

Nontrivial: The selected organization should be large enough to allow reasonable exercise of the security management analysis and planning processes.

Domain knowledge: You should be familiar enough with the organization to allow focus on the project tasks without requiring significant time for domain education.

Accessibility: You should have good access to the people and other information that is related to the organization because this will be an important part of the process.

The selected organization may already have security management in place, but it may still be used as the basis for the projects in this course.

The selected organization must have a need for some kind of security management as part of its operations.

Feel free to identify a hypothetical organization that meets the requirements.

You may make any necessary assumptions to fulfill the requirements of organization selection.

Select an existing organization or identify a hypothetical organization that fits these requirements, and submit your proposal to your instructor before proceeding further with the assignments in the course. Approval should be sought within the first several days of the course through an e-mail proposal to your instructor.

Assignment

The first task in this process will be to select an organization or identify a hypothetical organization to use as the basis of the projects. Next, you will create the shell document for the final project deliverable that will be worked on during each unit. While you proceed through each project phase, content will be added for each section of the document to gradually complete the final project. Appropriate research should be conducted to support the development of the document, and assumptions may be made.

For the first phase of the Comprehensive Security Management Plan document, you will create an enterprise organizational chart in the first document section. A proposed security working group (WG) organization and its ties to the enterprise will be added. Finally, include a 1-page discussion of the flow of information, decision-making communication, and responsibilities of the chief security officer (CSO). Create the skeleton for the Comprehensive Security Management Plan as follows:

Table of Contents (TOC)
Use an auto-generated TOC.
This must be on a separate page.
This must be a maximum of 3 levels deep.
Be sure to update the fields of the TOC before submitting your project.
Section Headings (Create each heading on a new page with "TBD" as content, except for the sections that are listed under "New Content.")
Project Outline (Week 1)
Security Requirements (Week 1)
Security Business Requirements (Week 2)
Security Policy (Week 3)
System Design Principles (Week 4)
The Training Module (Week 5)
References

Reference no: EM131669193

Questions Cloud

Determining the part-time job : Future Value of Annuity. Michelle is attending college, has a part-time job, and lives at home. Michelle wants to prepare for the possibility that she may have
Determine land shark bid amount : Use ASP to apply simulation optimization to determine Land Shark's bid amount that would maximize its expected return on the upcoming auction.
How will your communication strategies change for group : Discuss why it is important to report your results to both of these groups. How will your communication strategies change for each group?
What is the standard deviation of the project duration : Using the PERT distribution in ASP to represent the duration of each activity, construct a simulation model to compute the total time to complete the concert.
Identify a hypothetical organization : Select a real or hypothetical organization as the target for your Comprehensive Security Management Plan document - identify a hypothetical organization
Which therapeutic approach will be the most effective : After informing a prospective patient about limits of confidentiality, the patient consents to the "conditions" of confidentiality and signs an informed consent
How can your social organization use emerging technologies : Discussion Post- How can your social organization use emerging technologies to meet the goals you chose?
Shares of common stock outstanding : Your firm has 10,000 shares of common stock outstanding, and the current price of the stock is $100 per share. There is no debt; thus, the "market value" balanc
Funds in a mutual fund : You would like to travel 5 years from now, and you can save $3,100 per year, beginning one year from today. You plan to deposit the funds in a mutual fund

Reviews

len1669193

10/5/2017 7:04:33 AM

System Design Principles (Week 4) The Training Module (Week 5) References The following are the project deliverables for Week 1: New Content Project Outline and Security Requirements Include a brief description of the real or hypothetical organization in which the Comprehensive Security Management Plan will be implemented. Include the company''s size, location(s), and other pertinent information. Initial Security Projects Corporate organizational chart WG structure and ties added to corporate organizational chart Memo discussing communication flows with WG Name the document "yourname_CS654_IP1.doc."

len1669193

10/5/2017 7:04:26 AM

Create the skeleton for the Comprehensive Security Management Plan as follows: Use Word Title Page Course number and name Project name Your name Date Table of Contents (TOC) Use an auto-generated TOC. This must be on a separate page. This must be a maximum of 3 levels deep. Be sure to update the fields of the TOC before submitting your project. Section Headings (Create each heading on a new page with "TBD" as content, except for the sections that are listed under "New Content.") Project Outline (Week 1) Security Requirements (Week 1) Security Business Requirements (Week 2) Security Policy (Week 3)

Write a Review

Management Information Sys Questions & Answers

  Using a database for strategic business development

Using a Database for Strategic Business Development chieving Operational Excellence - Building a Relational Database for Inventory Management

  Using the following data regarding hospital monthly

1. using the following data regarding hospital monthly expenditures in 000s of dollars evaluate normality. are the

  Discuss the topic of big data and the applications

Identify two related articles published RECENTLY that describe/discuss the topic of Big Data and the Applications.

  What is level of it-business integration for organization

What is the level of IT-business integration for your organization? How is the value of IT assessed in your organization? How might your organization improve IT strategic alignment with business?

  Research the evolution of the telecommunications industry

Research the evolution of the telecommunications industry based on this week's Electronic Reserve Readings.

  Database administrator maintains and supports

Network Solutions, Inc (NSI) provides network services and NSI's database administrator maintains and supports its database systems

  Identify particular strengths and weaknesses of the set

Explain the methodologies and statistical techniques used in research in criminal justice.Explain the principles of your selected approach.

  Describe the objectives of the database environment

Describe the problems and constraints. Describe the objectives of the database environment. Describe the scope and boundaries. List the data specifications (must include a minimum of three entities with attributes).

  Discuss the information technology specialization

Select a System/Software Development Life Cycle (SDLC) model and methodology then apply this model and methodology to a project using the Information Technology (IT) specialization in Banking Industry Be sure to define the SDLC model and methodol..

  Discuss hardware costs of auctionads

AuctionAds.com (a real company), had a modest web server setup that took up about a third of a standard 42U rack in 2009 (see slide 12 in lecture 13).AuctionAds.plc (a fake company very similar to AuctionAds.com, with an identical setup) expects ..

  Computing problems digipos faced with system upgrades

Examine and assess the main computing problems Digipos faced with regard to system upgrades. Evaluate the solutions that Digipos used to resolve the problem. Propose an alternative solution that you believe could resolve the problem

  Create an annotated bibliography with all of your articles

For this assignment, locate and read seven scholarly articles on a topic of interest in Information Systems. Next, create an annotated bibliography with all of your articles. Annotated bibliographies contain an alphabetical list of your references..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd