Justify every element in ethical and legal terms

Assignment Help Computer Engineering
Reference no: EM131723349

Preparation: Choose a real or hypothetical organization, corporation (profit or non-profit), or institution that uses IT in its products, services, activities, and/or operations. If you work in an organization or field that could benefit from an information network security policy, you might wish to apply the project to it.

Assignment: Prepare a well-written security policy proposal for your organization that utilizes the concepts learned in the course as a basis for your analysis and policy.

Make sure that your proposal includes the basic elements of a good security policy including:

1. Introduction describing your organization and its mission, products/services, technical resources, and technical strategy
2. Analysis of the organization's relationships to its clients/customers, staff, management, and owners or other stakeholders
3. A vulnerability assessment
4. Your recommendation, including:
5. a. Proposed remedial measures (as appropriate to the situation; these might include firewall/gateway provisions, authentication and authorization, encryption systems, intrusion detection, virus detection, incident reporting, education/training, etc.
6. b. Proposed code of ethics or code of practice to be applied within the organization
7. c. Legal/compliance requirements and description of how they will be met
8. d. Proposed security policy statement/summary

Important: Your proposal must justify every element in ethical and legal terms. In other words, you need to state why each policy/code element (including technical elements) is good for business and why it is good/sound ethical policy (i.e., how it is good for the organization and why it is good for customers, users, or employees, or the public). Also identify any ethical/legal tensions, conflicts, and/or contradictions and justify any trade-offs being made in the recommendation.

Discuss and cite at least three credible or scholarly sources other than the course textbooks (which can be cited as well) to support your analysis and policy choices. The CSU-Global Library is a good place to find credible and scholarly sources. Your paper should be 8-10 pages long with document and citation formatting per CSU-Global Guide to Writing and APA Requirements.

Recommendation: It is recommended that students review Chapter 8 in the course textbook, which is required reading for Module 6, early in the term and apply the knowledge therein to planning and drafting the Portfolio Project. In Chapters, 8, 10, and 12, Kizza (2014) discussed the role of a security policy in the compliance of an organization. He observed that in response to public outcry in the 1990s, governments went on a binge passing laws to regulate the new Internet. But privacy advocates pushed back and by the early 2000s, the result of much politicking was a mixed system of sectoral laws (dealing with specific situations) and largely voluntary norms. These norms were adopted by organizations and enshrined in security and privacy policies regarding data and networking. Kizza (2014) made the point that, "A good, balanced and unified approach to information security compliance consists of a good security policy that effectively balances and enforces core information security and compliance elements" (p. 199).

Incremental Deliverable due by 11:59 PM on Sunday of Week 2

Submit a brief description of the "real or hypothetical organization, corporation (profit or non-profit), or institution that uses IT in its product, activities, or operations" that will serve as the scenario for your Portfolio Project. If you work or have worked for an organization could benefit from an information network security policy, consider using your place of employment as the scenario for your project.

Your description should be at least a paragraph and no more than a page in length.

Reference no: EM131723349

Questions Cloud

Determine james maximum available line of credit : If the appraised value of James's residence is $197,500, what percentage of the home's esti­mated market value is the lender using to determine James's maximum?
Discuss evaluating security software : Use Internet resources or the Ashford University Library to identify two competing security products such as antivirus software
Do you anticipate the innovations the companies is engaging : Do you anticipate the innovations the companies is engaging in now will put the company, Facebook, on a good path to growth in the future?
Describing consumer lending field in given statements : What term in the consumer lending field does each of the following statements describe?Plastic card used to pay for goods and services without borrowing money.
Justify every element in ethical and legal terms : proposal must justify every element in ethical and legal terms
Can you think of an example related to environmental justice : Can you think of an example related to environmental justice? No landfill though as we have had extensive discussions on that example.
With multiple departments arranged by resource type : With multiple departments arranged by resource type, conventional general hospitals are _____.
Fee simple absolute and fee simple conditional : What are the key differences between a Fee Simple Absolute and a Fee Simple Conditional?
Describing the federal law : Which federal law or laws apply to each of the situations described below? A loan officer asks an individual requesting a loan about her race.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd