Operations security course project

Assignment Help Basic Computer Science
Reference no: EM132357354

For this project, explain how to apply the information technology security policies to a large organization, based on that organization's type.

There are three types basic types of organizations:

- Government Facility

- Hospital/Large Clinic

- Business

Choose an organization type and consider that the basis of your scenario. Imagine you are creating information technology security policies in this scenario. You will create a short paper describing the relevant needs and issues, the recommended structure, and how security policies should be implemented. See the outline below for specific content requirements.

There is a word limit-1000-1500 words is the target. It will be difficult to fully address each topic in the outline in a short way, but keeping writing concise and organized is an important workforce skill. To keep within the target word-count range, limit yourself to 100-150 words per section of the outline. An exception is outline #6, which would require 300 or more words.

Outline of Paper, with Specific Content Requirements:

1. Identify the relevant business drivers for your chosen scenario. A business driver is something that affects whether an organization can be successful. The textbook lists things like cost and customer satisfaction. Consider especially business drivers relevant to IT security, like mitigating risk exposure, mitigating liability of the organization, etc.

2. For each of the laws in chapter 3, first identify whether the law must be applied to your scenario, and second why or why not this law is relevant. Consider especially industrial standards, like PCI DSS, No. 16 (SSAE16), and ITIL.

3. Discuss the Seven Domains of IT Responsibility and their application. Identify which domains are MOST applicable and explain why. If that domain is not very applicable, explain why not.

4. Identify what policy implementation issues may affect your scenario, such as motivation, leadership, values, whether the organization is likely hierarchical or flat, etc.

5. Every business is a little different, so for this item on the outline, review chapter 6 and select which framework aspects you would focus on for that scenario's security policy. Identify and justify based on the scenario the appropriate type of IT security policy frameworks that should be implemented.Also include information assurance considerations-confidentiality, integrity, and availability.

6. Identify how to design, organize, implement, and maintain appropriate IT security policies. Since there are so many policies possible, choose just 4-5 policies to focus on for this section. Also include how you would organize the document of policies. For reference, see pages 182-190 for guidelines of what would be included in a policy and how it would be organized.Do not write the polices themselves-you do not have detailed information about the scenario to enable you to do that. Just briefly explain the process. Possible policies:

a. Acceptable Use

b. Access Control

c. Asset Protection/Management

d. Continuity & Disaster Recovery

e. Data Classification Standard & Encryption

f. Internet Ingress/Egress Traffic

g. Mandated Security Awareness Training

h. Production Data Backup

i. Remote Access

j. Vulnerability Management & Vulnerability Window

k. Threat Assessment & Management

l. WAN Service Availability

7. Identify the IT security policy framework approach you would use and why. Also include the User domain policy you would use and the most appropriate IT infrastructure security policy.

8. For a Risk Management policy and Incident Response Team (IRT) policies, identify the type of policy you would select for each and justify why.

9. Discuss the appropriate method to implement and maintain the IT security policy framework, including compliance technologies needed.
There are usually multiple ways apply the course content to your scenario. You will be graded on how well you explain and justify your choices based on the needs of your scenario.

Reference no: EM132357354

Questions Cloud

Define locard exchange principle and the daubert test : Define Locard's Exchange Principle and the Daubert Test and explain their role in Computer Forensics and Investigations.
Wikis for learning and collaboration : Different kinds of environments need different scheduling techniques. A high-volume environment is typically done through line design and balancing.
Use of another intellectual property : On the discussion forum, describe an instance of plagiarism or other use of another's intellectual property with which you are familiar.
Project management in operations management : Project Management in Operations Management Project management is considered one of the most important functions of an operations manager.
Operations security course project : ISOL 631-For a Risk Management policy and Incident Response Team (IRT) policies, identify the type of policy you would select for each and justify why.
Wikis for learning and collaboration : Different kinds of environments need different scheduling techniques. A high-volume environment is typically done through line design and balancing.
Organizational design and your assessment of effectiveness : Introduction of the organization, including history and background. Organizational strategy. Organizational design and your assessment of effectiveness.
Demonstrate connection to your current work environment : Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
Difference between pre-versus post-attack response : You examined the security principle of Response. Discuss the importance of incidence response and the difference between pre-versus post-attack response.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Create method that prints a rectangle of characters console

Create a method that prints a rectangle of characters to the console. The method should use a character set that parameter to the method.

  Use the encase software or digital forensics framework

Compare and contrast systems forensic uses of the military, law enforcement agencies, and private corporations. Determine which of these groups has the greatest need for systems forensics and what issues may arise if adequate forensics operations ..

  Shopkeeper offering you relative to the importer price

How much of a discount is the shopkeeper offering you relative to the importer's price? (answer in US dollars)

  Create a driver class to exercise some task objects

Design and implement a class called Task that represents a task (such as on a to-do list) that implements the Priority interface. Create a driver class to exercise some Task objects.

  Truck and automobile are generalizations

Draw a class diagram depicting the fact that the classes Truck and Automobile are generalizations of the class Vehicle.

  Write the routine with the declaration

Write the routine with the declaration public static void permute( String str ); that prints all the permutations of the characters in the string str.

  Describe the w''s for these data

Create parallel boxplots as best you can from these summary statistics to display these results.

  Performing a security assessment of the seven domains

Apply all your knowledge in regards to submitting an outline for performing a security assessment of the seven domains of a typical IT infrastructure for a client.

  Opportunity cost of skipping practice and going to fair

The opportunity cost of skipping practice and going to fair, valued in dollars, is?

  Evaluate why cost is not one of the five core metrics

Evaluate why cost is not one of the five core metrics of the SLIM model and speculate on the consequences if cost served as one.

  How does the use of backup sites affect each

Compare the primary site method with the primary copy method for distributed concurrency control. How does the use of backup sites affect each?

  What happens to price and quantity exchanged

What happens to price and quantity exchanged of a good when an effective price floor is removed?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd