Organizational security-create effective contingency plan

Assignment Help Basic Computer Science
Reference no: EM132448726

Unit 1 - Security Plan

Using one of the sample organizations or one of similar size and scope, create the Information Security Management Plan document and address the following:

• Describe what steps or phases you will follow to complete the plan.

• Identify the roles that will participate in the organizational security management planning.

• Identify the key components of what you will include in the organizational security management plan.

• Describe the chain of command or decision-making process that you will use to vet components of the organizational security management plan.

Unit 2 - Securing Events and Emergencies

Using the sample organization you have chosen for your project, write a short paper that addresses the following:

• Describe existing resources and procedures that support disaster recovery and business continuity planning.

• Identify the roles that will participate in the work of developing disaster recovery and business continuity planning.

• Describe the risks to organizational security management that can result from a failure to engage in disaster recovery and business continuity planning.

• Identify the steps to create an effective contingency plan.

Unit 3 - Security Policy and User Awareness Training

The primary way in which security policies fail is in not communicating and ensuring that staff know and follow the policy. Write a short paper that addresses the following:

• Describe the existing information security policies within the selected organization.

• Describe what policies you will develop as part of a plan for organizational security.

• Identify the steps you recommend relative to educating users about these policies.

• Identify the steps you recommend relative to ongoing information security policy awareness among all users.

Unit 4 - Management Model

The selection of a security model and best practices creates the foundation for effective secure operating system architecture. Write a short paper that addresses the following:

• Identify the security models that are most commonly used by the industry of your project organization.

• Describe briefly the benefits that the organization can experience through adoption of these particular security models.

• Describe the challenges to the organization through adoption of these particular security models.

• Select a particular security model to recommend and provide support for why this model is the optimal tool for the organization.

Unit 5 - Physical Security Risk Assessment

Using the framework of the security model that you selected in the last unit conduct a risk assessment and set of recommendations specific to the physical security issues that would impact organizational security:

• Identify how the security model addresses physical security risk assessment.

• Identify any specific physical security issues identified that are characteristic of the project organization.

• Identify what organizational roles will be assigned responsibility for conducting a physical security risk of information assets.

• Describe the communication strategy for ensuring all risks are identified and all stakeholders are included in the process.

Unit 6 - Recommendations for Managing Risk

Using the information that you gathered during the physical security risk assessment in the last unit, create a set of recommendations specific to mitigating any physical security issues identified that would impact organizational security:

• Quantify the specific risks to physical security of information assets that you discovered during the risk assessment.

• Identify potential controls that can be used to mitigate those risks.

• Identify specific controls that will be recommended as optimal for the particular environment of the project organization.

• Identify the roles within the organization that will be involved with mitigating physical security risks.

Unit 7 - Controls and Protective Mechanisms

Use the information that you gathered from the resources specific to implementing preventative controls that will impact the organizational security management plan. Write a short paper that addresses the following:

• Identify the role of biometric controls in providing both physical and logical access.

• Identify the role of tokens, smart or dumb cards, human escorts, and any other alternative appropriate for physical and logical access.

• Identify the roles within the organization that will be involved in decision-making about appropriate preventative controls.

• Describe how the organization will measure the effectiveness of these controls as part of the overall organizational security management plan.

Unit 8 - Privacy Considerations

Insider risk to information assets resulting from hiring practices and proper separation of duties and oversight are important components of an organizational security plan. Write a short paper and address the following:

• Identify hiring procedures that the organization can implement that will reduce the risk of insider threat to information assets.

• Identify information security related roles that will support the concept of separation of duties and proper oversight.

• Create an organizational chart that defines the reporting relationships of all of those security related roles.

• Describe the procedures and practices that will best balance the work of information security with the personal privacy rights of the user.

Unit 9 - Organizational Security Compliance

There is an increasing number of laws and regulations managing how organizations manage their information assets. Write a short paper and address the following:

• Identify existing laws and regulations that impact organizational information security procedures and practices.

• Identify some of the ethical issues surrounding application of organizational security.

• Develop recommendations for how the organization can ensure compliance with these existing laws and regulations.

• Identify the role of ethics in auditing and monitoring as components of an effective organizational security management plan.

Attachment:- Organisational Security.rar

Reference no: EM132448726

Questions Cloud

Examine FASB financial reporting requirements : Examine FASB financial reporting requirements for a private college. Apply basics of GAAP pertaining to categorizing restrictions on net assets
Analysis of the market structure the industry : An analysis of the market structure the industry - discussion about the demand and supply conditions for your product(s) or service(s)
Information governance reference model : In order to interpret the Information Governance Reference Model (IGRM) diagram. It is recommended that we start from the outside of the diagram.
Calculate the metlock days in inventory : Metlock, Inc. at December 31, 2017: beginning inventory $79000; ending inventory $134000; Calculate the Metlock days in inventory (rounded) in 2017
Organizational security-create effective contingency plan : Describe existing resources and procedures that support disaster recovery and business continuity planning. Identify steps to create effective contingency plan.
Compute the Whispering inventory turnover ratio : Whispering Winds Corp. at December 31, 2017: beginning inventory $72000; Compute the Whispering inventory turnover ratio (rounded) in 2017
What amount of the tax benefit related to the uncertain tax : What amount of the tax benefit related to the uncertain tax position from the domestic production activities deduction
What is the translation adjustment : What is the remeasurement of the foreign subsidiary's financial statements into U.S. dollars assuming that the U.S. dollar is the subsidiary's functional
Evaluate the effectiveness of the clustering : How do you use "pair wise" plots to evaluate the effectiveness of the clustering? The attributes of a data set are "purchase decision (Yes/No), Gender (M/F),

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What are the newest uses for device

What are the Newest uses for Device ID's ? That also are beneficial in Marketing

  Scenario of tampering and manipulating http

Devise a scenario of tampering and manipulating HTTP requests and responses to and from this HTTP Sandbox web site using Fiddler, collect the results you received, and document your work. Your documented work must include:

  Find a 95% confidence interval for the true slope

Find a 95% confidence interval for the mean score for students who are tutored 50 h. Assume the mean number of hours tutored is 55 h.

  What is the size of the virtual address space

A virtual memory system has a page size of 1024 words, eight virtual pages, and four physical page frames.

  Deriving the update formula

deriving the update formula of Eq.(9.58) for the kernel width i , no approximation was made. Justify this latter choice.

  Write program convert gps coordinates between three notation

For this program write a simple computer program that converts GPS coordinates between three notional forms

  Assume straight-line depreciation

Further assume straight-line depreciation to zero, a marginal tax rate of 35%, and a required return of 10%. The project NPV is

  Write the equation for price elasticity

A bus traveling on the HOT lane currently charges $1.50 and has 100,000 riders per day. The transit agency is planning to raise fares to $2.00 and knows that the price elasticity for the bus is -0.21. What is the expected change in ridership deman..

  What is the resulting ciphertext

Consider WEP for 802.11. Suppose that the data is 10101010 and the keystream is 11110111. What is the resulting ciphertext?

  Riordan manufacturing virtual organization

An increase in spending on items related to hardware, software, and outside IT support services by 4 percentA decrease the overall budget by 2 percent

  The security of information in an organization

Who is ultimately responsible for the security of information in an organization? What do VPNs do that firewalls cannot do?

  Conduct a two-tailed t test at the .01 level of significance

Twenty-five flags are flown in the city of Tuscaloosa and are found to have a sample mean usable life of 200 days with a standard deviation of 216 days. Does the sample mean in Tuscaloosa differ from that of the population mean?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd