Analyze the role of the key leaders within the organization

Assignment Help Management Information Sys
Reference no: EM131291652

Assignment

Project Guidelines

Overview

The final project for this course is the creation of a functional information assurance plan.

The effective management of information and protection of pertinent data is essential for leveraging the required knowledge to serve customers and stakeholders on a continuous basis. Employing information assurance best practices will ensure a firm is able to eliminate hierarchical structures, become more flat, and have greater customer touch points by leveraging the correct information at the right time. Successful firms will maintain an established information assurance plan and posture that are reviewed on a weekly basis.

This assessment will consist of the creation of a functional information assurance plan. You will review a real-world business scenario in order to apply information assurance research and incorporate industry best practices to your recommendations for specific strategic and tactical steps. These skills are crucial for you to become a desired asset to organizations seeking industry professionals in the information assurance field.

The project is divided into four milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final submissions. These milestones will be submitted in Modules Two, Four, Five, and Seven. The final product will be submitted in Module Nine.

In this assignment, you will demonstrate your mastery of the following course outcomes:

• Assess confidentiality, integrity, and availability of information in a given situation for their relation to an information assurance plan

• Propose appropriate protocols for incident and disaster responses and managing security functions that adhere to best practices for information assurance

• Analyze threat environments using information assurance research and industry best practices to inform network governance

• Recommend strategies based on information assurance best practices for maintaining an information assurance plan

• Evaluate the appropriateness of information assurance decisions about security, access controls, and legal issues

• Assess applicable threats and vulnerabilities related to information assurance to determine potential impact on an organization and mitigate associated risks

Prompt

Your information assurance plan should answer the following prompt: Review the scenario and create an information assurance plan for the organization presented in the scenario.

Specifically, the following critical elements must be addressed in your plan:

I. Information Assurance Plan Introduction

a) Provide a brief overview of the goals and objectives of your information assurance plan, including the importance of ensuring the confidentiality, integrity, and availability of information. What are the benefits of creating and maintaining an information assurance plan around those key concepts?

b) Assess the confidentiality, integrity, and availability of information within the organization.

c) Evaluate the current protocols and policies the organization has in place. What deficiencies exist within the organization's current information assurance policies? What are the potential barriers to implementation of a new information assurance plan?

II. Information Security Roles and Responsibilities

a) Analyze the role of the key leaders within the organization specific to how their responsibilities are connected to the security of the organization's information. What is the relationship between these roles?

b) Evaluate key ethical and legal considerations related to information assurance that must be taken into account by the key leaders within the organization. What are the ramifications of key leaders not properly accounting for ethical and legal considerations?

c) What are the key components of information assurance as they relate to individual roles and responsibilities within the information assurance plan? For example, examine the current policies as they relate to confidentiality, integrity, and availability of information.

III. Risk Assessment

a) Analyze the environment in which the organization operates, including the current protocols and policies in place related to information assurance.

b) Evaluate the threat environment of the organization.

c) Based on your analysis and evaluation, what are the best approaches for implementing information assurance principles? Where do you see the most areas for improvement to current protocols and policies?

d) Assess the threats and vulnerabilities of the organization by creating a risk matrix to outline the threats and vulnerabilities found and determine possible methods to mitigate the identified dangers.

IV. Statements of Policy
a) Develop appropriate incident response protocols to respond to the various threats and vulnerabilities identified within the organization.

b) Justify how the incident response protocols will mitigate the threats to and vulnerabilities of the organization. Support your justification with information assurance research and best practices.

c) Develop appropriate disaster response protocols to respond to the various threats and vulnerabilities identified within the organization.

d) Justify how the disaster response protocols will mitigate the threats to and vulnerabilities of the organization. Support your justification with information assurance research and best practices.

e) Develop appropriate access control protocols that provide an appropriate amount of protection while allowing users to continue to operate without denial of service.

f) Justify your access control protocols. Support your justification with information assurance research and best practices.

g) Recommend a method for maintaining the information assurance plan once it has been established.

h) Justify how your maintenance plan will ensure the ongoing effectiveness of the information assurance plan. Support your justification with information assurance research and best practices.

V. Conclusion

a) Summarize the need for an information assurance plan for the selected organization, including the legal and ethical responsibilities of the organization to implement and maintain an appropriate information assurance plan.

b) Defend the key elements of your information assurance plan, including which members of the organization would be responsible for each element.

Milestone One: Information Assurance Plan Introduction

In Module Two, you will submit your introduction to the information assurance plan. This section of the plan will provide the overview of the current state of the organization. Provide a brief overview of the goals and objectives of your information assurance plan, including the importance of ensuring the confidentiality, integrity, and availability of information. What are the benefits of creating and maintaining an information assurance plan around those key concepts? Are there current protocols and policies the organization has in place? Additionally, what deficiencies exist within the organization's current information assurance policies? What are the potential barriers to implementation of a new information assurance plan?

Milestone Two: Information Security Roles and Responsibilities

In Module Four, you will submit your roles and responsibilities portion of the final project. Who are the key leaders of the organization specific to how their responsibilities are connected to the security of the organization's information? You must also identify key ethical considerations. What are the ramifications of key leaders not properly accounting for ethical and legal considerations? What are the key components of information assurance as they relate to individual roles and responsibilities within the information assurance plan? For example, examine the current policies as they relate to confidentiality, integrity, and availability of information.

Milestone Three: Risk Assessment

In Module Five, you will submit the risk assessment portion of the information assurance plan. You will provide the organization with an assessment of the threat environment and the risks within, as well as methods designed to mitigate these risks. Based on your analysis and evaluation, what are the best approaches for implementing information assurance principles? Where do you see the most areas for improvement to current protocols and policies?

Milestone Four: Statements of Policy

In Module Seven, you will submit your plan pertaining to statements of policy. You will recommend protocols and mitigating factors to the organization. Justify how the disaster response protocols will mitigate the threats to and vulnerabilities of the organization. You will focus on disaster and incident response protocols as well as access control. Assess, your proposed method for maintaining the success of the plan going forward. Justify how your method will ensure the ongoing effectiveness of the information assurance plan.

Attachment:- Introduction_Plan.rar

Reference no: EM131291652

Questions Cloud

Information and notreal should return : Jake and Jim should return the correct information and Notreal should return an error message of no such person found (as there is no Notreal user).
Discuss how one feels when called to serve as a leader : how both Greenleaf and Christianity call people to serve and discuss how one feels when called to serve as a leader. In your summary, include discussion of the idea that power comes from giving it away and putting oneself in the position to serve ..
Upgrade the network servers for the entire company : Suppose you are a network administrator and your boss indicates that a budget has been set aside to upgrade the network servers for the entire company.
Cyber espionage by the united states : Snowden Leaks about US Cyber Espionage - The topic for this list assignment is leaks by Edward Snowden about cyber espionage by the United States.
Analyze the role of the key leaders within the organization : Analyze the role of the key leaders within the organization specific to how their responsibilities are connected to the security of the organization's information. What is the relationship between these roles?
Develop a paper that discusses the six sigma process : Develop a research paper that discusses the Six Sigma process. Include the following :A history of Six Sigma,The pros and cons of implementing Six Sigma,The benefits of Six Sigma for a health care organization.
Input file and creates an output file : In this assignment you will create a program(s) that uses an input file and creates an output file. Your program will use an input file "MathInput.csv" which has sets of instructions and numbers (separated by a comma) to perform math operations.
What is purchase price it gets from the vendor : MGT 303:Determine the optimal number of bolts for the plant to purchase and the time between orders.What is the annual holding cost and setup (ordering) cost for this item? What is the total cost (holding + setup)?
Rti interrupts to keep time : Write a program that sends 1000 characters of data stored in an array from the DB-12 board to the PC every second via the SCI1 port. Use RTI interrupts to keep time.

Reviews

Write a Review

Management Information Sys Questions & Answers

  What extent are the sourcing and innovation strategies

To what extent are the sourcing and innovation strategies are aligned in SAP and to what extent do SAP's competitors align the two strategies different from SAP?

  How did what you learn in this course change

Reflect on what you learned in this course and apply it to a recent event you experienced, read about, or heard about. What was the experience and how does the course material apply to it?

  Describe any four rights of users of information systems

Describe any four rights of users of information systems. Explain the term virus and explain the differences between Trojan horses and worms. Support your answers with examples.

  Discuss the role of incident containment

Discuss the role of incident containment in an incident response strategy and how a lack of planning for containment is a potential pitfall for any response strategy

  Describe potential risks to the information

Describe what techniques and processes you would use to identify the vulnerabilities and threats to the organization you have chosen. Describe potential risks to the information and the related vulnerabilities within the organization when utilizing..

  What are you thoughts on this presentation

What are you thoughts about companies collecting data about you? Do you feel this type of data collection is a beneficial or detrimental? Why? Do you feel you have a right to know what data companies are collecting about you? Does this concern you..

  What are key elements of design for manufacturing

Many people think of lean systems as being incompatible with mass customization and flexible manufacturing. Why is this conclusion incorrect? Why or why not? Expand upon your response. Give real world example to explain your response.

  How does project align with the business strategy or goal

what is the problem that the project will solve? How does the project align with the business strategy or goals? what is the defined scope and what is not included in the scope of the project?

  Applications of goldratt''s theory of constraints

Read about key elements and applications of Goldratt's Theory of Constraints. Post, with explanation, at least three elements that you found most important and applicable to the company

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Issues and concerns with the use of electronic media

Issues and Concerns with the Use of Electronic Media - Explain What are the possible issues and concerns with switching completely to electronic media

  How mobile and wearable devices benefit the business

Articulate the current company setup. Explain how mobile and wearable devices are different and Explain how mobile and wearable devices benefit the business

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd