Application-creating a security policy

Assignment Help Business Management
Reference no: EM131213583

Application: Creating a Security Policy

You have just purchased a used car at a fantastic price. You are so excited that you decide to take an extended drive. Unfortunately, you experience a flat tire and discover that you do not have a spare. Now, your vehicle is disabled because you are missing a critical component. You are in a potentially bad situation.

One aspect of security policies that is often neglected is what assets staff members are permitted to use and how they may use those assets. Failure to address staff members in security policies might weaken an organization's legal position. An incomplete security policy, like a missing spare tire, may not be realized until an incident has occurred. Consequently, the organization could find itself in a potentially bad situation.

***

The U.S. Army has hired your firm, Token Tiger Consulting (TTC), to provide IT services to one of their new civilian contractors. Although the exact nature of this contractor is not known to TTC, the Army has indicated that this contractor will be gathering and storing "sensitive" data, and communicating with the Army via the Internet and communications security (COMSEC) equipment. Furthermore, some contractor staff travel often and are required to use their own personal devices for work. 

The Colonel that hired TTC has asked you to begin drafting a security policy for the contractor. You decide to begin with the separation of duties (SoD), staff legal obligations (e.g., bring your own device [BYOD], social media, and acceptable use), and the COMSEC equipment.

For this Assignment, write a 4- to 5-page security policy that:

  • Specifies SoD requirements for contractor staff who handle sensitive data
  • Addresses the legal obligations that pertain to contractor staff
  • Specifies  procedures for COMSEC equipment 

Required ResourcesReadings

  • Coleman, K. (2008). Separation of duties and IT security. Retrieved fromhttps://www.csoonline.com/article/446017/separation-of-duties-and-it-security
    This article details separation of duties (SoD) as a key concept of internal controls, and describes strategies for successful achievement.
  • Gregg, J., Nam, M., Northcutt, S., & Pokladnik, M. (2012). Separation of duties in information technology. Retrieved from https://www.sans.edu/research/security-laboratory/article/it-separation-duties
    This article discusses the necessity for classic security methods to manage conflict of interest, the appearance of conflict of interest, and fraud.
  • Goodwin, J. (2011). Mobile devices spawn new B.Y.O.D. security policies. Retrieved fromhttps://www.gsnmagazine.com/node/25348
    This article discusses the growing interest in B.Y.O.D. (Bring Your Own Device) and a variety of technical issues related to the security of the devices within the IT network system.
  • Kim, K. (n.d.). Organizational level (O-Level) production divisions fundamentals. Retrieved fromhttps://www.google.com/url?q=https://www.amdo.org/114_production.doc&sa=U&ei=bD_8T_rUCoKi9QTY9MzTBg&ved=0CC0QFjAJOFA&usg=AFQjCNElFh2fbLq6wt-jEt7ST-sN_rRE1g
    • Section .6, "Discuss the Security/Accountability Procedures for COMSEC Equipment [Ref. E]" (pp. 6-7)
      This section describes procedures for COMSEC equipment.
  • Simek, J. W., & Nelson, S. D. (2012). Essential law firm technologies and plans. Law Practice, 38(2). Retrieved fromhttps://www.americanbar.org/publications/law_practice_magazine/2012/march_april/hot-buttons.html

Reference no: EM131213583

Questions Cloud

Add the termination detection algorithm : For this exercise, extend the transaction manager so that the individual transactions can themselves be concurrent. Hint: add the termination detection algorithm of section 5.6.3.
Management estimates that the new bottling machine : Caine Bottling Corporation is considering the purchase of a new bottling machine. The machine would cost $172,129 and has an estimated useful life of 8 years with zero salvage value. Management estimates that the new bottling machine will provide net..
Difference in a consultant vs a contractor : Part I: Can one be productive working at home? Please describe in detail of whether or not your choice on this. Part II: What is the difference in a Consultant vs a Contractor? Please describe the differences.
Credit union finances auto loans for its members : Lake Michigan Credit Union finances auto loans for its members. Each loan can be classified into one of four categories: paid in full, good standing, poor standing (with one or more missing payments), and delinquent (where the debt is sold to a colle..
Application-creating a security policy : You have just purchased a used car at a fantastic price. You are so excited that you decide to take an extended drive. Unfortunately, you experience a flat tire and discover that you do not have a spare. Now, your vehicle is disabled because you a..
Report on strategy to source capture & exploit innovatation : Write a report on topic "Strategy to source, capture and exploit innovation" in 500 Words.
How does this fit the definition of new media : How does this fit the definition of new media. thoughts on type of work and how it is viewed, experienced and appreciated. how does this work compares to other contemporary works.
Advise fastwater ltd on the tax consequences : ACC5TAX Assignment - Case Study: Fastwater. Advise Fastwater Ltd on the tax consequences in relation to the above expenses for the year ending 30 June 2017. applying legislation and case law to support and develop your arguments
Separation of duties : Have you seen a movie where nuclear missiles were being test launched? If so, you might recall that two military officers followed a complex procedure to initiate the test launch. Each officer had half of what was needed to complete the procedure...

Reviews

Write a Review

Business Management Questions & Answers

  Current policy issues on energyshow current policy issues

current policy issues on energy.show current policy issues regarding consumption of fossil fuels the creation of

  Scope control system and the communication

Use the remaining slides to share key results from your project planning activities, such as the scope control system and the communication mechanisms that will be used.

  Examine the influence of individual ethics on professional

Examine the influence of individual ethics on professional decisions.

  What are disruptive technologies and how do they enable

what are disruptive technologies and how do they enable organizations to change their business processes radically?

  Explain consumer protection

Explain Consumer Protection and In reviewing all of the consumer protections identified determine the two most essential means of protection for citizens

  Now determine equilibrium quantity

a. Using the equilibrium condition Qs = Qd, determine equilibrium price.$. b. Now determine equilibrium quantity. Units.

  Organization and stakeholders

A market segment consists of group of customers who share a similar set of needs and wants. Understanding your core customer and his or her needs and wants is a critical component of marketing strategy. If you truly understand your customers and thei..

  Organizational structure and function project

Expalin how the organizational structure affects its ability to function efficiently and describe how the human resource department affects the organizational structure and function of the company

  Choose a scenario of savings in a retirement plan

Choose a scenario of savings in a retirement plan such as a 401(k) or an annuity. Plan a monthly deposit (you choose the amount, but be realistic) for 5 years into an account that will earn interest at 5%. Find the future value for this account. Calc..

  Sequence of crashing decisions

Decide the sequence of crashing decisions you would make to compress the project most cost effectively and calculate the total cost (remember to include the penalty incurred for weeks past the end of September and to consider the bonus).

  Leadership styles are designated into general categories

Leadership styles are designated into general categories or groups of leadership theories. For example, these include Traits Theories, Contingency Theories, Relational Theories, and others listed in the course text. Please select one specific categor..

  Discuss who will get to keep the car

Discuss who will get to keep the car also all factors the court will use in reaching its decision.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd