Application-incorporating security into it processes

Assignment Help Basic Computer Science
Reference no: EM131086009

Application: Incorporating Security Into IT Processes

Security in an organization does not reside in a silo; it is affected by other processes and vice versa. Therefore, security should be integrated into the overall IT process to make it effective.

You have already investigated the functionality and capabilities of identity and access management tools. The process for creating and removing supplier IDs should be incorporated into an identity and access management tool. 

To prepare for this Assignment, refer to the case study "Developing a Monthly Vulnerability Scanning Process" from the media Selection and Evaluation of IT Solutions. This case study will provide you with an example of how to incorporate a security feature into the overall IT process.

For this Assignment, provide a 3- to 5-page report describing a process that incorporates security for managing supplier credentials into an identity and access management tool. Be sure to do the following in your report:

  • Develop a numbered outline with the steps in a workflow.
  • Identify the teams involved in this process, and explain the steps each team performs.
  • Explain shortcomings in the process that you may  need to overcome.

Readings

  • Brotby, K. (2009). Information security governance: A practical development and implementation approach.  Hoboken, NJ: Wiley.
    • Chapter 8, "Risk Management Objectives"
      • Section 8.3.1, "Recovery Time Objectives"
      In this section, you are introduced to the recovery time objectives. You will explore the organizational considerations for determining such objectives.
  • Hawkins, S. M., Yen, D. C., & Chou, D.C. (2000). Disaster recovery planning: A strategy for data security.Information Management & Computer Security,8(5), 222-230. Information Management and Computer Security Volume 8 by Hawkins, Yen, & Chow.  Copyright 2000 by EMERALD GROUP PUBLISHING LIMITED. Reprinted by permission of EMERALD GROUP PUBLISHING LIMITED via the Copyright Clearance Center. In this paper, you will investigate the importance of disaster recovery planning in the business world. You will also explore a strategic planning process that an organization could follow to develop its own disaster recovery plan.
  • Document: Sample Presentation Template (PowerPoint file)Note: You will use this document to complete this unit's Project.

Optional Resources

  • Bahan, C. (2003). The disaster recovery plan. Retrieved fromhttps://www.sans.org/reading_room/whitepapers/recovery/disaster-recovery-plan_1164 In this article, you will be introduced to the important aspects of a disaster recovery plan.
  • Devlen, A. (2003, March 10). 12 key elements of an enterprise-wide disaster recovery program.ITManagementNews. Retrieved from https://archive.itmanagementnews.com/articles/0310ad.html In this article, you will explore the essential elements that an organization's disaster recovery program should include in order to be effective.

Reference no: EM131086009

Questions Cloud

Developing deployment proposal : Many organizations use graphical representation for discussing important proposals. The presentation of your recommendation about investing in an appropriate IT solution to the stakeholders is equally important to the recommendation generating pro..
Where does customized adaptable vocation work viably : HI6007 Assessment - How does Customized adaptable work advantage both the association and representatives and where does Customized adaptable vocation work viably?
Calculate the increase in the rate of heat transfer : A solution with a boiling point of 180°F boils on the outside of a 1-in. tube with a No. 14 BWG gauge wall. On the inside of the tube flows saturated steam at 60 psia. The convective heat transfer coefficients are 1500 Btu/(h ft2 °F) on the steam ..
How is this affecting their overall brand perception : Nordstrom utilizes branding to create a more positive work environment leading to a brand-driven organization. Discuss another organization that does this well. Conversely, discuss an organization that does not do this well. How is this affecting ..
Application-incorporating security into it processes : Security in an organization does not reside in a silo; it is affected by other processes and vice versa. Therefore, security should be integrated into the overall IT process to make it effective.
Determine the amount of entropy produced, in kj/kg k : The temperature rise is brought about adiabatically by stirring the air with a paddle wheel. Determine the amount of entropy produced, in kJ/kg ? K.
Recommend for naming files in business : What kinds of rules would your recommend for naming files in business? For personal use?
How does mcommerce facilitate the purchase : Determine whether these values encourage or discourage use or ownership and why. Is mCommerce an advantage or disadvantage to the purchase?
Find a maximum weight perfect matching in the graph : ASSIGNMENT 5. Consider the complete bipartite graph K4,4 with vertex partition (A, B) where A = {a, b, d, f}, B = {g, h, i, j}. Use this to find a maximum weight perfect matching in the graph, and an optimal solution for the dual problem

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Determine the smallest magnitude of the force p

The drum has a weight of 100 lb and rests on the floor for which the coefficient of static friction is µs = 0.5. If a = 3 ft and b = 4 FT

  How can organizations in a global market utilize enterprise

How can organizations in a global market utilize Enterprise Content Management technology to maintain governance and control over content in ensuring regulatory compliance

  Find the largest prime factor of a given number

Write a program to find the largest prime factor of a given number N? example: The prime factors of 13195 are 5, 7, 13 and 29.

  Write a statement that passes the value 4

1) Examine the following function header, the write an example call to the function. void showValue(int quantity)

  How many times will the job be interrupted

how many times will the job be interrupted and on which queue will it finish its execution?

  Probability-first game joe enters is fourth game of season

Joe Coledge is the third-string quarterback for the University of Alatoona. What is the probability that the first game Joe enters is the fourth game of the season?

  The distinction between fixed and variable cost important

If a perfectly competitive firm finds that price is less than average variable cost, it should shut down.  If price is less than average variable cost, a firm cannot even cover its variable costs and therefore has no incentive to operate.  Why is the..

  Integrity of a system

Then provide an example where the integrity of a system is more important than the confidentiality or availability of that system. Finally, provide an example of a system where the availability of a system is more important than the confidentialit..

  Structured systems analysis and design

What is the difference between a context diagram and diagram 0? Which symbol is not used in a context diagram?

  What cain cryptographic services

What CAIN cryptographic services does steganography, per se, provide?   Only need about 6-8 sentences Please provide a scholarly reference as well

  Procedural considerations

The processes and procedural considerations the organization would/will need to understand to mitigate your key points?

  Symmetric ciphers provide

What CAIN cryptographic services do symmetric ciphers provide?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd