Describe the principles of security management

Assignment Help Computer Network Security
Reference no: EM13974761

As you begin to craft a Security Management Plan for your organization to secure and protect the quality and integrity of the data, you will take this opportunity in the first assignment to create the shell of your Security Management Plan.

The assignments each week build upon the work and knowledge from the weeks beforehand. You will create 1 document that contains all of the weekly assignments-in separate sections-culminating with the final submission being a single document containing all of the weekly assignments.

You are responsible for adding each of these ongoing Individual Project assignments into your Key Assignment document that will contain a security plan for the organization to be used to protect the organization's assets.
The project deliverables are as follows:

Security Management Plan
Use Word
Title page
Course number and name
Project name
Your name
Date
Table of Contents (TOC)
Use an autogenerated TOC.
This should be on a separate page.
This should be a maximum of 3 levels deep.

Be sure to update the fields of the TOC so that it is up-to-date before submitting your project.

Section Headings (create each heading on a new page with "TBD" as content, except for Section 1)

Section 1: Information SecurityManagement (Week 1)

This section will be used to describe the organization and will establish the security model to be used by the organization.

Section 2:Security Program (Week 2)

This section will focus on existing frameworks that can help in the implementation of a security plan and what a security organization should look like.

Section 3:Security Policies (Week 3)

This section looks at security policies and their creation.

Section 4:Assessing Risk (Week 4)

This section will focus on risk assessments and methodologies used to perform one.

Section 5: ControllingRisk (Week 5)

This final section combines all of the previous sections and gives the opportunity to look at mechanisms to control risk.

Create the following section for Week 1:

Section 1: Information Security Management

Describe an organization of your choosing, for which you will implement a security program.

Describe the principles of security management, including the following:

People
Process

Technology

Describe the role of project management with respect to implementing security management.

Describe how you plan to instill a secure mentality into an organization, including a tie into the project management discussion about when security concepts should be introduced into the project lifestyle.

You should provide at least 2-3 pages of discussion for this information.

Reference no: EM13974761

Questions Cloud

Analyze the business-level strategies for nikon corporation : Analyze business-level strategies for the NIKON corporation you chose to determine the business-level strategy you think is most important to the long-term success of the firm and whether or not you judge this to be a good choice.
How many times is the basic operation executed : Consider the following algorithm ALGORITHM Enigma(A[0...n-1,0...n-1])) for j=0 to n-2 do for k=j+1 to n-1 do If A[j,k] (not equals to) A[k,j] return false return true- What does this algorithm compute? What is its basic operation?
What are the companys reviews on glassdoor like : What are the company's reviews on glassdoor.com like? What information do you find using social media such as Twitter, Facebook and LinkedIn?
Marginal cost of borrowing : A bank offers two 30 year, fixed rate, fully amortizing LPMs: an 85% LTV loan at 6%, and an 80% LTV loan at 5.5%. What is the marginal cost of borrowing if the loan is going to be held for 10 years?
Describe the principles of security management : Describe how you plan to instill a secure mentality into an organization, including a tie into the project management discussion about when security concepts should be introduced into the project lifestyle.
Important aspect to companies : The first discussion is all about working capital. Working capital is the money needed to fund the normal, day to day operations of your business.
Examine the budgetary constraints : Examine the budgetary constraints that correctional officials work with as they operate correctional facilities. Determine the major trade-offs made between the policy for proper funding and the practice of proper funding to prevent recidivism. Pr..
Company interest expense for the year : Income Statement (EBIT) was $6 million, and the company pays a 40 percent tax rate. What was the company's interest expense for the year? [Hint: Divide $3 million by (1 - T) = 0.6 to find taxable income.]
Calculate the price elasticity of demand for type b : Calculate the price elasticity of demand for Type B consumers at the monopolist's profit maximizing price.

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  The six principles of nclb

The six principles of NCLB

  What is the current cost of comptias security certification

What is the current cost of CompTIA's Security+ certification?

  Details of the attack on the playstation network

Briefly summarize the details of the attack on the PlayStation Network, including the dates of when the attack started and was eventually uncovered.

  Computer security models

Use the Internet to research the following computer security models: Biba (Biba Integrity Model), Give a brief synopsis of each model in your own words. Please cite any references that you use to complete this assignment

  What other ways can you track and measure the performance

what other ways can you track amp measure performance of a project other than earned value measurement evm? are some

  Briefly analyse the candidates - mac, dac and rbac

Each has its own strengths and weaknesses and its own application domain. Each depends on its application domain to choose the suitable authorisation methodology based on the application requirements.

  What rc4 key value will completely invert s

What RC4 key value will completely invert S after the initial permutation (so that S[0] = 255, S[1] = 254, ..., S[254] = 1, S[255] = 0)?  Show your work. (Explain how you got this.)

  Cyber security triad

Choose a threat that targets one of three categories of the cyber security triad: Confidentiality, Integrity or  Availability. Using the posted instructions for writing a white paper

  Search the web for news on computer security breaches

Search the web for news on computer security breaches that occurred during April-August 2015. Research one such reported incident. Prepare a report focusing on what the problem was, how and why it occurred and what are the possible solutions.

  How security can be configured and provide configuration

Describe how the security can be configured, and provide configuration examples (such as screen-shots and configuration files). Marks are based on demonstrating technical detail and understanding, and choice of examples.

  Write a precis of construction engineering v hexyl pvt ltd

Write a precis of Construction Engineering (Aust) Pty Limited v Hexyl Pty Limited [1985] HCA 13; (1985) 155 CLR 541 and discuss how this case contributed to the law of partnership.

  What is data mining and why is it considered controversial

What exactly is "cyber ethics" How is it different from and similar to computer ethics information ethics and Internet ethics and Identify and describe some key aspects of each of the four phases in the evolution of cyber ethics as a field of app..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd