Develop a request for proposal plan

Assignment Help Computer Engineering
Reference no: EM132187684

Question: 1. Students, please view the "Submit a Clickable Rubric Assignment" video in the Student Center.

Instructors, training on how to grade is within the Instructor Center.

Term Paper: The Rookie Chief Information Security Officer

This assignment consists of five (5) parts:

Part 1: Organization Chart

Part 2: Request for Proposal (RFP) Plan

Part 3: Physical Security Plan

Part 4: Enterprise Information Security Compliance Program

Part 5: Risk Management Plan

Imagine that you have been recently promoted to serve as Chief Information Security Officer (CISO) for a Fortune 500 organization. This organization has known brand products across the world and expects top-secret methods for safeguarding proprietary information on its recipes and product lines. The Board of Directors request that their information security strategy be upgraded to allow greater opportunities of secure cloud collaboration between suppliers and resellers of their products. Another concern they have is the recent number of hacktivist attacks that have caused the network to fail across the enterprise. Their concern extends to making sure that they have controlled methods for accessing secured physical areas within their various regional facilities.

For your new position, you will be responsible for developing standards, methods, roles, and recommendations that will set the new IT security path for the organization. The existing organization has limited experience in supporting an enhanced level of IT security; therefore, you may need to outsource certain security services.

Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

Write an eight to twelve (8-12) page paper in which you provide the following deliverables:

Part 1: Organization Chart

1. Use Visio or an Open Source alternative, such as Dia, to:

a. Create an organization chart in which you:

i. Illustrate the roles that will be required to ensure design, evaluation, implementation, and management of security programs for the organization.

ii. Within your organizational chart, clearly identify the reporting structure for roles such as IT Security Compliance Officer, Security Manager, CIO, CISO, IT Security Engineer, Privacy Security Professional, and IT Procurement Specialist.

iii. List the types of resources required to fulfill the each forensic duty of the organization below each of the roles you identified.

iv. Align your organization chart to reflect the Department of Homeland Security (DHS) Essential Body of Knowledge's three (3) areas of information security: physical security professional, privacy professional, and procurement professional. Provide comments and comparisons on how your organizational chart fosters these three (3) values.

Part 2: Request for Proposal (RFP) Plan

2. Develop a Request for Proposal (RFP) plan to solicit qualified vendors that could partner with your internal team to deliver optimum IT service delivery. The RFP Plan should contain qualifying criteria of potential vendors and the responsibilities of the vendor once the contract is awarded. As part of the plan, you must:

a. Describe at least two (2) perspectives that need to be closely monitored within the contract.

b. Give your perspective on at least two (2) methods that could be used to evaluate and develop a qualified trusted supplier list.

Part 3: Physical Security Plan

3. Recommend a physical security plan that could be used to protect sensitive areas such as telecom rooms, employee only areas, and manufacturing facilities in which you:

a. Include at least three (3) specific methods.

Part 4: Enterprise Information Security Compliance Program

4. Establish an enterprise information security compliance program that addresses the concerns of the board of directors of the organization in which you:

a. Describe specific plans and control objectives that could be adopted to address the known issues.

b. Suggest at least three (3) information security policies that could be developed and practiced within the organization for data security assurance.

c. Outline the steps you would take to define the security needs of the organization in terms of duties, staffing, training, and processes.

Part 5: Risk Management Plan

5. Develop a risk management plan in which you:

a. Describe at least three (3) possible risk management efforts that could be used to assess threats and unknown issues.

b. Determine why defining priorities is an important part of the process when enumerating and having efficient risk control measures.

c. Suggest specific technical and management controls that could be enacted in order to monitor risks accurately.

6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

• Include charts or diagrams created in Visio or one of its equivalents such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.

• The specific course learning outcomes associated with this assignment are:

• Describe and apply the 14 areas of common practice in the Department of Homeland Security (DHS) Essential Body of Knowledge.

• Describe best practices in cybersecurity.

• Describe physical security plans and processes.

• Evaluate the ethical concerns inherent in cybersecurity and how these concerns affect organizational policies.

• Explain legal and regulatory compliance practices.

• Explain risk management plans and policies.

• Describe physical security plans and processes.

• Develop a cybersecurity plan that incorporates the Department of Homeland Security (DHS) Essential Body of Knowledge.

• Identify the strategic management issues in cybersecurity planning and response.

• Explain data security competencies to include turning policy into practice.

• Compare and contrast the functional roles of an organization in the context of cybersecurity.

• Identify and analyze the role of the Chief Information Officer, Information Security Officer, and IT Security Compliance Officer in the context of cybersecurity.

• Use technology and information resources to research issues in cybersecurity.

• Write clearly and concisely about topics associated with cybersecurity using proper writing mechanics and technical style conventions.

• Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills. Click here to access the rubric for this assignment.

2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution's policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

Reference no: EM132187684

Questions Cloud

What will the earnings per share : Assume that Firm A acquires Firm B via an exchange of stock at a price of $47 for each share of B's stock. What will the earnings per share
Identify and expound on one fruit you exhibit : Identify and expound on one fruit you exhibit most consistently and 1 fruit that you exhibit least consistently when teaching others
If unemployment increase what happens to gdp growth : Question: If unemployment increase what happens to GDP Growth?
Increase in the growth rate of the money supply : Compared with a closed economy, an increase in the growth rate of the money supply in an open economy increases aggregate demand by a:
Develop a request for proposal plan : Develop a Request for Proposal (RFP) plan to solicit qualified vendors that could partner with your internal team to deliver optimum IT service delivery.
What is the weighted average cost of capital : What is the weighted average cost of capital and What is the salvage cash flow of the new equipment? Include the income tax effect
Develop a chain of custody form to be used within a business : In your investigative journal, develop a chain of custody form to be used within a business based on forensic notes for the final project.
Summarize the attack using given data : For each of the three articles you selected, summarize the attack. Include the date of the attack, the type of attack, who or what was affected.
List the files in the current directory : These labs should be performed on the Kali Linux operating system that you installed in Before you begin this lab, log in to it and exercise the following.

Reviews

Write a Review

Computer Engineering Questions & Answers

  What is the minimum number of access point do you need

You are going to implement a wireless network to the Wolfgang Concern Hall using access points with an effective range of 14 meters. What is the minimum number of access point do you need?

  Write a java classes that can simulate internet application

Write a Java classes that can simulate an Internet application, where one party, Alice, is periodically creating a set of packets that she wants to send to Bob.

  Prolog as programming language for logic

Utilizing the Prolog as the programming language for the LOGIC, form the relevant command in order to perform the following tasks. Prolog Lists - A list is either empty or it comprises of the first element (head) and a tail, which is a list itself.

  Questionwrite down java-like pseudocode to specify the

questionwrite down java-like pseudocode to specify the logic for following program application-write down an

  Implementing the stack using dynamically allocated array

Write down the C++ class which implements the stack utilizing the dynamically allocated array. The initial size of the particular stack must be evaluated when it is generated.

  Design a sub procedure that takes a single parameter

design code for the button's click event to call your Sub, passing the value in txtMonth.

  What strategies does mpeg uses for compression

What strategy does MPEG uses for compression? List factor that contribute to image quality? Explain using an example how does MPEG codec apply these strategies.

  Establish a simple hardware asset list for the company

Establish a simple hardware asset list for this company and classify those assets as tier 1,2 or 3 assets. Develop a list of software needed to restore.

  Prove that greedy approach to fractional knapsack problem

Prove that the greedy approach to the Fractional Knapsack problem yields an optimal solution.

  What is the format of a memory address as seen by the cache

How many blocks of main memory are there? What is the format of a memory address as seen by the cache, that is, what are the sizes of the tag, block, and word fields?

  Define the lsp and ssp instructions

Assume that ASC has a stack pointer register (SP) that is initiated to 0 when power is turned on. Assume also two instructions LSP and SSP.

  Designing a web page

In designing a web page, depending upon the information you are trying to convey, use of the tables may add the great deal of the organization on help clear any possible confusion on what you are trying to communicate.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd