Establishing compliance of it security controls with us laws

Assignment Help Computer Network Security
Reference no: EM13812434

Assignment: IT Security Policy Framework

Establishing an effective Information Technology Security Policy Framework is critical in the development of a comprehensive security program. Additionally, there are many security frameworks that organizations commonly reference when developing their security programs. Review the security frameworks provided by NIST (SP 800-53), ISO / IEC 27000 series, and COBIT. Assume that you have been hired as a consultant by a medium-sized insurance organization and have been asked to draft an IT Security Policy Framework.

You may create and / or assume all necessary assumptions needed for the completion of this assignment.

Write a three to five (3-5) page paper in which you:

  1. Select a security framework, describe the framework selected, and design an IT Security Policy Framework for the organization.
  2. Describe the importance of and method of establishing compliance of IT security controls with U.S. laws and regulations, and how organizations can align their policies and controls with the applicable regulations.
  3. Analyze the business challenges within each of the seven (7) domains in developing an effective IT Security Policy Framework.
  4. Describe your IT Security Policy Framework implementation issues and challenges and provide recommendations for overcoming these implementation issues and challenges.
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM13812434

Questions Cloud

Companies that use the lean or jit philosophies : Give two examples (other than Toyota) of companies that use the Lean or JIT philosophies and cite the sources from which you learned about their Lean or JIT efforts.
How high should a monopoly set its prices in order : How high should a monopoly set its prices in order to maximize profits - When you post a response to this question, place it in the context of one of the examples.
Integrated social studies learning : Integrated social studies learning
Define and discuss the open shop movement : Define and discuss the open shop movement. Include a specific example and analyze its success or failure, and why.
Establishing compliance of it security controls with us laws : Describe the importance of and method of establishing compliance of IT security controls with U.S. laws and regulations, and how organizations can align their policies and controls with the applicable regulations
Ensure reliability in the products or services : Identify two companies in unrelated industries that use TPM approaches to ensure reliability in the products or services that they sell, and in a 4- to 6-page Microsoft Word document, create a report responding to the following questions:
Monopolists control : In a one page synopsis explain the following statement - A monopolist can control the price or the quantity sold, but cannot control both
Essay on pros and cons of technology : Essay On Pros and Cons of Technology
Evaluate potential value of michael porters forces analysis : Evaluate the potential value of Michael Porter's Five Forces analysis and SWOT Analysis for effective decision making, in its ability to help Scarlet.

Reviews

Write a Review

Computer Network Security Questions & Answers

  How to set up or improve their cyber security

How should government justify telling private industry how to set up or improve their cyber security

  Discuss symmetric and asymmetric key encryption

A short introduction to SSH, explaining why it is the preferredway of logging into a remotemachine-this explanation will need to discuss symmetric and asymmetric key encryption.

  Using the diffie-hellman key agreement protocol find the

1 using the diffie-hellman key agreement protocol find the common key that can be used by two parties with keys k1 7

  Design a logical and physical topographical layout

Design a logical and physical topographical layout of the current and planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included..

  Choose a recent technical article from a referred journal

please choose a recent technical article from a referred journal or conference proceedings on the topic of threats and

  How can we determine sle if there no percentage given

How can we determine SLE if there no percentage given? Which method is easier for determining the SLE: - a percentage of value lost or cost per incident

  Write two command-line sockets programs

Write two command-line sockets programs – a client and a server – as follows. Define a Who-Am-I message as a UDP datagram containing the ASCII string “WHO AM I”

  In the past several years incidences such as school

in the past several years incidences such as school shootings have caused loss of many lives in us schools and

  Different logon passwords to be five upper-case letters

Computer system 1 needs logon passwords to be five upper-case letters. How many different passwords are there for system 1?

  Do russia and china do enough in the cyberspace area

From the criminality perspective, do Russia and China do enough in the cyberspace area?

  Drafting a security policy plan

Research and discuss the items that you would place in such a plan, and justify your reasoning for the items that you have decided to include. Research and discuss 3 items that you believe are the most important when drafting a security policy plan..

  Create an overloaded constructor

Create the statements to make an overloaded constructor for the class named Car. The constructors should support 0, 1, or 2 arguments. The 1st argument will denote engine size and contain an Integer.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd