Identify a general plan to recover from the incident

Assignment Help Management Information Sys
Reference no: EM131148643

Note: The selected organization must have a need for network security as part of its operations. Therefore, you may feel free to identify a hypothetical organization that meets the requirements. Any necessary assumptions may be made to fulfill the requirements of the organization selection.

The project deliverables are the following:
Submission of the proposed organization to the instructor for approval
Network Security Plan document shell
Use Word
Title Page
Course number and name
Project name
Student name
Date
Table of Contents (TOC)
Auto generated TOC
Separate page
Maximum of 3 levels deep

Before submitting your project, update the fields of the TOC so it is up-to-date.

Section Headings (Create each heading on a new page with TBD as the content, except for sections listed under New Content).

Project Outline

Overview of Network and Existing Security

Provide an overview of the existing network architecture, including the following:

· Description of the network
· The topology
· Protocols allowed
· Connectivity methods
· Network equipment

· Number of routers, switches, and any other network equipment, such as VPN concentrators, proxies, etc.

· A summary of the current security devices in use on the network

Risk Assessment Section

Conduct an inventory of devices within the chosen organization's network using appropriate tools.

Provide a summary of the number of desktops, laptops, network printers, and servers.

· Identify key assets.

· Assets also include records and sensitive information that requires special protection.

Prioritize each asset or group of assets, and assign a value to each.

Create a subsection that will identify and describe the risks within the environment.

· Do not forget natural disasters.

· Include the likelihood that the risk could occur.

Security Architecture Plan

Identify and select appropriate technologies to protect against the risks that were identified, and provide an explanation as to why the technology was chosen.

Describe where you plan to place these technologies within the network and why.

· The plan should cover all layers of the OSI model.

Identify additional software that will be required to monitor the network and protect key assets.

Identify any security controls that need to be implemented to assist in mitigating risks.

Mitigate all of the risks that were identified during the assessment phase.

Security Policies

· Identify what written polices need to be created for your organization.

· For each policy, you will address how you plan to monitor the policy.

· For each policy, you will provide what you feel the appropriate punishment should be for violators. These punishments must be able to be enforceable, not just a threat.

· For each policy, you will identify a timetable for when each policy should be reviewed and updated and who will do the review.

· The second task this week is to prepare for how you would handle an incident. It is best to have a thorough, rehearsed plan to be prepared for a potential incident. This will help to limit the damage and it will help recovery afterward. You will create an Incident Response section of 2-3 pages that includes the actions that need to occur when an incident is in progress.

The following are the second task's deliverables:

Incident Response Section

Identify the process of how your organization will identify an incident.

Identify the process for classifying the incident.

· What are the criteria for each classification within the organization?

Identify what the response will be for each classification identified.

Identify a general plan to recover from the incident.

Identify a process for evaluating the incident response plan after each incident has been mitigated.

Implementation Plan

· Develop a plan to implement the security controls and policies that you identified in previous sections.

· Develop a plan to implement new security devices and modify existing security devices that are required to monitor the network and the polices that were created or updated.

· Describe how these controls, policies, and security devices have addressed the key security areas of confidentiality, integrity, authentication, authorization, and nonrepudiation cryptographic services.

Network Security Plan

· Revise the entire document, and make any necessary changes and improvements.

· Ensure that the final version is sufficiently detailed to allow the organization to confidently move forward with the implementation of the security controls and devices based upon your recommendations.

· Previous instructor feedback should be addressed with appropriate changes.

Network Security Plan

This course has been composed of a series of Individual Project assignments that have contributed to a Key Assignment submission at the end of the course. Each week, you have completed a part of a network security plan. The full Key Assignment should include the following tasks:

Overview of Network and Existing Security

Select an organization as the target for the analysis.

Provide an overview of the organization's existing network architecture.

The overview will include description of the network, the topology, protocols allowed, connectivity methods and network equipment, number of routers, switches, and any other network equipment, such as VPN concentrators, proxies, etc.

Provide a summary of the current security devices currently in use on the network.

List the type of device, the vendor, and give a brief description of how the device is used.

Risk Assessment

Conduct an inventory of the devices within your network. Provide a summary of the number of desktops, laptops, network printers, and servers.

Identify key assets

Assets also include records and sensitive information that requires special protection.

Prioritize each asset or group of assets, and assign a value to each.

Identify and describe the risks within your environment.

Do not forget natural disasters.

Determine the likelihood that the risk could occur.

Identify the tools and methodology that you would use to conduct the risk assessment.

Security Architecture Plan

Based upon the risk assessment and your analysis, create an action plan to mitigate the risks that you have identified.

Identify and select appropriate technologies to protect the network and the organization's information, and explain why you chose each technology.

Describe where you plan to place these technologies in the network, and explain why.

The plan should cover all layers of the OSI model.

Identify additional software that will be required to monitor the network and protect key assets.

Identify security controls that need to be implemented to assist in mitigating risks.

Security Policies

Create the Key Assignment first draft for peer review.

Continue the development of the plan.

Create a fourth section in the plan to list all of the policies you would have for your organization and a brief description of what each policy will contain.

Each policy will address how you plan to monitor the policy and what the appropriate punishments should be for violators.

Provide a timetable for when these policies should be reviewed and updated.

Continue development of the Network Security Plan with an Incident Response Plan of 2-3 pages.

Include the actions that need to occur when an incident is in progress.

Include how your organization will identify and classify incidents, what the response will be, and the plan to recover.

Implementation and Incident Response

Analyze previous submissions, and make changes as necessary to the final paper.

Submit a detailed implementation plan of 4-5 pages that will describe your proposed solution for the implementation of the Network Security Plan for the organization.

This is the last and final section of the Key Assignment and should bring together all aspects of the implementation in one cohesive paper.

Revise the previous sections so that the entire plan flows and has a strong introduction and conclusion.

Reference no: EM131148643

Questions Cloud

What can airlines do to improve customer experience using it : What can airlines do to improve the customer experience using IT? Explain how you would use IT to decrease wait times at TSA security lines.
Validate the pairing of parenthesis in an expression : You are to write two programs. One will validate palindromes; the other will validate the pairing of parenthesis in an expression. These programs must both use stacks. You can write either an array based stack, or a linked list to perform these ta..
Compute the break even sales : ompute the break even sales (units). - How many units of each product, MP3 players and satellite radios, would be sold at the break even point?
Describe how electric current is generated and transported : Describe how an electric current is generated and transported. Assess the current state of our national grid in the United States, as well as any challenges in updating this grid.
Identify a general plan to recover from the incident : Identify additional software that will be required to monitor the network and protect key assets. Identify any security controls that need to be implemented to assist in mitigating risks. Mitigate all of the risks that were identified during the asse..
Describe the differences between temperature and heat : Describe the differences and similarities between temperature and heat. Analyze how heat transfer occurs during the processes of conduction and convection. Provide an example of where each occurs in natural physical systems.
Prepare a corporate tax return for 2015 : ACC 404 Corporate Tax Return Project. Using the following information, prepare a corporate tax return for 2015. It is due on Monday, August 1, 2016. You may work on it in a group with up to two other students (maximum of 3 students per group)
How viruses - adware and spyware would impact organization : Provide a review of the potential security issues related to the internal and external communications. Discuss how company communications policies can play an important role in the reduction of communication security risks. Include specifi..
Indicate whether each statement is true or false : One reason managers use the full cost of products as the cost base in their pricing decisions is to promote price stability.- When there is price discrimination, pricing is not linked closely to the cost of the product.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Research a company that uses cross-functional systems

Select and research a company that uses cross-functional systems. Note any obvious advantages and disadvantages you might find within the company selected

  A new economy of sharing has fuelled an old approach to

internet impacts and support for new business modelssocial networking has provided new models of business. companies

  Explain cloud computing and web 2.0

Explain cloud computing and Web 2.0, explain how organizations use these tools and describe the technology required to use these tools.

  How technology support functions of management

What are some examples of how technology has supported each of the functions of management

  Design of a database system - management or the workers

Which entity should have the most influence on the design of a database system: management or the workers?

  In case of the unfortunate

In case of the unfortunate, how do you know that your computer has been hacked?

  Describe virtual and augmented reality

Describe virtual and augmented reality. Suggest a way in which this technology could be used in the future; either to improve a current process / procedure or create a new process / procedure

  Supply chain management amp contractual flexibilitytopic

supply chain management amp contractual flexibilitytopic supply chain management amp contractual flexibilityplease

  How will the composition of the dream team

How will the composition of the dream team be changed if the following constraints are changed as follows: the average number of rebounds among the 12 selected players needs to be at least 8 rebounds per game

  Impact analysis of related and competing technologies

Write a 3- to 4-page draft paper to cover the impact analysis of related and competing technologies, with respect to ERP systems

  The definition phase of a traditional sdlc process

Summarize the five additional steps for purchasing a system that are not part of the Definition phase of a traditional SDLC process.

  Post addresses web 20 technology and related issuesdescribe

post addresses web 2.0 technology and related issues.describe where term web 2.0 or web 2.0 technology originated and

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd