Information technology security policy framework

Assignment Help Business Management
Reference no: EM131249668

Establishing an effective Information Technology Security Policy Framework is critical in the development of a comprehensive security program. Additionally, there are many security frameworks that organizations commonly reference when developing their security programs. Review the security frameworks provided by NIST (SP 800-53), ISO / IEC 27000 series, and COBIT. Assume that you have been hired as a consultant by a medium-sized insurance organization and have been asked to draft an IT Security Policy Framework.

You may create and / or assume all necessary assumptions needed for the completion of this assignment.

Write a three to five (3-5) page paper in which you: 

  1. Select a security framework, describe the framework selected, and design an IT Security Policy Framework for the organization.
  2. Describe the importance of and method of establishing compliance of IT security controls with U.S. laws and regulations, and how organizations can align their policies and controls with the applicable regulations.
  3. Analyze the business challenges within each of the seven (7) domains in developing an effective IT Security Policy Framework.
  4. Describe your IT Security Policy Framework implementation issues and challenges and provide recommendations for overcoming these implementation issues and challenges.
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements: 

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
  • Include a cover page containing the title of the assignment. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are: 

  • Identify the role of an information systems security (ISS) policy framework in overcoming business challenges.
  • Design a security policy framework.
  • Use technology and information resources to research issues in security strategy and policy formation.
  • Write clearly and concisely about Information Systems Security Policy topics using proper writing mechanics and technical style conventions.

Reference no: EM131249668

Questions Cloud

What do you think are two most impotant skills of managers : The manner in which management is most efficiently conducted and what constitutes good management are subjects of research and debate. Likert's systems of management, Blake and Mouton's Managerial Grid, Vroom and Yetton's leader-participation mode..
How can cubism be seen in picassos painting : How can Cubism be seen in Picasso's painting and how does Matisse reveal his own brand of cubism in his painting?
What load is shared by each material : a copper rod of 40mm dai surroundedhighly by a cast iron tube of 80mm external dia the ends being firmly fasten together .when put of a compressionload of 30kn what load is shared by each material and also determine bar shortend.
Galactic element clues to our earth elements : Use information you have learned to help you match the Galactic Element Clues to our Earth elements found in the Periodic Table below.
Information technology security policy framework : Establishing an effective Information Technology Security Policy Framework is critical in the development of a comprehensive security program. Additionally, there are many security frameworks that organizations commonly reference when developing t..
How did the leaders demonstrate flexibility and adaptability : How did the leaders demonstrate flexibility and adaptability? Please provide examples. How did the leaders apply aspects of the path-goal theory to this situation? Provide examples. Did the leaders communicate effectively with all of the stakeholders..
Determine the smallest positive integer : Using this program, determine the smallest positive integer n such that assigning a the value 10n causes the expressions (a + b) + c and a + (b + c) to have different values. Your answer should include your program's source code and the output tha..
Is there omission or censorship of some material : How were the articles framed? Do youdetect different political orientations in the newspapers? Do the articles communicate any of the four "biases" that Bennettdiscusses?Is there omission or censorship of some material? Do you notice any otherimp..
Find a code for the source : Using base-3 logarithms, compute the entropy of this source. - Assuming that there are three characters 0,1,2 in the code alphabet, find a code for the source that has average length equal to its base-3 entropy.

Reviews

Write a Review

Business Management Questions & Answers

  What is operations management

What is operations management and why is it strategically important for all firms, regardless of their focus on or mix of products and services?

  Explanation of the civil rights act

Given an explanation of the Civil rights Act, Title VII 1964 legislation, dealing specifically with the meaning of reasonable accommodation for religious practices.

  How to formulate a research specification

Formulate a list of possible research projects/ topics and identify the factors that contributed to your selection of your final choice of research project.

  Identify the primary business emphasis of each of coca-cola

Identify the primary business emphasis of each of the following companies as (a) a low-cost emphasis or (b) a premium-price emphasis. If you are unfamiliar with the company.

  Support the recommendations or to identify issues

Use an established referencing system - Including 3 to 5 external sources (in addition to your textbook) should be referenced to support the recommendations or to identify issues. This information would be ideally sourced in current journals, ..

  Analysis of personal and organizational ethics and values

You are an ethnographic researcher writing an article for a popular organizational behavior research journal. Your purpose is to identify key problems related to business ethics in a Not-for-Profit and For- Profit organization. In this potential a..

  How does rise distort ratio analysis comparisons

How does rise distort ratio analysis comparisons for one company over time (trend analysis) besides for different companies that are being compared

  Examine the influence your selected tool

Examine the influence your selected tool has had on the lodging industry. What processes has it affected? How has your selected tool influenced the effectiveness and efficiency of these processes?

  The system initial development

Discuss how the business requirements drove the system's initial development.

  What is the price of the american call

The stock will pay a dividend of $5 in 40 days and a second dividend of $5 and 130 days. The current risk-free rate is 5 percent per annum. An American call on this stock has an exercise price of $150 and expires in 100 days. What is the price of ..

  Define asymmetrical power relation

Define Asymmetrical power relation in recruitment and selection. The answer should be in a 1000 word essay.

  How organization contribute increasing professional skills

Describe how your selected organization or association can contribute towards increasing your professional knowledge and abilities.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd