Method of establishing compliance of it security controls

Assignment Help Computer Network Security
Reference no: EM13757239

Assignment: IT Security Policy Framework

Establishing an effective Information Technology Security Policy Framework is critical in the development of a comprehensive security program. Additionally, there are many security frameworks that organizations commonly reference when developing their security programs. Review the security frameworks provided by NIST (SP 800-53), ISO / IEC 27000 series, and COBIT. Assume that you have been hired as a consultant by a medium-sized insurance organization and have been asked to draft an IT Security Policy Framework.

You may create and / or assume all necessary assumptions needed for the completion of this assignment.

Write a four to five (4-5) page paper in which you:

Select a security framework, describe the framework selected, and design an IT Security Policy Framework for the organization.

Describe the importance of and method of establishing compliance of IT security controls with U.S. laws and regulations, and how organizations can align their policies and controls with the applicable regulations.

Analyze the business challenges within each of the seven (7) domains in developing an effective IT Security Policy Framework.

Describe your IT Security Policy Framework implementation issues and challenges and provide recommendations for overcoming these implementation issues and challenges.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM13757239

Questions Cloud

Compensation and lending decisions : Compare and contrast compensation plans, such as restricted stock and stock appreciation rights, indicating the key differences with the accounting treatment. Determine the option that would have the least impact on a company's earnings. Recommend..
How has public health informatics improved public health : How has public health informatics improved public health and public health services offered to Americans over the last two decades? Describe one example that supports this statement
Traditional accounting can the firm offer to its clients : The senior partner of an accounting firm is looking for ways to increase the firm's business. What other services besides traditional accounting can the firm offer to its clients? What new challenges might this additional work create?
Techniques that may be used to provide transmission security : Analyze the means in which data moves within the organization and identify techniques that may be used to provide transmission security safeguards
Method of establishing compliance of it security controls : Describe the importance of and method of establishing compliance of IT security controls with U.S. laws and regulations, and how organizations can align their policies and controls with the applicable regulations
Develop a research paper on a health care technology : Health Care Information Systems are important in dispensing of information throughout the organization. You will develop a research paper on a health care technology that has become essential to the sharing of information via electronic communicat..
Who are the suppliers of mercedes benz south africa : What is the conclusion of Mercedes Benz South Africa? That means, any personal further points that Mercedes can be improved.
Develop strategies to mitigate those risks : Supply managers may be able to provide information to identify risks to the organization and they can develop strategies to mitigate those risks. Terms such as purchasing, procurement, supply, supply chain and logistics do not have standard definitio..
Identify challenges to the selected biometric : Biometrics continues to be an emerging field, and its use continues to evolve in criminal investigations. Identify at least 2 challenges to the selected biometric. In other words, what are the limitations of its use

Reviews

Write a Review

 

Computer Network Security Questions & Answers

  Concept of privacy and security

For discussion, noting the extent to which we are connected to the internet, at home, while in class, even in flight, what is your approach to protecting your privacy when online? What measures do you take to safeguard your computer and other devi..

  Security vulnerabilities of authentication scheme

Clinet's MAC address is explicitly excluded in the AP/router configuration. What are the security vulnerabilities of this authentication scheme?

  Open this using a brute-force attack

What is the worst case number of combinations he must now test to try open this using a brute-force attack?

  Encrypt plaintext using vigenere cipher

Another variation of Additive cipher uses a keyword instead of a single key. This cipher is called Vigenere cipher. Both variations work exactly the same.

  Ssl for http traffic

SSL Record protocol of the SSL protocol stack, RADIUS, networks for access control, DNS poisoning, Spear Phishing attacks, centralised or decentralised access control, encrypt email data

  Data security or computer-network security

The second research report should include applications of the security theories, principles, and techniques of the subject.

  Find the sequence obtained by applying successively the

1 encrypt the message buy now using the knapsack cipher based on the sequence obtained from the super-increasing

  What is the resulting cipher

What is the resulting cipher - Given your answer, is security of the a!ne cipher with a given modulus m increased if one encryption is followed by a second encryption with a different key?

  Illustrate three security services-confidentiality-integrity

Illustrate that three security services: Confidentiality, Integrity, and Availability are enough to deal with threats of: (a) Disclosure, (b) Disruption, (c) Deception (deceive = to cause to accept as true.

  How adequate destruction of materials ensuring privacy

How will your company ensure adequate destruction of the materials thus ensuring an individual's privacy? Will any state-wide, national, or industry standards be met? If so, which ones and how?

  How you could use one or more

Explain how you could use one or more of the Windows log files to investigate a potential malware infection on a system. What types of information are available to you in your chosen log file

  What is ciphertext generated by encryption of character

A particular cipher is implemented by combining the ASCII representation of plaintext characters with pseudorandom bytes. What is the ciphertext (in binary form) generated by the encryption of the character D?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd