What are the key components of information assurance

Assignment Help Management Information Sys
Reference no: EM131319674

Information Assurance:

Scenario Assignment Module Eight: Strategies of Mitigation

Assume that you are the lead network security expert in your organization. Because of the recent rise in web security issues and the development of the global marketplace, your organization has decided to hire additional network security technicians. Once hired, you are to give a report to these individuals designed to illustrate holes in current security countermeasures, along with ways in which these holes can be filled. In your report, ensure you address the areas mentioned below:

• An explanation of which web security threats are most prevalent, the hazards they present, and how these threats are exploiting holes in current security countermeasures

• An explanation of the actions that should be taken to prevent existing web security countermeasures from being exploited

• An assessment of the pros and cons of choosing to implement measures such as firewalls, access control measures, and cryptographic systems.

Project Guidelines

Overview

The final project for this course is the creation of a functional information assurance plan.

The effective management of information and protection of pertinent data is essential for leveraging the required knowledge to serve customers and stakeholders on a continuous basis. Employing information assurance best practices will ensure a firm is able to eliminate hierarchical structures, become more flat, and have greater customer touch points by leveraging the correct information at the right time. Successful firms will maintain an established information assurance plan and posture that are reviewed on a weekly basis.

This assessment will consist of the creation of a functional information assurance plan. You will review a real-world business scenario in order to apply information assurance research and incorporate industry best practices to your recommendations for specific strategic and tactical steps. These skills are crucial for you to become a desired asset to organizations seeking industry professionals in the information assurance field.

The project is divided into four milestones, which will be submitted at various points throughout the course to scaffold learning and ensure quality final submissions. These milestones will be submitted in Modules Two, Four, Five, and Seven. The final product will be submitted in Module Nine.

In this assignment, you will demonstrate your mastery of the following course outcomes:

• Assess confidentiality, integrity, and availability of information in a given situation for their relation to an information assurance plan

• Propose appropriate protocols for incident and disaster responses and managing security functions that adhere to best practices for information assurance

• Analyze threat environments using information assurance research and industry best practices to inform network governance

• Recommend strategies based on information assurance best practices for maintaining an information assurance plan

• Evaluate the appropriateness of information assurance decisions about security, access controls, and legal issues

• Assess applicable threats and vulnerabilities related to information assurance to determine potential impact on an organization and mitigate associated risks

Prompt

Your information assurance plan should answer the following prompt: Review the scenario and create an information assurance plan for the organization presented in the scenario.

Specifically, the following critical elements must be addressed in your plan:

I. Information Assurance Plan Introduction

a) Provide a brief overview of the goals and objectives of your information assurance plan, including the importance of ensuring the confidentiality, integrity, and availability of information. What are the benefits of creating and maintaining an information assurance plan around those key concepts?

b) Assess the confidentiality, integrity, and availability of information within the organization.

c) Evaluate the current protocols and policies the organization has in place. What deficiencies exist within the organization's current information assurance policies? What are the potential barriers to implementation of a new information assurance plan?

II. Information Security Roles and Responsibilities

a) Analyze the role of the key leaders within the organization specific to how their responsibilities are connected to the security of the organization's information. What is the relationship between these roles?

b) Evaluate key ethical and legal considerations related to information assurance that must be taken into account by the key leaders within the organization. What are the ramifications of key leaders not properly accounting for ethical and legal considerations?

c) What are the key components of information assurance as they relate to individual roles and responsibilities within the information assurance plan? For example, examine the current policies as they relate to confidentiality, integrity, and availability of information.

III. Risk Assessment

a) Analyze the environment in which the organization operates, including the current protocols and policies in place related to information assurance.

b) Evaluate the threat environment of the organization.

c) Based on your analysis and evaluation, what are the best approaches for implementing information assurance principles? Where do you see the most areas for improvement to current protocols and policies?

d) Assess the threats and vulnerabilities of the organization by creating a risk matrix to outline the threats and vulnerabilities found and determine possible methods to mitigate the identified dangers.

IV. Statements of Policy

a) Develop appropriate incident response protocols to respond to the various threats and vulnerabilities identified within the organization.

b) Justify how the incident response protocols will mitigate the threats to and vulnerabilities of the organization. Support your justification with information assurance research and best practices.

c) Develop appropriate disaster response protocols to respond to the various threats and vulnerabilities identified within the organization.

d) Justify how the disaster response protocols will mitigate the threats to and vulnerabilities of the organization. Support your justification with information assurance research and best practices.

e) Develop appropriate access control protocols that provide an appropriate amount of protection while allowing users to continue to operate without denial of service.

f) Justify your access control protocols. Support your justification with information assurance research and best practices.

g) Recommend a method for maintaining the information assurance plan once it has been established.

h) Justify how your maintenance plan will ensure the ongoing effectiveness of the information assurance plan. Support your justification with information assurance research and best practices.

V. Conclusion

a) Summarize the need for an information assurance plan for the selected organization, including the legal and ethical responsibilities of the organization to implement and maintain an appropriate information assurance plan.

b) Defend the key elements of your information assurance plan, including which members of the organization would be responsible for each element.

Reference no: EM131319674

Questions Cloud

Estimate the proportion of clarkston : Two pollsters are conducting surveys to estimate the proportion of Clarkston, Michigan citizens who support a bond issue to build a sports stadium. Both pollsters use the same methods; however, their sample sizes differ. One pollster reports his r..
Estimate its mean and standard deviation : Is there any way that one hundred dice could be labelled with integers such that the probability distribution of the sum is uniform?
Describe how the five-stage search framework shared : Your company has been hired to design a product that will provide searches of textual documents and database querying. Your design team has not developed a product like this before. Examine the challenges associated with searching in textual docum..
What is the probability a blue marble was drawn from box : Box A has 2 green and 5 blue marbles in it. Box B has 9 green and 6 blue marbles in it. A marble is drawn from Box A, transferred to Box B, and then a marble is drawn from Box B. What is the probability a blue marble was drawn from Box A, if you k..
What are the key components of information assurance : Information Assurance: IT549- What are the key components of information assurance as they relate to individual roles and responsibilities within the information assurance plan?
What aspects of this event made the music jazz : Questions and topics to discuss in your paper: What aspects of this event made the music jazz? Where did you hear improvisation? What styles of jazz did you hear? Did any of the music remind you of selections from class
Binomial distribution to determine this : The probability that a light bulb of a given brand is faulty is .1. You want to find the probability that fewer than 5% of a shipment of 1000 light bulbs is faulty. Use the Binomial Distribution to determine this.
What is the yield to maturity on the bond : A noncallable bond has an original maturity of 20 years, an 9% coupon rate (coupons paid annually), and a face value of $1.000. The bond was issued exactly 5 years ago. If the bond is traded at $1.200 today, what is the yield to maturity on the bond?
Functions properly during one period of operation : The probabilities of failures for the components 1 and 2 during one period of operation are .15 and .07 respectively, and the component failures are independent. What is the probability that the system functions properly during one period of oper..

Reviews

Write a Review

 

Management Information Sys Questions & Answers

  Identity management for reducing risk throughout enterprise

How important is enterprise identity management for reducing risk throughout the enterprise

  Analyze the asp model and other outsourcing models

Analyze the ASP model and other outsourcing models as they apply to Riordan to understand outsourcing as an option. Provide the potential success or downfall of each, including partial outsourcing, single-application ASP support, or network system..

  Do you consider anything related to process or policy a true

We know from experience that the insider threat presents the biggest challenge to security professionals. With this area of control being nearly overwhelming... what technologies do you recommend that will help the security team keep a near real-t..

  Investigate the mis requirements of the organisation

You are required to investigate the MIS requirements of the organisation in the case study.

  How information system increase a company position

Define data. Define information. Describe what knowledge is and how it is used to create technology systems. How does an information system increase a company's competitive position

  Conduct research on ais-erp systems

Conduct research on AIS/ERP Systems for your client, including define business processes, develop business requirements, determine the systems requirements, software selection and vendor selection.

  Show the impacts the future of organizations

Summarize the main points of the author and why you believe it impacts the future of organizations.

  Explain the role that stratification has played in your life

Explain the role that stratification has played in your life. Examine how different your life would be if you lived in a caste-system instead of a class-system. Evaluate the role of racial, ethnic, or gender stratification in your day-to-day life.

  Awareness of your erp implementation plans

What are some of the effective tools you may use to reduce resistance to system change and increase awareness of your ERP implementation plans?

  Operations key factors to consider when establishing a

operations key factors to consider when establishing a relationship with a customer and what key factors should a

  Describe the technology that you think the mco would need

Describe the key elements of an information system for an MCO. What elements are different than for a physician office or group? Describe the technology that you think the MCO would need to operate fully.

  System information and additional plugin

Once complete share what you learned by posting in your journal. For example. Is your system information what you expected? Are all of your "Plug-ins" updated? E.g., Flash, Java, etc.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd