Analyze security requirements and develop a security policy

Assignment Help Computer Engineering
Reference no: EM13346652 , Length: 2153 Words

Analyze security requirements and develop a security policy that fully addresses them. The project will enable the student to see and understand the need standards in practice, as well as the details that should be covered within the security policy documentation.

Detailed Requirements

Optional and Ungraded Project

  • Using the GDI Case Study below, complete the Security Policy Document Outline.
  • Provide a one or two-page Security Policy Document Outline. The Outline should cover all aspects of the security policy document and convey the accurate and appropriate information for the stakeholders to make the appropriate decision.
  • Ungraded but instructor will provide feedback to make sure students are on-track. This outline can become major part of the "Executive Summary" of the final deliverable.

Project

  • Using the GDI Case Study, complete the Security Policy Document.
  • Provide a seven- to ten-page analysis summarizing the security policy to the executive management team of GDI. The student designs effective real-time security and continuous monitoring measures to mitigate any known vulnerabilities, prevent future attacks, and deter any real-time unknown threats; and also efficiently meets the organization's objectives. The summary should effectively describe the security policy in a manner that will allow the Senior Management to understand the organizational security requirements and make the appropriate decisions to enforce.

Case study:

Global Distribution, Inc. (GDI)

Global Distribution, Inc. (GDI) is a distribution company that manages thousands of accounts across Canada, the United States, and Mexico. A public company traded on the NYSE, GDI specializes in supply chain management and in coordinating the warehousing, staging, distribution, transportation, and wholesaler/VAR relationship for their customers.

GDI employs over 3,200 employees and has been experiencing consistent growth keeping pace with S&P averages (approximately 8%) for nearly six years. A well-honed management strategy built on scaling operational performance through automation and technological innovation has propelled the company into the big leagues; GDI was only recently profiled in Fortune Magazine.

The executive management team of GDI:

1234_Security Policy Document Project.png

BACKGROUND AND YOUR ROLE

You are the Computer Security Program Manager (CSPM) educated, trained, and hired to protect the physical and operational security of GDI's corporate information system.

You were hired by COO Don Jacobson and currently report to the COO. You are responsible for a $7.25m annual budget, a staff of 17, and a sprawling and expansive data center located on the 9th floor of the corporate tower. This position is the pinnacle of your career - you are counting on your performance here to pave the way into a more strategic leadership position in IT, filling a vacancy that you feel is so significantly lacking from the executive team.

There is actually a reason for this. CEO Jamie Pierce believes that the IT problem is a known quantity - that is, she feels the IT function can be nearly entirely outsourced at fractions of the cost associated with creating and maintaining an established internal IT department; the CEO's strategy has been to prevent IT from becoming a core competency since so many services can be obtained from 3rd parties. Since the CEO has taken the reigns two years ago, the CEO has made significant headway in cutting your department's budget by 30% and reducing half of your staff through outsourcing. This has been a political fight for you: maintaining and reinforcing the relevance of an internal IT department is a constant struggle. COO Jacobson's act of hiring you was, in fact, an act of desperation: the increasing operational dependence on technology combined with a diminishing IT footprint gravely concerned Jacobson, and he begged to at least bring in a manager to whom these obligations could be delegated to. Jacobson's worst nightmare is a situation where the Confidentiality, Integrity, and Availability of the information system was compromised - bringing the company to its knees - then having to rely on vendors to pull him out of the mess.

There's no question that the company's CEO sees the strategic importance of technology in executing her business plan, and in this way you share a common basis of principle with her: that IT is a competitive differentiator. However, you believe that diminishing internal IT services risks security and strategic capability, whereas the CEO feels she can acquire that capability immediately and on the cheap through the open market. You're told that CEO Pierce reluctantly agreed to your position if only to pacify COO Jacobson's concerns.

Reference no: EM13346652

Questions Cloud

The role of hr in the 21st century is becoming increasingly : the role of hr in the 21st century is becoming increasingly vital. a significant claim in support of strategic human
The objective of this project is to show you how the stock : the objective of this project is to show you how the stock market works and of the relationship between theory and
Conduct an analysis on why general motors should expand its : conduct an analysis on why general motors should expand its automobile operations in mexico and prepare an executive
Write an report on a significant software security report : write an report on a significant software security. report should include details such as for example - the nature of
Analyze security requirements and develop a security policy : analyze security requirements and develop a security policy that fully addresses them. the project will enable the
Bluesky systems is a software development company that : bluesky systems is a software development company that builds software components for a variety of private and
Question 1approximate the torque and power necessary to : question 1approximate the torque and power necessary to rotate the inner 20 cm diameter cylinder shown in figure 1. sae
The users will use a browser to access the on-line store : the users will use a browser to access the on-line store. the web server software for the production web server is
Structural modelingstructural modeling is a different view : structural modelingstructural modeling is a different view of the same system that you analyzed from a functional

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write a program that reads in a list of positive integers

Write a program that reads in a list of positive integers. Write down a program which asks user to respond to a question by entering either 1 for yes or 2 for no.

  Pros and cons of these three approaches

It is possible to design and edit web pages in a number of ways. For example, we could edit HTML tags by hand, use a visual editor such as Dreamweaver or use an HTML generator to edit a layout and then create the HTML from it.

  Sketch quality is an elusive concept

sketch quality is an elusive concept. Quality depends on specific organizational priorities: a 'good' design may be the most efficient, the cheapest, the most maintainable, the most reliable, etc.

  Make program that creates a tab delimited file

Write down a C++ program that creates a tab delimited file that can be opened by a spreadsheet to graph the altitude and velocity of a balloon as a function of time from the time of release through 48 hrs.

  What are techniques for addressing security requirements

What are techniques for addressing security requirements? Which have a business relationship with the company?

  How much of a disadvantage computer scientists have

Philosophy is deeply rooted in the History of Computers starting with Leibniz and his concept of binary. Leibniz's dream imagines Armchair Philosopher to be left alone with his thoughts while machines take care of all the other menial tasks requir..

  Developing an eer schema for database application

Develop an EER schema for a database application which you are interested in. State all the constraints which should hold on the database.

  Asynchronous transmission

Assume that the sender and receiver utilize an asynchronous transmission and agree not to utilize any stop elements.

  Companies sometimes purchase expensive applications

Companies sometimes purchase expensive applications, and after that under-utilize or misuse these. In a sense, the economic downturn has been beneficial, as many companies are beginning to more regularly scrutinize the programs they are investing i..

  Left most derivation

A->a|aS|bAA, B->b|bS|aBB, For the string “aaabbabbba” determine a Left most derivation.

  What subsystems were involved in this problem

Think about the most difficult troubleshooting problem you've encountered in your recent experience- one where the solutions was not straightforward and where the problem was into a simple request for information.

  Relationship among nanotechnology and surface phenomena

Relationship between nanotechnology and surface phenomena, A. In what ways do nanotechnology and surface phenomena overlap?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd