Application-incorporating security into it processes

Assignment Help Basic Computer Science
Reference no: EM131086009

Application: Incorporating Security Into IT Processes

Security in an organization does not reside in a silo; it is affected by other processes and vice versa. Therefore, security should be integrated into the overall IT process to make it effective.

You have already investigated the functionality and capabilities of identity and access management tools. The process for creating and removing supplier IDs should be incorporated into an identity and access management tool. 

To prepare for this Assignment, refer to the case study "Developing a Monthly Vulnerability Scanning Process" from the media Selection and Evaluation of IT Solutions. This case study will provide you with an example of how to incorporate a security feature into the overall IT process.

For this Assignment, provide a 3- to 5-page report describing a process that incorporates security for managing supplier credentials into an identity and access management tool. Be sure to do the following in your report:

  • Develop a numbered outline with the steps in a workflow.
  • Identify the teams involved in this process, and explain the steps each team performs.
  • Explain shortcomings in the process that you may  need to overcome.

Readings

  • Brotby, K. (2009). Information security governance: A practical development and implementation approach.  Hoboken, NJ: Wiley.
    • Chapter 8, "Risk Management Objectives"
      • Section 8.3.1, "Recovery Time Objectives"
      In this section, you are introduced to the recovery time objectives. You will explore the organizational considerations for determining such objectives.
  • Hawkins, S. M., Yen, D. C., & Chou, D.C. (2000). Disaster recovery planning: A strategy for data security.Information Management & Computer Security,8(5), 222-230. Information Management and Computer Security Volume 8 by Hawkins, Yen, & Chow.  Copyright 2000 by EMERALD GROUP PUBLISHING LIMITED. Reprinted by permission of EMERALD GROUP PUBLISHING LIMITED via the Copyright Clearance Center. In this paper, you will investigate the importance of disaster recovery planning in the business world. You will also explore a strategic planning process that an organization could follow to develop its own disaster recovery plan.
  • Document: Sample Presentation Template (PowerPoint file)Note: You will use this document to complete this unit's Project.

Optional Resources

  • Bahan, C. (2003). The disaster recovery plan. Retrieved fromhttps://www.sans.org/reading_room/whitepapers/recovery/disaster-recovery-plan_1164 In this article, you will be introduced to the important aspects of a disaster recovery plan.
  • Devlen, A. (2003, March 10). 12 key elements of an enterprise-wide disaster recovery program.ITManagementNews. Retrieved from https://archive.itmanagementnews.com/articles/0310ad.html In this article, you will explore the essential elements that an organization's disaster recovery program should include in order to be effective.

Reference no: EM131086009

Questions Cloud

Developing deployment proposal : Many organizations use graphical representation for discussing important proposals. The presentation of your recommendation about investing in an appropriate IT solution to the stakeholders is equally important to the recommendation generating pro..
Where does customized adaptable vocation work viably : HI6007 Assessment - How does Customized adaptable work advantage both the association and representatives and where does Customized adaptable vocation work viably?
Calculate the increase in the rate of heat transfer : A solution with a boiling point of 180°F boils on the outside of a 1-in. tube with a No. 14 BWG gauge wall. On the inside of the tube flows saturated steam at 60 psia. The convective heat transfer coefficients are 1500 Btu/(h ft2 °F) on the steam ..
How is this affecting their overall brand perception : Nordstrom utilizes branding to create a more positive work environment leading to a brand-driven organization. Discuss another organization that does this well. Conversely, discuss an organization that does not do this well. How is this affecting ..
Application-incorporating security into it processes : Security in an organization does not reside in a silo; it is affected by other processes and vice versa. Therefore, security should be integrated into the overall IT process to make it effective.
Determine the amount of entropy produced, in kj/kg k : The temperature rise is brought about adiabatically by stirring the air with a paddle wheel. Determine the amount of entropy produced, in kJ/kg ? K.
Recommend for naming files in business : What kinds of rules would your recommend for naming files in business? For personal use?
How does mcommerce facilitate the purchase : Determine whether these values encourage or discourage use or ownership and why. Is mCommerce an advantage or disadvantage to the purchase?
Find a maximum weight perfect matching in the graph : ASSIGNMENT 5. Consider the complete bipartite graph K4,4 with vertex partition (A, B) where A = {a, b, d, f}, B = {g, h, i, j}. Use this to find a maximum weight perfect matching in the graph, and an optimal solution for the dual problem

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Resize member function and zero-parameter

For the matrix class, add a resize member function and zero-parameter constructor.

  The number of bits per track is constant

Design a rotating disk where the number of bits per track is constant

  Safe and secure packet transmission

Write about the advantages and disadvantages when the streaming stored audio runs over UDP protocol in 1 to 2 page along with references.Explain the given statement "TCP is generally used for safe and secure packet transmission."

  Decimal ascii number with an implied decimal point

Write a procedure named WriteScaled that outputs a decimal ASCII number with an implied decimal point.

  Write a program that reads in an integer value

Write a program that reads in an integer value for n and then sums the integers from n to 2*n if n is nonnegative, or from 2*n to n if n is negative. Write the code in two versions: one using only for loops and the other using only while loops.

  Sources of program complexity supplying

What is a construction prerequisite? Name at least two describing how they are important to the construction design process. Define software architecture. Name and describe at least three components of this process. Discuss the three sources of pro..

  The sunbeam owners spares club

Sunbeam was a marque of advanced cars built by various companies from 1901 to 1981. Initially a manufacturing company making their own cars, they eventually remodelled other production cars until they became a marque of the Rootes company until..

  How would we change our plot bml grid () function to allow

How would we change our plot BML Grid () function to allow

  Integer expression evaluator this program must use stacks

this program must use stacks in order to evaluate integer expressions. your program need only implement the following

  Discuss and analyze the mbti outcomes

Discuss and analyze the MBTI outcomes for yourself and for your teammates. Based on the MBTI insights, consider: How you might improve your working relationships with your teammates.

  What happens if the best effort is not good enough

IP is described as "best effort delivery service". What exactly does this mean?....What happens if the "best effort" isn't good enough?

  What do you mean by speaker adaptation

What do you mean by speaker adaptation? how it useful to reduce the computational load of the system

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd