Create a section in the plan to list all of the policies

Assignment Help Management Information Sys
Reference no: EM131385241

Assignment # 1

IP: The Network Security Policy

For this assignment, you will create 2 additional sections for the Network Security Plan document.

First, you will create a 2-3-page section in the plan to list all of the policies that you would have for your organization and a brief description of what each policy will contain. After the risks, have been identified within an organization, you must devise a plan that will provide the best possible protection without significantly impacting daily operations. Then, you must write and implement written policies that will inform everyone within the organization what can and cannot be done while they are connected to the Internet.

Written polices need to adhere to the following guidelines:

o No more than 2 pages

o Clearly identified rules

o Clearly identified punishments if rules are not followed.

o A way to monitor the network for violations of the policy.

The following are the first task's deliverables:

o Update previous sections based upon your peers' and instructor's feedback

o Update the table of contents.

o Update date on the cover page.

Security Policies Section

o Identify what written polices need to be created for your organization.

o For each policy, you will address how you plan to monitor the policy.

o For each policy, you will provide what you feel the appropriate punishment should be for violators. These punishments must be able to be enforceable, not just a threat.

o For each policy, you will identify a timetable for when each policy should be reviewed and updated and who will do the review.

The second task this week is to prepare for how you would handle an incident. It is best to have a thorough, rehearsed plan to be prepared for a potential incident. This will help to limit the damage and it will help recovery afterward.

You will create an Incident Response section of 2-3 pages that includes the actions that need to occur when an incident is in progress.

The following are the second task's deliverables:Incident Response Section

o Identify the process of how your organization will identify an incident.

o Identify the process for classifying the incident.

What are the criteria for each classification within the organization?

o Identify what the response will be for each classification identified.

o Identify a general plan to recover from the incident.

o Identify a process for evaluating the incident response plan after each incident has been mitigated.

o Discuss how the incident response plan will be tested and updated.

o Name your document "Yourname_CS653_IP4.doc."

• Objectives:

o Develop a network security policy.

o Recognize the fundamentals of privacy, confidentiality, and access required to establish and sustain network security.

Assign #2

Software Information Assurance: Week 4 IP

As part of the development of an information security plan, you need to develop a strategy for identifying and promptly remediating information security vulnerabilities to minimize information security breaches. For this assignment, you will continue the planning process by adding the Vulnerability Management section to the Information Security Assurance Implementation Plan. Based on the work from Weeks 2 and 3, you will select a solution strategy for the organization to implement information security quality assurance. As part of the solution strategy, you will make recommendations for prioritizing, budgeting, implementing, and maintaining risk-reducing countermeasures.

The project deliverables for Week 4 are as follows:

• Update the Information Security Assurance Implementation Plan title page with the new date.

• Update the previously completed sections based on the instructor's feedback.

• Vulnerability Management
Select and describe a solution strategy for the organization to implement information security quality assurance based on your previous work from Weeks 2 and 3.

Recommend and justify your recommendations for prioritizing, budgeting, implementing, and maintaining risk-reducing countermeasures.

• Name the document "yourname_CS661_IP4.doc."

• Be sure to cite all references in APA format.

Reference no: EM131385241

Questions Cloud

What is the most serious weakness in interviewing process : What steps and/or topics would you recommend for inclusion in the orientation program of a printing firm with 65 employees?
Whether adequate provisions have been made for replacement : Determine whether adequate provisions have been made for replacement of key management personnel when it becomes necessary. Is the firm using any form of executive development?
What problems are involved in using incentive plan : Is the use of a profit-sharing plan desirable in a small business? What might lessen such a plan's effectiveness in motivating employees?
How we attempt to solve problems when richard feinberg said : Pointing to the tough realities, such as globalization, faced by one or two nations studied during throughout the course, explain what you think Richard Feinberg meant about how we attempt to solve problems when he said.
Create a section in the plan to list all of the policies : create a 2-3-page section in the plan to list all of the policies that you would have for your organization and a brief description of what each policy will contain. After the risks, have been identified within an organization, you must devise a p..
What are the greatest benefits of employee leasing : How does employee leasing differ from using a temporary help agency? What are the greatest benefits of employee leasing?
To what extent should a small firm use old timers : To what extent should a small firm use "old-timers" to help introduce new employees to the workplace? Is it inevitable that newcomers will look to old-timers to find out how things really work?
Explain step-by-step process of conducting dismissal meeting : Describe a step-by-step process of conducting the dismissal meeting. Determine the compensation that the fictitious company may provide to the separated employee.
How will an employees age affect the appeal of given plan : How will an employee's age affect the appeal of this plan? What other factors are likely to strengthen or lessen its motivational value? Should it be changed in any way?

Reviews

Write a Review

Management Information Sys Questions & Answers

  Impact of the soa paradigm on perspectives

Impact of the SOA Paradigm on Perspectives - Write a short report to explain the impact of architecture quality attributes on the SOA solution. The report should be a maximum of 2 pages.

  Identify the benefits of using iso 9000

ISO 9000 standards - Identify the benefits of using ISO 9000. Site your references.

  Write essay on most important elements of computer security

The class textbook is not a valid source for this assignment. Apply the content from the articles in an essay on the most important elements of computer security.

  Traditional methods of performing tasks

New technology vs the 'old way' - what are some of the risks of using technology to do things instead of using more traditional methods of performing tasks?

  The problem to be addressed in this study pertains to the

the problem to be addressed in this study pertains to the impact of international trade agreement ita and intellectual

  Review and analyze data from these disparate sources

The explosive volume of new consumer electronic products, online reviews, and social media comments has overwhelmed Boffo's manual data collection and integration approach. Boffo's management has asked you to study how to automate collecting onlin..

  Create an essay describing the maintenance mode

Create an essay describing the "Maintenance Mode" .Include each of the model's five domains and explain why each domain is important. Why should organizations have plans in place for the changing and maintenance of their information security programs..

  What additional solutions do you propose

Evaluate the alternative solutions being considered by Jennifer Roberts and What additional solutions do you propose? Why?

  Identify a successful it project reported in the literature

Identify a successful IT project reported in the literature. Analyse the factors that made the project you selected successful. Discuss your rationale for each of your answers.

  Write paper on virtual networking and vmware

Write a 20 page paper about Virtual Networking and VMware. what virtual networks are, what are its components, networking components, how is a Virtual Network different from a physical network

  Contemporary information systemthe database administrator

contemporary information systemthe database administrator dba is not necessarily a single individual. in a large

  Create a data flow diagram of some system

Create a data flow diagram of some system. Can use a real world example or a hypothetical one. Write a summary explaining the data flow diagram and trust boundaries. Using STRIDE with the Data Flow Diagram, provide a list of threats against t..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd