Describe the principles of security management

Assignment Help Computer Network Security
Reference no: EM13974761

As you begin to craft a Security Management Plan for your organization to secure and protect the quality and integrity of the data, you will take this opportunity in the first assignment to create the shell of your Security Management Plan.

The assignments each week build upon the work and knowledge from the weeks beforehand. You will create 1 document that contains all of the weekly assignments-in separate sections-culminating with the final submission being a single document containing all of the weekly assignments.

You are responsible for adding each of these ongoing Individual Project assignments into your Key Assignment document that will contain a security plan for the organization to be used to protect the organization's assets.
The project deliverables are as follows:

Security Management Plan
Use Word
Title page
Course number and name
Project name
Your name
Date
Table of Contents (TOC)
Use an autogenerated TOC.
This should be on a separate page.
This should be a maximum of 3 levels deep.

Be sure to update the fields of the TOC so that it is up-to-date before submitting your project.

Section Headings (create each heading on a new page with "TBD" as content, except for Section 1)

Section 1: Information SecurityManagement (Week 1)

This section will be used to describe the organization and will establish the security model to be used by the organization.

Section 2:Security Program (Week 2)

This section will focus on existing frameworks that can help in the implementation of a security plan and what a security organization should look like.

Section 3:Security Policies (Week 3)

This section looks at security policies and their creation.

Section 4:Assessing Risk (Week 4)

This section will focus on risk assessments and methodologies used to perform one.

Section 5: ControllingRisk (Week 5)

This final section combines all of the previous sections and gives the opportunity to look at mechanisms to control risk.

Create the following section for Week 1:

Section 1: Information Security Management

Describe an organization of your choosing, for which you will implement a security program.

Describe the principles of security management, including the following:

People
Process

Technology

Describe the role of project management with respect to implementing security management.

Describe how you plan to instill a secure mentality into an organization, including a tie into the project management discussion about when security concepts should be introduced into the project lifestyle.

You should provide at least 2-3 pages of discussion for this information.

Reference no: EM13974761

Questions Cloud

Analyze the business-level strategies for nikon corporation : Analyze business-level strategies for the NIKON corporation you chose to determine the business-level strategy you think is most important to the long-term success of the firm and whether or not you judge this to be a good choice.
How many times is the basic operation executed : Consider the following algorithm ALGORITHM Enigma(A[0...n-1,0...n-1])) for j=0 to n-2 do for k=j+1 to n-1 do If A[j,k] (not equals to) A[k,j] return false return true- What does this algorithm compute? What is its basic operation?
What are the companys reviews on glassdoor like : What are the company's reviews on glassdoor.com like? What information do you find using social media such as Twitter, Facebook and LinkedIn?
Marginal cost of borrowing : A bank offers two 30 year, fixed rate, fully amortizing LPMs: an 85% LTV loan at 6%, and an 80% LTV loan at 5.5%. What is the marginal cost of borrowing if the loan is going to be held for 10 years?
Describe the principles of security management : Describe how you plan to instill a secure mentality into an organization, including a tie into the project management discussion about when security concepts should be introduced into the project lifestyle.
Important aspect to companies : The first discussion is all about working capital. Working capital is the money needed to fund the normal, day to day operations of your business.
Examine the budgetary constraints : Examine the budgetary constraints that correctional officials work with as they operate correctional facilities. Determine the major trade-offs made between the policy for proper funding and the practice of proper funding to prevent recidivism. Pr..
Company interest expense for the year : Income Statement (EBIT) was $6 million, and the company pays a 40 percent tax rate. What was the company's interest expense for the year? [Hint: Divide $3 million by (1 - T) = 0.6 to find taxable income.]
Calculate the price elasticity of demand for type b : Calculate the price elasticity of demand for Type B consumers at the monopolist's profit maximizing price.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Common information security threats

This is part one of a three-part assignment. The final version will be submitted. It is expected that adjustments will be made in the final version based on the feedback provided .

  Procedure to select key uniformly at random from keys-hash

Describe a procedure that selects a key uniformly at random from among the keys in the hash table and returns it in expected time O(L.(1 + 1/α)).

  Discuss in detail one vulnerability analysis tool

Discuss in detail one vulnerability analysis tool that is suitable for this (deployment) environment -  You have the liberty to consider open source or free products such as OpenVAS.

  Inherent flaws in the department of homeland securitys

In your opinion, what are the inherent flaws in the Department of Homeland Security's Blueprint for a Secure Cyber Future? Explain your answer

  Cyber terrorism & information warfare

Risk Management, IT Related Risks, Radio Frequency Identification (RFID), Easy listing of special programs,  Social Engineering

  Threat to information security in an organization

What is the most common threat to information security in an organization?

  Paper on entropy as it pertains to cryptography

Turn in a 3 page paper on Entropy as it pertains to Cryptography. The paper must discuss the relationship of Entropy to the likelihood that an attack can be successful, the formula for computing Entropy

  Problem regarding the website migration project

Tony's Chips has recently been sold to a new independent company. The new company has hired you to manage a project that will move the old Website from an externally hosted solution to an internal one.

  What are the benefits of virtualization of servers

What are the benefits of virtualization of servers? Short answer - Need at least 4 benefits. Also define a virtual server.

  Network topology diagram and the domains of trust

Network topology diagram and the domains of trust Security-related assumptions in your design and security policy to make this assumption valid and give a classification about users according to their trust domain

  Describing the some of the issues you might face

Assignment: Write a 3-to 4-page paper describing the some of the issues you might face when maintaining security in a company that has offices in multiple countries

  Was the tjx break-in due to a single security weakness

Explain different ways that this program can be sabotaged so that during execution it computes a different sum, for example, 3 to 20.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd