Develop an information security security plan for fdu

Assignment Help Management Information Sys
Reference no: EM131357977

Assignment: Information Security "Security Plan" Project

This is an information security project. It is a team project for four or five students. Please form your own teams. The purpose of this project is to develop an information security "security plan" for FDU. The work should be divided among the team members.

The plan consists of several components. Each component is to be discussed in terms of doing the plan for FDU.

In the course information section on blackboard for this course, there are several documents available to assist you in this project.

1. There is a sample template that you can use for this project. Feel free to modify it in your own way. The document is called "Example Security Plan Template".

2. There are two documents that give background on this topic that you can reference (but not copy). They are called:

a) Risk Assessment Guide

b) FCC Cybersecurity Planning Guide Of course, you may research on the Internet and find your own sources.

I would expect this project to be at least 15 pages but no more than 25. You must use font size 12 and 1.5 spacing. Top and bottom margins set to 1 inch. Right and left margins set at 1 inch.

Reference no: EM131357977

Questions Cloud

Research objectives worksheet to reflect required questions : Write a description of the project. Based on the scenario of the project, complete Research Objectives worksheet to reflect the required questions, sources of information, and more.
Compute all the elastic properties for unidirectional lamina : Compute all the elastic properties (E1, E2, G12, G23, ν12) for a unidirectional lamina for the following material combinations:- E-glass-polyester(isophthalic)- S-glass-epoxy(9310).
Three proposed operating systems : Create a one security plan for all three proposed Operating Systems; Network OS, Standalone OS, and Mobile Device OS.
Estimate the effect of misalignment on compressive strength : Estimate the effect of misalignment on the compressive strength of a carbon- epoxy (AS4-3501) composite fabricated by hand lay-up of prepreg tape, vacuum bagged and oven cured, resulting in a fiber volume fraction Vf = 0.6.
Develop an information security security plan for fdu : CS 7783.81- The purpose of this project is to develop an information security "security plan" for FDU. The work should be divided among the team members.
Explaining the most common security threats : Create a 10-slide basic or interactive presentation explaining the most common security threats, modern threats to current Client and Network Operating Systems, Encryption, Authentication, and Hashing. Include the narrator notes as a separate atta..
Can an organization deliver all your priorities : What forms of total compensation-base pay, benefits, or incentives-are most important to you in an employment relationship?Can an organization deliver all your priorities? Explain and give examples.What are some alignment issues related to compensat..
Determine if restrictions on elastic constants are satisfied : The following data has been obtained experimentally for a composite based on an unidirectional carbon-epoxy prepreg (MR50 carbon fiber at 63% by volume in LTM25 epoxy).- Determine if the restrictions on elastic constants are satisfied.
Recommend in order to effectively monitor a network : 1. Where is an attack most likely to occur first; at the network or protocol level? 2. What strategies do you recommend in order to effectively monitor a network, if one is not focused on the protocols?

Reviews

Write a Review

Management Information Sys Questions & Answers

  The purpose of the term project is to explore an it

The purpose of the term project is for you to explore an IT topic of your choice. You may choose any IT topic, subject to instructor's approval.

  Important information about enterprise resource planning

Important information about Enterprise Resource Planning - Give examples of the quality tools you plan to use for identifying and reducing process variability.

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Service request sr-rm-004i need sssistnace in developing a

service request sr-rm-004i need sssistnace in developing a 4 to 6 page paper that describes the application architectue

  Important information about employee privacy

Important information about Employee Privacy - Under what circumstances would this be acceptable? When would it be unacceptable?

  Explain how the new technology was employed

Using the Internet, newspapers, journals, and magazines, identify 3 terror attacks where social media was used as an instrumental tool. Describe how the new technology was employed.

  How would you go about verifying a project scope

What is meant by crisis management? Why do many organizations ?nd themselves in this mode? Using your own experience or the course materials, identify and describe a situation that could be considered as crisis, and create a simple risk management..

  Explain risk management and what it means to the cio

Explain risk management and what it means to the CIO

  Brief a medical organization''s executive team on ehr

You are health information management professional who has been asked to brief a medical organization's executive team on the topic of electronic health records (EHR)

  Abstract on crowdsourcing

For your midterm, you are to write an abstract on crowdsourcing. Background: Today it is not unusual to see entrepreneurs rely on the crowd to seek financial assistance to support their business idea instead of going to a traditional financial inve..

  Prepare a resume and cover letter for the possible job

what you have learned while working with Word, You will create a resume and cover letter for a potential job.Assume you are graduating this semester and need to find a job immediately after graduation. Check your local newspaper or online employmen..

  Compare and contrast end point security today

Case study: Wyoming Medical Center, Los Angeles County and Raymond James: End Point Security Gets Complicated, Compare and contrast end point security today with end point security five years ago. Why is it more complicated today

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd