Discuss about the software information assurance

Assignment Help Management Information Sys
Reference no: EM131350722

Software Information Assurance

You will select a real organization or create a hypothetical organization and apply your research to develop the Information Security Assurance Implementation Plan that would be appropriate for the organization and fulfill a need that the organization has for its systems. Additional information and the deliverables for each Individual Project will be provided in the assignment description for the project. This is the course Key Assignment that you will make contributions to each week.

Project Selection

The first step will be to select an organization as the target for your Information Security Assurance Implementation Plan. This organization will be used as the basis for each of the assignments throughout the course and should conform to the following guidelines:

• Nontrivial: The selected organization should be large enough to allow reasonable exercise of the information security assurance planning process.

• Domain knowledge: You should be familiar enough with the organization to allow you to focus on the project tasks without requiring significant time for domain education.

• Accessibility: You should have good access to the people and other information that is related to the organization, because this will be an important part of the process.

• Note: The selected organization might already have an information security assurance plan in place, but it may still be used as the basis for the projects in this course.

• Note: The selected organization must have a need for some kind of information security assurance as part of its operations. Therefore, feel free to identify a hypothetical organization that meets the requirements. You may make any necessary assumptions to fulfill the requirements of organization selection.

Assignment

For the assignments in this course, you will not be implementing the actual project, but rather, you will be developing a comprehensive Information Security Assurance Implementation Plan. Your first task in this process will be to select an organization or identify a hypothetical organization to use as the basis of your projects. You will also create the shell document for the final project deliverable that you will be working on during each unit. As you proceed through each project phase, you will add content to each section of the final document to gradually complete the final project delivery. Appropriate research should be conducted to support the development of your document, and assumptions may be made when necessary.

The project deliverables for Week 1 are as follows:

• Submit your organization proposal to your instructor for approval.

o Information Security Assurance Implementation Plan document shell

o Use Word

o Title page

Course number and name

Project name

Your name

Date

o Table of Contents (TOC)

Use an autogenerated TOC.

This should be on a separate page.

This should be a maximum of 3 levels deep.

Be sure to update the fields of the TOC so that it is up-to-date before submitting your project.

o Section Headings

Week 1: Information Security Plan Overview

Week 2: Risk Assessment

Week 3: Security Standards for Development and Deployment

Week 4: Vulnerability Management

Week 5: Assessment and Assurance

• Project Outline and Requirements

o Provide a brief description of the organization where the Information Security Assurance Implementation Plan will be implemented.

o Include the company's size, location(s), and other pertinent information.

o Material can be taken from the approved proposal submitted to your instructor.

o Be sure that this project is approved by the instructor.

• Information Security Overview

o Provide an overview of the information security plan overview that is suitable for a nontechnical audience.

o Include a brief description of the organization's information security issues in areas of network management, server management,

Reference no: EM131350722

Questions Cloud

What is your firm approximate operating leverage : You currently sell 1,000 units at a sales price of $100 per unit (sales price remains the same, regardless of the economy). Also, regardless of the economy, your variable cost per unit will be $60 and your total fixed costs will be $25,000. In a good..
Would the price of the put move by the same percentage : A stock has a price of $40. The risk-free interest rate is 7% per annum and the stock has volatility parameter of 28%. Consider a European call option on the stock for a strike price of $41 with expiration in 6 months. Let t be the current time and t..
Define the problem in the scenario that you have chosen : Define the problem in the scenario that you have chosen. Analyze the problem in the scenario. Generate options for solving the problem in the scenario
Determine the atmospheric temperature gradient : At a height z1 the pressure and temperature are 975 mBar and 11.5 °C. Determine the atmospheric temperature gradient, and the height z1.
Discuss about the software information assurance : CS661:You will select a real organization or create a hypothetical organization and apply your research to develop the Information Security Assurance Implementation Plan that would be appropriate for the organization and fulfill a need that the or..
Describe the metal band straight line stitch : Describe the metal band "Straight Line Stitch". Use your own words to introduce the band, the story behind, and their style.
Marginal tax bracket and has a required return : Aria Acoustics, Inc., (AAI) projects unit sales for a new seven-octave voice emulation implant as follows: Production of the implants will require $2,450,000 in net working capital to start and additional net working capital investments each year equ..
Fair dealing and the possibility of an implied contract term : Explain the distinction between the court's discussion of the covenant of good faith and fair dealing and the possibility of an implied contract term.
Evaluate the current forces driving change : In a written paper of 1,250-1,500 words, evaluate the current forces driving change in your field or industry. As a leader, or considering the role of a leader, assess your organization and evaluate how well it is responding to the forces, and ide..

Reviews

Write a Review

Management Information Sys Questions & Answers

  How does web mining differ from data mining

Compare and contrast the differences between data integrity and data consistency. Please provide an example for each one. Explain the importance of internal tools that are available within a DBMS. Please provide an example of one of these tools.

  Is internet access important for economic development

What advantages could broadband offer to underserved areas of the world? Is Internet access important for economic development? Why or why not

  Analyze porters five forces model

Analyze Porter's Five Forces Model in relation to competition within the industry of That corporation

  What did you learn about tracking e-mail and spam

Find the "Received:" field in the headers and write down as many DNS names or IP addresses as you can. Also look for common details in the header elements of the different messages, such as the same e-mail servers and spammers.

  Differences between open and closed source programs

Discuss the differences between open and closed source programs. Your response should be at least 200 words in length. You are required to use at least your textbook as source material for your response. All sources used, including the textbook, must..

  What are some of the current trends organizations face

What are some of the current trends organizations face with mobile computing security and what are some of the remediation steps companies take to ensure data confidentiality and integrity?

  List decisions that firms have to make in global outsourcing

List the major decisions that firms have to make in global outsourcing and indicate how firms decide whether or not they should engage in global outsourcing

  Provide an efficient application development structure

Using specialization hierarchies can provide an efficient application development structure. Justify the use of surrogate primary keys for a database design. Provide an example to support your response.

  What is the name of the hidden administrative share

A Windows Server2003/2008 system configured as part of a network workgroup would be properly referred to by which of the following?

  Compare various ways expert systems can be used in business

Compare various ways expert systems can be used in business decision-making situations. Introduction: Almost everything we do today involves some type of expert system; a simple and common example is the diagnostic system that mechanics use to dia..

  Construct a table with columns for the controller

Construct a table with columns, for the controller, expert and creator patterns and rows for the design principles presented in Chapter 6. Mark an x in intersecting cells to indicate which patterns support which design principles. Provide explan..

  What is your willingness to listen score

What is your willingness to listen score? What feedback did you receive from the quiz? Why do you think this measure was an accurate or inaccurate representation of your willingness to listen?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd