Effective information technology security policy framework

Assignment Help Basic Computer Science
Reference no: EM132525047

Establishing an effective Information Technology Security Policy Framework is critical in the development of a comprehensive security program. Additionally, there are many security frameworks that organizations commonly reference when developing their security programs. Review the security frameworks provided by NIST (SP 800-53), ISO / IEC 27000 series, and COBIT. Assume that you have been hired as a consultant by a medium-sized insurance organization and have been asked to draft an IT Security Policy Framework.

You may create and / or assume all necessary assumptions needed for the completion of this assignment.

Select a security framework, describe the framework selected, and design an IT Security Policy Framework for the organization.

Describe the importance of and method of establishing compliance of IT security controls with U.S. laws and regulations, and how organizations can align their policies and controls with the applicable regulations.

Analyze the business challenges within each of the seven (7) domains in developing an effective IT Security Policy Framework.

Describe your IT Security Policy Framework implementation issues and challenges and provide recommendations for overcoming these implementation issues and challenges.

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow SWS or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Identify the role of an information systems security (ISS) policy framework in overcoming business challenges.

Reference no: EM132525047

Questions Cloud

Post to the estimated warranty payable t-account : Assume that Thomson Toyota in Adelaide makes sales of Toyota Corollas totalling $500,000. Post to the estimated warranty payable T-account
Calculate average day cost of goods sold : Calculate Average Day's Cost of Goods Sold. Round the answers to two decimal places. Canadian Bacon Inc. financial statements
Describe how you would conduct a job analysis in a company : Explain how you would conduct a job analysis in a company that has never had job descriptions. Utilize the O*Net as a resource for your information.
Relate cloud computing to software quality assurance : Explain How a Cloud Computing Course will be helpful to a Software Quality Assurance Engineer in his day to day life job duties?
Effective information technology security policy framework : Establishing an effective Information Technology Security Policy Framework is critical in the development of a comprehensive security program
Determine the current ratio and quick ratio : The following items are reported on a company's balance sheet: Cash $258,000. Determine the current ratio and quick ratio
Describe the civil right rights act : The Civil Right Rights Act of 1964. Each student will pick a topic and thoroughly discuss the chosen topic. You should tell why it is important.
Principles for policy and standards development : Determine which type of organization would have the most difficulty implementing the principles you selected. Support your answer.
Explain how the building meets the definition of an asset : Your company owns a building that if fully paid for. Explain how the building meets the definition of an asset under each of the scenarios

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Traveler will bear the larger burden of the tax

Which type of traveler will bear the larger burden of the tax? Briefly explain your reasoning.

  Design and information security architecture-design

Differentiate between Security Architecture & Design and Information Security Architecture & Design: What is the CIA Triad (define each component)? What is Defense-in-depth? In order to meet both criteria, what are the minimum security requiremen..

  Monetary or fiscal policy

Does the one that achieves quicker results make it a more powerful policy instrument? Why or why not?

  Explain how an organisation can transition data

Explain how an organisation can transition data into knowledge and give an example

  Program for an automatic teller machine

Create a program for an automatic teller machine that dispenses money. The user should insert amount desired and the machine dispenses this amount using least number of bills.

  Create a linked list of objects

1. Write a Java program that addresses a real world problem that needs a linked list. Create a linked list of objects (the object should be a realistic entity). Do NOT use the Java api libraries for this.

  What is meant by an overcharge

What is meant by an overcharge? Graphically what is measured by an overcharge. How does it relate to the efficiency losses a market suffers?

  What steps should you take to determine the issue

With Motherboard beep codes what should you do If there is no beep, or if nothing happens after the power button is pressed, what steps should you take

  Which are most popular neural network structures

What do you think about the ability of neural networks to show great fault tolerance when they encounter damages to the elements and destruction of their whole structures?

  Tools or tactics for risks for computing infrastructure

As part of project to assess security risks for computing infrastructure, you have found that other managers often have different idea. List any tools or tactics that could be used.

  What is the price of a semiannual

What is the price of a semiannual $1,000 par value bond with four years left until maturity that pays a coupon of 3.75% and is yielding 5.25%?

  Specific needs and requirements for users

Over the years, different port connection types have been developed in response to specific needs and requirements for users. While it appears the trend is leaning towards an approach favoring USB connections, why do you suppose it is important fo..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd