Establish approval processes for sending communications

Assignment Help Computer Engineering
Reference no: EM132002632

Question: Instructions: Read the Geoff Keston article titled "Developing A Security Communications Plan".

According to Keston (2013), "A mark of a mature security communications program is the shift away from one-time messages, such as ad hoc emails. Such messages are easily forgotten and are often hard to find after a few weeks. A good security communications plan will include sending updates and alerts as well as maintaining a repository of documentation. Creating such a repository (or a consolidated document) makes information easier to find, and it helps to link together disparate elements into a unified plan."

For the purpose of this assignment, you are tasked as the Cybersecurity Director to prepare a Security Communications Plan for execution at the program level. You are to develop a security communications plan for your organization that addresses the handling of all communications related to security. Follow the requirements below:

Develop a comprehensive security plan that does the following:

1. Identify archiving procedures

2. Establish approval processes for sending communications

3. Describe legal and regulatory requirements

4. Define key terms

5. Define severity levels and message types

6. Using the definitions of severity levels and message types, diagram who receives messages and through what means they receive them (e.g., text messages)

7. The plan will address the concerns of many constituents, including executives, IT staff members, and end users, as well as customers and partners. Each group has somewhat different needs, so it is helpful to structure a plan to protect sensitive information from the entire group and to make targeted information easy for its audience to find.

Reference no: EM132002632

Questions Cloud

What are some difficulties that an obese child might have : What are some adaptions that a teacher can make to endure that an obese child is able to complete a physical activity?
Traditional versus object-oriented design : Compare the object-oriented approach to design to the traditional approach.
Conduct a job evaluation and appraisal : Describe the procedures/guidelines used to conduct a job evaluation and appraisal
Describe the role of a decision support system : Briefly describe the role of a decision support system in an organisation and list two characteristics of a data warehouse. You may give an example to clarify
Establish approval processes for sending communications : Develop a comprehensive security plan that does the following: Establish approval processes for sending communications.
Explain with advantages and disadvantages : What is brief? And What ways we implement an effective brief explain with advantages and disadvantages?
List all the functional dependencies exist in the relation : 1. List all the functional dependencies exist in the relation 2. Demonstrate that the relation meets third normal form (3NF)
What do you think is going through billys mind : It seems to be unlocked, and no one is around. Using Kohlberg's work as a guide, what do you think is going through Billy's mind?
How each teacher models what you read and learned : What evidence did you see and hear regarding formative assessments being an assessment FOR learning?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd