Establishing compliance of it security controls with us laws

Assignment Help Computer Network Security
Reference no: EM13812434

Assignment: IT Security Policy Framework

Establishing an effective Information Technology Security Policy Framework is critical in the development of a comprehensive security program. Additionally, there are many security frameworks that organizations commonly reference when developing their security programs. Review the security frameworks provided by NIST (SP 800-53), ISO / IEC 27000 series, and COBIT. Assume that you have been hired as a consultant by a medium-sized insurance organization and have been asked to draft an IT Security Policy Framework.

You may create and / or assume all necessary assumptions needed for the completion of this assignment.

Write a three to five (3-5) page paper in which you:

  1. Select a security framework, describe the framework selected, and design an IT Security Policy Framework for the organization.
  2. Describe the importance of and method of establishing compliance of IT security controls with U.S. laws and regulations, and how organizations can align their policies and controls with the applicable regulations.
  3. Analyze the business challenges within each of the seven (7) domains in developing an effective IT Security Policy Framework.
  4. Describe your IT Security Policy Framework implementation issues and challenges and provide recommendations for overcoming these implementation issues and challenges.
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Reference no: EM13812434

Questions Cloud

Companies that use the lean or jit philosophies : Give two examples (other than Toyota) of companies that use the Lean or JIT philosophies and cite the sources from which you learned about their Lean or JIT efforts.
How high should a monopoly set its prices in order : How high should a monopoly set its prices in order to maximize profits - When you post a response to this question, place it in the context of one of the examples.
Integrated social studies learning : Integrated social studies learning
Define and discuss the open shop movement : Define and discuss the open shop movement. Include a specific example and analyze its success or failure, and why.
Establishing compliance of it security controls with us laws : Describe the importance of and method of establishing compliance of IT security controls with U.S. laws and regulations, and how organizations can align their policies and controls with the applicable regulations
Ensure reliability in the products or services : Identify two companies in unrelated industries that use TPM approaches to ensure reliability in the products or services that they sell, and in a 4- to 6-page Microsoft Word document, create a report responding to the following questions:
Monopolists control : In a one page synopsis explain the following statement - A monopolist can control the price or the quantity sold, but cannot control both
Essay on pros and cons of technology : Essay On Pros and Cons of Technology
Evaluate potential value of michael porters forces analysis : Evaluate the potential value of Michael Porter's Five Forces analysis and SWOT Analysis for effective decision making, in its ability to help Scarlet.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain why asynchronous i/o activity is a problem

Explain why asynchronous I/O activity is a problem with many memory protection schemes, including base/bounds and paging. Suggest a solution to the problem.

  Why change the default administrator login and password

what are some of the important measures you can take to ensure that your home wireless network is safe and secure. Change the default administrator login and password. Use something only you will remember.

  An isp has received a block

An ISP has received a block of addresses in which the prefix length (n = 24). The ISP needs to make 8 sub-nets (sub-blocks) of equal sizes from this block. What is the prefix of each sub-block?

  Efficient means of electronic payments

Think about security concerns and limited resources, do you think public sector entities should consider utilizing PayPal to facilitate inexpensive and efficient means of electronic payments?

  Termination of a project

As a assignment manager, you are asked to facilitate a lessons learned session as part of the assignment termination process.

  Identify physical security methods and the role

Identify physical security methods and the role they play in a network security plan. Compare and contrast the advantages and disadvantages of the physical security methods you identified.

  Based on your understanding of networking concepts make a

based on your understanding of networking concepts create a 2- to 3-page report in a microsoft word document with

  Define the terms class, object and message

Define the terms class, object and message. How does the concept of message passing help to encapsulate the implementation of an object, including its data?

  Implement network security on edge routers

Implement network security on edge routers and LAN switches  and provide evidence that it is secure.

  Creating a switchboard design with control buttons

Construct a detail report that will display all courses in alphabetical order, with course name and instructor name in a group header; the Social Security number, name, and telephone number

  Fundamental principles in both the bell-lapadul bipa

describe the fundamental principles in both the bell-lapadula and biba security models. for each explain what sort of

  Discretionary and mandatory access control

Logic bombs, War dialing, Ping of death attack, steganography, RSA scheme, digital signature, A chain of certificates, A certificate revocation list, A trust anchor, asymmetric algorithm used by PGP, IPSec mode, IP virtual Private Networks

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd