Explain why other choices may not have been sufficient

Assignment Help Other Subject
Reference no: EM132239186

Assignment: Primary Task Response: Within the Discussion Board area, write 400-600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas:

Using the library and Internet, search for information about security management organizations. One example might be a silo structure, which is vertical or hierarchical with both reporting and responsibilities. A second example might be a security working group (WG), which is a service with enterprise-wide participation. Complete the following:

1. Begin by making a choice of 3 priority security expectations for any security organization.

a. Justify your choices, and explain why other choices may not have been sufficient.

b. For each expectation, compare how it is achieved through both the silo and the WG organizational structures.

2. For each organizational structure, compare the roles that have security responsibilities.

a. For example, the chief security officer (CSO) has high visibility in both the silo and WG structures, but significant differences in leadership directions.

3. Acknowledge role differences, and justify changes with their responsibility assignments for each structure.

main task

Project Selection

The first step will be to select a real or hypothetical organization as the target for your Comprehensive Security Management Plan document. This organization will be used as the basis for each of the assignments throughout the course and should conform to the following guidelines:

1. Nontrivial: The selected organization should be large enough to allow reasonable exercise of the security management analysis and planning processes.

2. Domain knowledge: You should be familiar enough with the organization to allow focus on the project tasks without requiring significant time for domain education.

3. Accessibility: You should have good access to the people and other information that is related to the organization because this will be an important part of the process.

4. The selected organization may already have security management in place, but it may still be used as the basis for the projects in this course.

5. The selected organization must have a need for some kind of security management as part of its operations.

a. Feel free to identify a hypothetical organization that meets the requirements.

b. You may make any necessary assumptions to fulfill the requirements of organization selection.

Select an existing organization or identify a hypothetical organization that fits these requirements, and submit your proposal to your instructor before proceeding further with the assignments in the course. Approval should be sought within the first several days of the course through an e-mail proposal to your instructor.

Assignment

The first task in this process will be to select an organization or identify a hypothetical organization to use as the basis of the projects. Next, you will create the shell document for the final project deliverable that will be worked on during each unit. While you proceed through each project phase, content will be added for each section of the document to gradually complete the final project. Appropriate research should be conducted to support the development of the document, and assumptions may be made.

For the first phase of the Comprehensive Security Management Plan document, you will create an enterprise organizational chart in the first document section. A proposed security working group (WG) organization and its ties to the enterprise will be added. Finally, include a 1-page discussion of the flow of information, decision-making communication, and responsibilities of the chief security officer (CSO). Create the skeleton for the Comprehensive Security Management Plan as follows:

1. Use Word

2. Title Page

a. Course number and name

b. Project name

c. Your name

d. Date

3. Table of Contents (TOC)

a. Use an auto-generated TOC.

b. This must be on a separate page.

c. This must be a maximum of 3 levels deep.

d. Be sure to update the fields of the TOC before submitting your project.

4. Section Headings (Create each heading on a new page with "TBD" as content, except for the sections that are listed under "New Content.")

a. Project Outline (Week 1)

b. Security Requirements (Week 1)

c. Security Business Requirements (Week 2)

d. Security Policy (Week 3)

e. System Design Principles (Week 4)

f. The Training Module (Week 5)

5. References

The following are the project deliverables for Week 1:

1. New Content

a. Project Outline and Security Requirements

i. Include a brief description of the real or hypothetical organization in which the Comprehensive Security Management Plan will be implemented.

ii. Include the company's size, location(s), and other pertinent information.

b. Initial Security Projects

i. Corporate organizational chart

ii. WG structure and ties added to corporate organizational chart

iii. Memo discussing communication flows with WG.

Reference no: EM132239186

Questions Cloud

Discuss defensive tactics and technologies : Discuss at four defensive tactics and technologies for mitigating threats. Please discuss each at least half page each technologies. The response must be typed.
Provide a stimulus for creating a useful resource : Provide a stimulus for creating a useful resource for teachers based on one or more topics and issues from our unit and to get you thinking about the advice
Create one-page summary of significant technology innovation : Scan articles that appeared over the last two weeks. Use those articles to create your own one-page summary of significant technology innovations over the last.
Focus your thesis on one particular aspect of the two works : Focus your thesis on one particular aspect of the two works such as protagonists, themes, central conflicts, or other another element that you see as important.
Explain why other choices may not have been sufficient : Justify your choices, and explain why other choices may not have been sufficient. For each expectation, compare how it is achieved through both the silo.
What are the major differences between the two providers : What are the major differences between the two providers you selected? Which provider of the two you selected do you think works best for hosting a real estate.
Demonstrate familiarity with the context of the works : Romantic poets are often referred to as "nature poets," and as poets that pay attention to the issues affecting their societies.
How microsegmentation can support a zero trust network : Explain the difference between physical network segmentation and microsegmentation as they relate to cloud security. Explain what it means to implement.
Discuss the great issues contained in the readings : Discuss the great issues contained in the readings. Discuss the ways in which the issues changed from the Old to the New Testament.

Reviews

Write a Review

Other Subject Questions & Answers

  Cultural phenomena is essential to the completion

Understanding cultural phenomena is essential to the completion of an accurate health assessment. Please choose a cultural group from Table 4.1 (pp. 69-71) from your text and describe the cultural differences pertinent to that group.

  Couple of reasons why native tribes

I know a couple of reasons why native tribes in, west papua or new guinea, are becoming extinct, diease and well just warfare with other tribes. is there any other reasons on why so many of the tribes are becoming extinct?

  Provide examples of three value-added support strategies

Provide examples of three value-added support strategies geared toward helping a nursing home to implement a goal of providing a safe and caring.

  What is the name for this common regression analysis error

In a multiple regression analysis, we find that two of the independent variables are so tightly correlated that the unique influence of either variable can't be determined. What is the name for this common regression analysis error?

  How is the methodological approach of existentialism

essay questions1.what does kierkegaard mean by a leap of faith? would such a thing be easy to do?2.how is the

  Create a short presentation in which you will propose idea

Create a short presentation (either a screencast or PowerPoint recording) in which you will propose your idea for a study.

  Reflect on the developmental significance of work

Reflect on the developmental significance of work and career. You will also consider how a career in the counseling field can add meaning to your life.

  What are three specific policies that you would propose

What are three specific policies that you would propose to ensure access to a quality education for all learners? Be specific.

  Develop an increased understanding of the dynamic

Briefly describe at least one (1) episode of a television show in which you observed aggression or violence.Identify the context in which the character(s) demonstrated aggression or violence. Include the gender, age, and culture of the character(s)..

  How does the idea and purpose of art differ across cultures

How are these views a rejection of the natural standpoint we see adopted by empiricism and rationalism and rejected by phenomenology?

  Explain what the term cumulative means in this analysis

Explain what the term "Cumulative" means in this analysis. Why did the percentage of Heterosexual patients increase between 1986 and 2010

  To what extent is an institution a product of policy

1. what can be learned from policy analysis?2. to what extent is an institution a product of policy choices made over

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd