Information technology security policy framework

Assignment Help Business Management
Reference no: EM131249668

Establishing an effective Information Technology Security Policy Framework is critical in the development of a comprehensive security program. Additionally, there are many security frameworks that organizations commonly reference when developing their security programs. Review the security frameworks provided by NIST (SP 800-53), ISO / IEC 27000 series, and COBIT. Assume that you have been hired as a consultant by a medium-sized insurance organization and have been asked to draft an IT Security Policy Framework.

You may create and / or assume all necessary assumptions needed for the completion of this assignment.

Write a three to five (3-5) page paper in which you: 

  1. Select a security framework, describe the framework selected, and design an IT Security Policy Framework for the organization.
  2. Describe the importance of and method of establishing compliance of IT security controls with U.S. laws and regulations, and how organizations can align their policies and controls with the applicable regulations.
  3. Analyze the business challenges within each of the seven (7) domains in developing an effective IT Security Policy Framework.
  4. Describe your IT Security Policy Framework implementation issues and challenges and provide recommendations for overcoming these implementation issues and challenges.
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. 

Your assignment must follow these formatting requirements: 

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format.
  • Include a cover page containing the title of the assignment. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are: 

  • Identify the role of an information systems security (ISS) policy framework in overcoming business challenges.
  • Design a security policy framework.
  • Use technology and information resources to research issues in security strategy and policy formation.
  • Write clearly and concisely about Information Systems Security Policy topics using proper writing mechanics and technical style conventions.

Reference no: EM131249668

Questions Cloud

What do you think are two most impotant skills of managers : The manner in which management is most efficiently conducted and what constitutes good management are subjects of research and debate. Likert's systems of management, Blake and Mouton's Managerial Grid, Vroom and Yetton's leader-participation mode..
How can cubism be seen in picassos painting : How can Cubism be seen in Picasso's painting and how does Matisse reveal his own brand of cubism in his painting?
What load is shared by each material : a copper rod of 40mm dai surroundedhighly by a cast iron tube of 80mm external dia the ends being firmly fasten together .when put of a compressionload of 30kn what load is shared by each material and also determine bar shortend.
Galactic element clues to our earth elements : Use information you have learned to help you match the Galactic Element Clues to our Earth elements found in the Periodic Table below.
Information technology security policy framework : Establishing an effective Information Technology Security Policy Framework is critical in the development of a comprehensive security program. Additionally, there are many security frameworks that organizations commonly reference when developing t..
How did the leaders demonstrate flexibility and adaptability : How did the leaders demonstrate flexibility and adaptability? Please provide examples. How did the leaders apply aspects of the path-goal theory to this situation? Provide examples. Did the leaders communicate effectively with all of the stakeholders..
Determine the smallest positive integer : Using this program, determine the smallest positive integer n such that assigning a the value 10n causes the expressions (a + b) + c and a + (b + c) to have different values. Your answer should include your program's source code and the output tha..
Is there omission or censorship of some material : How were the articles framed? Do youdetect different political orientations in the newspapers? Do the articles communicate any of the four "biases" that Bennettdiscusses?Is there omission or censorship of some material? Do you notice any otherimp..
Find a code for the source : Using base-3 logarithms, compute the entropy of this source. - Assuming that there are three characters 0,1,2 in the code alphabet, find a code for the source that has average length equal to its base-3 entropy.

Reviews

Write a Review

Business Management Questions & Answers

  Why would an organization deliberately design separation

Why would an organization deliberately design separation or termination into their HR strategy? What assistance does it provide to the organization?

  Important steps that a healthcare administrator

What do you consider to be the most important steps that a healthcare administrator should take to ensure the financial stability of his or her medical facility today?

  Barriers to effective communicationbackground the accident

barriers to effective communicationbackground the accident insurance group was a company specializing in the pursuit of

  Leadership style in current work environment

Discuss how you would practice this leadership style in your current work environment. If you are not currently employed, discuss how you would practice this style of leadership in a future job you might like to hold.

  Discuss the ways in which the company can achieve

Discuss the advantages and disadvantages of these strategies, and discuss the ways in which the company can achieve these strategies.

  Leadership change - what does the new leader do

What political strategies can you identify that leaders should use when taking over from a former leader who has left the organization

  Description of the business and objective for going global

Description of the business, its product offerings, and the objective for going global

  Explain why do you assume which best buy rather than one

Explain why do you Assume which Best Buy, rather than one of Best Buy's big suppliers such as Sony or Panasonic, is considering eliminating rebates?

  Contract between blockbuster video

Again, consider the revenue-sharing contract between Blockbuster Video and the movie studios. This contract has been extremely profitable for both sides. Since economists have explored revenue-sharing contracts for many years

  Cash conversion cycle

A firms operatingcycle is the time from the beginning of the production process to thecollection of cash from the sale of the finished product. It is measured inelapsed time by adding to the two time periods.

  Formulate as a linear programming problem

Furthermore, no more than 40 percent of the concrete can be sand and at least 30 percent of the concrete must be gravel. Each day 2,000 tons of concrete are produced. Formulate as a linear programming problem.

  Clarification of managerial decision making

What has been your personal experience with these various personalities, as you have found them displayed in managers, friends, and family and have these differences affected you decision making style?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd