What principles should the information security analyst

Assignment Help Computer Engineering
Reference no: EM131721086

Prompt. Use the information on each of these topics to develop a customized training manual for newly hired cybersecurity professionals at CyberLeet.

Specifically, the following critical elementsmust be addressed:

When doing the assignment is take in consideration the 3 core of information security: confidentiality, integrity and availability

I. How to Develop Cybersecurity Policies: In this part of the training manual, you will develop the cybersecurity policies in four distinct areas for new hires at CyberLeet. Based on information you have learned on cybersecurity use and governance, you will develop policies for end-user passwords, acceptable use, basic users, and user training. For each of these areas, follow the guiding questions to develop effective use policies that new hires will be trained on.

A. What principles should the information security analyst apply in order to develop appropriate password policies for their clients? Make sure you address confidentiality, integrity, and availability of information.

• Password length and composition of the password (e.g., uppercase, numbers, special characters)
• Time period between resets and ability to reuse a prior password
• Differentiated policies for different types of users (e.g., administrator vs. regular user)

B. What principles should the information security analyst apply in order to develop appropriate acceptable use policiesfor the client?
• What should users generally be allowed to do with their computing and network resources? When and why would each example be allowable?
• What should users generally be prohibited from doing with their computing and network resources? When and why would each example require prohibition?
• When and why should users be aware of acceptable use policies and how can organizations keep track of these policies?

C. What principles should the information security analyst apply in order to develop appropriate user training policiesfor the client?
• How to determine who would be trained
• How to determine how often trainings would occur
• How to determine whether certain staff receive additional training or whether they should be held to higher standards

D. What principles should the information security analyst apply in order to develop appropriate basic user policiesfor the client?
• When and why should users have to display some type of identification while in the workplace?
• What types of physical access (with or without ID) to company areas is acceptable? Why?
• When and why should employees with identification be allowed access to all areas of the company?
• When and why should employees be allowed to take work home or bring guests into the workplace?

Reference no: EM131721086

Questions Cloud

Discuss problem about an iphone app : Cindy Combs, a professional investor, was having lunch with a colleague recently and said, "Do you remember Peter Kennedy the entrepreneur we met the other day.
Identify any control problems in the system : Development and adoption of the accounting software packages - Describes and prepare a system flowchart of the sales procedures for the chosen organisation
Vertical integration and outsourcing for businesses : What are the advantages and disadvantages of vertical integration and outsourcing for businesses?
Ethics and law-basic concepts : The document "Ethics and Law: Basic Concepts, Cases & Dilemmas" outlines 5 different approaches to ethical decision making:
What principles should the information security analyst : What principles should the information security analyst apply in order to develop appropriate basic user policiesfor the client
Define reason to take money from an investor : Jose Peacher is an executive with large manufacturing company. A former coworker of his recently started a company and raised $1 million from a well-known.
1977 clean water act and the 1987 water quality act : What are the key differences between the 1977 Clean Water Act and the 1987 Water Quality Act?
Assessment and a third-party assessment : Review the differences between an operational assessment and a third-party assessment.
Create web application to be used to train sales employees : You have been hired to work with 8 employees from different branches of national business to help create web application to be used to train sales employees.

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd