Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Business Management Expert

Application: Creating a Security Policy

You have just purchased a used car at a fantastic price. You are so excited that you decide to take an extended drive. Unfortunately, you experience a flat tire and discover that you do not have a spare. Now, your vehicle is disabled because you are missing a critical component. You are in a potentially bad situation.

One aspect of security policies that is often neglected is what assets staff members are permitted to use and how they may use those assets. Failure to address staff members in security policies might weaken an organization's legal position. An incomplete security policy, like a missing spare tire, may not be realized until an incident has occurred. Consequently, the organization could find itself in a potentially bad situation.

***

The U.S. Army has hired your firm, Token Tiger Consulting (TTC), to provide IT services to one of their new civilian contractors. Although the exact nature of this contractor is not known to TTC, the Army has indicated that this contractor will be gathering and storing "sensitive" data, and communicating with the Army via the Internet and communications security (COMSEC) equipment. Furthermore, some contractor staff travel often and are required to use their own personal devices for work. 

The Colonel that hired TTC has asked you to begin drafting a security policy for the contractor. You decide to begin with the separation of duties (SoD), staff legal obligations (e.g., bring your own device [BYOD], social media, and acceptable use), and the COMSEC equipment.

For this Assignment, write a 4- to 5-page security policy that:

  • Specifies SoD requirements for contractor staff who handle sensitive data
  • Addresses the legal obligations that pertain to contractor staff
  • Specifies  procedures for COMSEC equipment 

Required ResourcesReadings

  • Coleman, K. (2008). Separation of duties and IT security. Retrieved fromhttp://www.csoonline.com/article/446017/separation-of-duties-and-it-security
    This article details separation of duties (SoD) as a key concept of internal controls, and describes strategies for successful achievement.
  • Gregg, J., Nam, M., Northcutt, S., & Pokladnik, M. (2012). Separation of duties in information technology. Retrieved from http://www.sans.edu/research/security-laboratory/article/it-separation-duties
    This article discusses the necessity for classic security methods to manage conflict of interest, the appearance of conflict of interest, and fraud.
  • Goodwin, J. (2011). Mobile devices spawn new B.Y.O.D. security policies. Retrieved fromhttp://www.gsnmagazine.com/node/25348
    This article discusses the growing interest in B.Y.O.D. (Bring Your Own Device) and a variety of technical issues related to the security of the devices within the IT network system.
  • Kim, K. (n.d.). Organizational level (O-Level) production divisions fundamentals. Retrieved fromhttp://www.google.com/url?q=http://www.amdo.org/114_production.doc&sa=U&ei=bD_8T_rUCoKi9QTY9MzTBg&ved=0CC0QFjAJOFA&usg=AFQjCNElFh2fbLq6wt-jEt7ST-sN_rRE1g
    • Section .6, "Discuss the Security/Accountability Procedures for COMSEC Equipment [Ref. E]" (pp. 6-7)
      This section describes procedures for COMSEC equipment.
  • Simek, J. W., & Nelson, S. D. (2012). Essential law firm technologies and plans. Law Practice, 38(2). Retrieved fromhttp://www.americanbar.org/publications/law_practice_magazine/2012/march_april/hot-buttons.html

Business Management, Management Studies

  • Category:- Business Management
  • Reference No.:- M91969570
  • Price:- $30

Priced at Now at $30, Verified Solution

Have any Question?


Related Questions in Business Management

1 explain situational transformational and servant

1. Explain Situational, Transformational, and Servant Leadership. Do NOT simply provide a brief textbook definition. Be thorough and explain the overall philosophy behind each approach. Although you may refer to the text ...

Suppose we wish to design a real-time prediction system

Suppose we wish to design a real-time prediction system that needs to classify a test example very fast. Which of the following would you choose and why? a) Naive Bayes or b) Nearest Neighbor

According to the bureau of labor statistics 71 of the labor

According to the Bureau of Labor Statistics, 7.1% of the labor force was recently unemployed. A random sample of 100 employable adults was selected. Using the normal approximation to the binomial distribution, what is th ...

Reply to the following statementmotivation to complete

Reply to the following statement; " Motivation to complete tasks in the workplace can be varied and fluid on most occasions. Employers can assist in providing good extrinsic motivating factors ensuring stability and perc ...

What is your concept of e-commerce and how has the internet

What is your concept of E-Commerce and how has the internet changed everything?

Use the following article to answer the questions how would

Use the following article to answer the questions. How would you go about encouraging diversity hiring and promotion at GlobeBank? Take the position as the Director of Diversity Recruiting and outline your plan. This pla ...

Can you tell me the differences in leading and controlling

Can you tell me the differences in leading and controlling in the four functions of business?

In 2015 juanita secured a 5-year contract with a supplier

In 2015, Juanita secured a 5-year contract with a supplier, which sets the material price per unit at a constant for 5 years. She suggested Msungu do the same for the Basic 10F but he replied, "I love the social aspect o ...

In a society that is high on power distance and femininity

In a society that is high on power distance and femininity, what kind of leadership style would you expect to find?

Miriam is a senior manager for an international chain of

Miriam is a senior manager for an international chain of fitness centers. Two suppliers provide exercise machines for her company. Which of the following is the wisest advice on how Miriam should manage her suppliers? 1. ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As