Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Application: Incorporating Security Into IT Processes

Security in an organization does not reside in a silo; it is affected by other processes and vice versa. Therefore, security should be integrated into the overall IT process to make it effective.

You have already investigated the functionality and capabilities of identity and access management tools. The process for creating and removing supplier IDs should be incorporated into an identity and access management tool. 

To prepare for this Assignment, refer to the case study "Developing a Monthly Vulnerability Scanning Process" from the media Selection and Evaluation of IT Solutions. This case study will provide you with an example of how to incorporate a security feature into the overall IT process.

For this Assignment, provide a 3- to 5-page report describing a process that incorporates security for managing supplier credentials into an identity and access management tool. Be sure to do the following in your report:

  • Develop a numbered outline with the steps in a workflow.
  • Identify the teams involved in this process, and explain the steps each team performs.
  • Explain shortcomings in the process that you may  need to overcome.

Readings

  • Brotby, K. (2009). Information security governance: A practical development and implementation approach.  Hoboken, NJ: Wiley.
    • Chapter 8, "Risk Management Objectives"
      • Section 8.3.1, "Recovery Time Objectives"
      In this section, you are introduced to the recovery time objectives. You will explore the organizational considerations for determining such objectives.
  • Hawkins, S. M., Yen, D. C., & Chou, D.C. (2000). Disaster recovery planning: A strategy for data security.Information Management & Computer Security,8(5), 222-230. Information Management and Computer Security Volume 8 by Hawkins, Yen, & Chow.  Copyright 2000 by EMERALD GROUP PUBLISHING LIMITED. Reprinted by permission of EMERALD GROUP PUBLISHING LIMITED via the Copyright Clearance Center. In this paper, you will investigate the importance of disaster recovery planning in the business world. You will also explore a strategic planning process that an organization could follow to develop its own disaster recovery plan.
  • Document: Sample Presentation Template (PowerPoint file)Note: You will use this document to complete this unit's Project.

Optional Resources

  • Bahan, C. (2003). The disaster recovery plan. Retrieved fromhttp://www.sans.org/reading_room/whitepapers/recovery/disaster-recovery-plan_1164 In this article, you will be introduced to the important aspects of a disaster recovery plan.
  • Devlen, A. (2003, March 10). 12 key elements of an enterprise-wide disaster recovery program.ITManagementNews. Retrieved from http://archive.itmanagementnews.com/articles/0310ad.html In this article, you will explore the essential elements that an organization's disaster recovery program should include in order to be effective.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M91823946
  • Price:- $30

Priced at Now at $30, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Question write a 1-2 page paper in apa format describe how

Question: Write a 1-2 page paper in APA format. Describe how Windows Active Directory enhances security in your organization. What, if anything, could be improved? This project is due On Saturday morning 9/22. The respon ...

Identify economic decision that is driven by a behavioral

Identify economic decision that is driven by a behavioral bias rather than by pure rational behavior. why are they differ today?

Dog up franks is looking at a new sausage system with an

Dog Up! Franks is looking at a new sausage system with an initial cost of $440,000 that will last for five years. The fixed asset will qualify for 100 percent bonus depreciation in the first year, at the end of which the ...

A small sports club keeps information about its members and

A small sports club keeps information about its members and the fees they pay. The secretary wants to be able to record when members pay and print a report similar to that in the figure below. last name - first_narne - p ...

What are the key nonprice factors that influence demand and

What are the key nonprice factors that influence demand and supply?

A sequence of natural numbers a1 a2 an is said to be a

A sequence of natural numbers (a 1 , a 2 , ..., a n ) is said to be a degree sequence if there exists an undirected graph on n vertices {v 1 , v 2 , ..., v n } such that the degree of v i  is a i  for each i = 1, 2, ..., ...

In a random sample of 100 male students 80 reported that

In a random sample of 100 male students, 80 reported that they were in favour of writing announced tests, while in a sample of 50 female students 23 favoured writing announced tests. Let the male students be population 1 ...

Suppose that in the fiat-shamir protocol in figure 932 we

Suppose that in the Fiat-Shamir protocol in Figure 9.32 we have N = 55 and Alice's secret is S = 9. What is v? Suppose Alice chooses r = 10. What does Alice send in the first message? What does Alice send in the third me ...

Suppose two nodes a and b are attached to opposite ends of

Suppose two nodes, A and B, are attached to opposite ends of an 800 m cable, and that they each have one frame of 1, 500 bits (including all headers and preambles) to send to each other. Both nodes attempt to transmit at ...

Explain that this threat represents a well-known and broad

Explain that this threat represents a well-known and broad category of electronic and human activities that breach the confidentiality of information.

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As