Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Assignment : IT Security Policy Framework

Establishing an effective Information Technology Security Policy Framework is critical in the development of a comprehensive security program. Additionally, there are many security frameworks that organizations commonly reference when developing their security programs.

Review the security frameworks provided by NIST (SP 800-53), ISO / IEC 27000 series, and COBIT. Assume that you have been hired as a consultant by a medium-sized insurance organization and have been asked to draft an IT Security Policy Framework.

You may create and / or assume all necessary assumptions needed for the completion of this assignment.

Write a three to five (3-5) page paper in which you:

1. Select a security framework, describe the framework selected, and design an IT Security Policy Framework for the organization.

2. Describe the importance of and method of establishing compliance of IT security controls with U.S. laws and regulations, and how organizations can align their policies and controls with the applicable regulations.

3. Analyze the business challenges within each of the seven (7) domains in developing an effective IT Security Policy Framework.

4. Describe your IT Security Policy Framework implementation issues and challenges and provide recommendations for overcoming these implementation issues and challenges.

5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

• Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

• Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

• Identify the role of an information systems security (ISS) policy framework in overcoming business challenges.

• Design a security policy framework.

• Use technology and information resources to research issues in security strategy and policy formation.

• Write clearly and concisely about Information Systems Security Policy topics using proper writing mechanics and technical style conventions.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92795255
  • Price:- $50

Priced at Now at $50, Verified Solution

Have any Question?


Related Questions in Management Information System

Assignmentyour team will pick a business sector and then

Assignment Your team will pick a business sector and then visualize a type of business. You are not researching a real business, you are creating a fictional business. A. Choose one of these business sectors: 1. Healthca ...

Question suppose dr smart has designed a 4des cipher which

Question : Suppose Dr. Smart has designed a 4DES cipher which encrypts data m in the following way: c= Dk4(Dk3(Ek2(Ek1(m)))), where E and D denote the encryption and decryption operation of DES. To break this cipher and ...

Confidentiality integrity and availability or the cia triad

Confidentiality, integrity, and availability or the CIA triad of security is introduced in this session. These three dimensions of security may often conflict. Confidentiality and integrity often limit availability. So, ...

Assignment project deliverable project plan inceptionthis

Assignment Project Deliverable : Project Plan Inception This assignment consists of two (2) sections: a project introduction and a project plan. You must submit both sections as separate files for the completion of this ...

Communication and team decision makingpart 1 sharpening the

Communication and Team Decision Making Part 1: Sharpening the Team Mind: Communication and Collective Intelligence A. What are some of the possible biases and points of error that may arise in team communication systems? ...

Read nist cybersecurity framework aims to improve critical

Read "NIST Cybersecurity Framework Aims to Improve Critical Infrastructure," by Mustard, from Power (2014). Read "Mapping to the NIST Cybersecurity Framework," by Durbin, from CIO Insight (2014). Briefly define enterpris ...

Given a folder with images in it create an html page named

Given a folder with images in it, create an HTML page named index.html that contains links to each JPEG file in the directory as follows: Write a function that creates a string of the path to a directory Generatea thumbn ...

Question suppose you are to implement the gui displayed on

Question : Suppose you are to implement the GUI displayed on the right, where the relative position of all Swing elements must remain as shown when the window is resized. The user can enter text in the message area and s ...

Describe two examples of a very poorly implemented database

Describe two examples of a very poorly implemented database that you've encountered (or read about) that illustrates the potential for really messing things up. Include, in your description, an analysis of what might hav ...

Please answer each question and cite any sources used1

Please answer Each question, and cite any sources used. 1. Review: Guide for Developing Security Plans for Federal Information Systems By Marianne Swanson and Joan Hash and Pauline Bowen. How does the the approach of inf ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As