Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Assignment: STATEMENTS OF POLICY

You will submit your plan pertaining to statements of policy. You will recommend protocols and mitigating factors to the organization. Justify how the disaster response protocols will mitigate the threats to and vulnerabilities of the organization. You will focus on disaster and incident response protocols as well as access control. Assess your proposed method for maintaining the success of the plan going forward. Justify how your method will ensure the ongoing effectiveness of the information assurance plan.

One of the most important aspects of information assurance is ensuring that proper policies and procedures are established within an organization. Without proper policies and procedures, there would be no order. By implementing appropriate statements of policy and developing effective procedures, IT administrators ensure that incidents can be appropriately responded to, and that individuals within the organization understand their roles within the information assurance plan. Individuals in an organization would not be able to adequately understand their roles without the establishment of these statements of policy.

Prompt: In Module Seven, you will submit your plan pertaining to statements of policy. You will recommend protocols and mitigating factors to the organization and justify how the disaster response protocols will mitigate the threats to and vulnerabilities of the organization. You will focus on disaster and incident response protocols as well as access control. Assess your proposed method for maintaining the success of the plan going forward and explain how your method will ensure the ongoing effectiveness of the information assurance plan.

Specifically, the following critical elements must be addressed:

I. Statements of Policy

a) Develop appropriate incident response protocols to respond to the various threats and vulnerabilities identified within the organization.

b) Justify how the incident response protocols will mitigate the threats to and vulnerabilities of the organization. Support your justification with information assurance research and best practices.

c) Develop appropriate disaster response protocols to respond to the various threats and vulnerabilities identified within the organization.

d) Justify how the disaster response protocols will mitigate the threats to and vulnerabilities of the organization. Support your justification with information assurance research and best practices.

e) Develop appropriate access control protocols that provide an appropriate amount of protection while allowing users to continue to operate without denial of service.

f) Justify your access control protocols. Support your justification with information assurance research and best practices.

g) Recommend a method for maintaining the information assurance plan once it has been established.

h) Justify how your maintenance plan will ensure the ongoing effectiveness of the information assurance plan. Support your justification with information assurance research and best practices.

use double spacing, 12-point Times New Roman font, and one-inch margins. Sources should be cited according to APA citation method. Page-length requirements:4-5pages excluding cover page and reference page. Make sure you cite if you take a piece of someone's work, very important and also your reference should relate to your writing (don't cite a reference because it relates to the course and not this very paper) at least 4 references.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92310822
  • Price:- $40

Priced at Now at $40, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Two contract offers are made to you the first contract

Two contract offers are made to you. The first contract offers $10,000 at the end of each year for the next five years and then $20,000 per year for the following 10 years. The second offer pays 10 payments, starting wit ...

Access your browsers security settings and configure the

Access your browser's security settings and configure the browser to refuse all cookies or to prompt you before allowing a cookie. Restart the browser; then visit several different Web sites. Be sure to visit popular sit ...

A chemistry student needsnbsp700 g of ethanolamine for an

A chemistry student needs 70.0 g of ethanolamine for an experiment. By consulting the  CRC Handbook of Chemistry and Physics , the student discovers that the density of ethanolamine is 1.02 g.cm^-3. Calculate the volume ...

Question state the dilemma the score as he puts it harnish

Question : State the dilemma ("the score", as he puts it) Harnish finds between the Humean view and the Frege-Russell view of representation. Do you think a computational theory of mind is a viable alternative to these v ...

Question suppose a new standard the iddd-643 standard is

Question Suppose a new standard, the IDDD-643 standard, is developed for storing numbers in a string of 16 bits. The first bit is used for the sign of the number (0 if positive and 1 if negative). The next 5 bits store t ...

Question you can transfer your health data to another

Question: You can transfer your health data to another personal health record provider such as Microsoft HealthVault. What privacy issues are involved? Express your views on using this type of system, make sure to includ ...

Question recall that many programming languages use short

Question : Recall that many programming languages use short circuit evaluation when determining the result of a complex boolean expression involving add/or operations. What are the benefit of using short circuit evaluati ...

Question suppose that incoming packets are encrypted with a

Question : Suppose that incoming packets are encrypted with a symmetric key that only the sender and receiver know. Which type(s) of firewall will work with such packets and which will not? Why? Note: Some specific answe ...

Assignmentnbspon information systems audit and

Assignment  on Information Systems audit and controls  Assignment purpose: Elaborate on the different types of control that are applied in a hospital (Preventive, detective and corrective control). Evaluate the logical a ...

If the annualized five-year rate of return is 15 and if the

If the annualized five-year rate of return is 15%, and if the first year's rate of return is 20%, and if the returns in all other years are equal, what are they? Provide the answer in % with four decimal places without r ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As