Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Project Deliverable : Security Needs and Objectives

For Project Deliverable 2, you are a newly appointed Security Officer (SO). The Chief Information Security Officer (CISO) has given you sixty days (60) days to deliver a security policy plan to address the organizational growth that the company is anticipating. Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.

Use the Internet to research the process that leads to the identification of security needs in an organization.

Also, research an organization with a security policy in place, and review how this organization laid down the foundation for its security policy.

Review the business requirements for the security project plan.

You will be asked to describe the detailed project including the scope of the project; possible security risks, constraints, and assumptions; integration with other systems and infrastructure; and relevant terms that were used throughout the security project.

Submission Requirements

Document (MS Word)

Write a three to four (3-4) page paper in which you:

Explain the process that leads to the identification of security needs and how those needs lay down a foundation for a policy.

Describe the details regarding the type of business in which the company you researched is engaged.

Provide a description about the current system requirements activities within the organization you researched.

Describe the types of data that the company you researched collects to support the business. The description should include the following:

Operational systems

Analytics and interfaces

Infrastructure and security

Use at least two (2) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Discuss cybersecurity strategies and the various frameworks.

Analyze the information planning concepts of change control in cybersecurity.

Analyze the process of security need identification and determine its impact on a specific field of business.

Use technology and information resources to research issues in information assurance.

Write clearly and concisely about information assurance topics using proper writing mechanics and technical style conventions.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M93044260

Have any Question?


Related Questions in Management Information System

Case 3 focuses on capturing system requirements an

Case 3 focuses on capturing system requirements, an important component of any model of the software development process. It is important to remember that the purpose of requirements is to specify the problem that the sy ...

Addressing and numbering please respond to the following

"Addressing and Numbering." Please respond to the following: • Discuss how you would develop an addressing and naming model in an environment that has 10 departments in a 1000 employee organization, are equally separated ...

The result of the spec cpu2006 bzip2 benchmark running on

The result of the SPEC CPU2006 bzip2 benchmark running on an AMD Barcelona has an instruction count of 2.389E12, and execution time of 750s and a reference time of 9650s. a) Find the CPI if the clock cycle time is 0.333n ...

Subject business continuity plan amp disaster recovery

Subject: Business continuity plan & disaster recovery plan What a journey! The last eight weeks was not only fast-paced but educational. We learned a tremendous amount of information about various business continuity and ...

Topic we all had the unfortunate experience of seeing how

Topic: We all had the unfortunate experience of seeing how computers can, at times, make life's journey abit more difficult. This is especially true in knowledge centric workplaces. Describe an example of a very poorly i ...

Assignment 1resource read ch 3 to 4 of the spirit catches

Assignment 1 Resource: read Ch. 3 to 4 of The Spirit Catches You and You Fall Down. After reading the article write a 175- to 265-word response to the following: do publicly funded health care programs overrule cultural ...

Essay question 1 you are a member of the human resources

Essay Question 1: You are a member of the Human Resources Department of a medium-sized organization that is implementing a new inter-organizational system that will impact employees, customers, and suppliers. Your manage ...

Middot explain what is meant by effective html code decide

· Explain what is meant by effective HTML code. Decide if all HTML code should be the same (standardized) or at the discretion of the designer. Explain your decision. · From the e-Activity, describe what you learned abou ...

Write in 600 words in an essay style answer to respond to

Write in 600 words in an essay style answer to respond to the following question no palgarism While there are several EHR implementation instances in the (Kingdom of Saudi Arabia )capable of collecting data from individu ...

Discussionconduct research using the library and the

Discussion Conduct research using the library and the Internet to find information about ethernet and nonethernet networking. Then, answer the following: Discuss the major differences between these types of networking te ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As