Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

One of the most important aspects of information assurance is ensuring that proper policies and procedures are established within an organization. Without proper policies and

One of the most important aspects of information assurance is ensuring that proper policies and procedures are established within an organization. Without proper policies and procedures, there would be no order. By implementing appropriate statements of policy and developing effective procedures, IT administrators ensure that incidents can be appropriately responded to, and that individuals within the organization understand their roles within the information assurance plan. Individuals in an organization would not be able to adequately understand their roles without the establishment of these statements of policy.


Required;

Select an organization. Submit a plan pertaining to statements of policy. You will recommend protocols and mitigating factors to the organization and justify how the disaster response protocols will mitigate the threats to and vulnerabilities of the organization. You will focus on disaster and incident response protocols as well as access control. Assess your proposed method for maintaining the success of the plan going forward and explain how your method will ensure the ongoing effectiveness of the information assurance plan.

Specifically, the following critical elements must be addressed:

a) Develop appropriate incident response protocols to respond to the various threats and vulnerabilities identified within the organization.

b) Justify how the incident response protocols will mitigate the threats to and vulnerabilities of the organization. Support your justification with information assurance research and best practices.

c) Develop appropriate disaster response protocols to respond to the various threats and vulnerabilities identified within the organization.

d) Justify how the disaster response protocols will mitigate the threats to and vulnerabilities of the organization. Support your justification with information assurance research and best practices.

e) Develop appropriate access control protocols that provide an appropriate amount of protection while allowing users to continue to operate without denial of service.

f) Justify your access control protocols. Support your justification with information assurance research and best practices.

g) Recommend a method for maintaining the information assurance plan once it has been established.

h) Justify how your maintenance plan will ensure the ongoing effectiveness of the information assurance plan. Support your justification with

information assurance research and best practices.

Step by Step Solution

3.32 Rating (167 Votes )

There are 3 Steps involved in it

Step: 1

Introduction This report presents an information assurance plan for Company XYZ that operates an information technology system and faces the following issues Software attack Theft of the intellectual ... blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Document Format ( 2 attachments)

PDF file Icon
609908d96328b_29350.pdf

180 KBs PDF File

Word file Icon
609908d96328b_29350.docx

120 KBs Word File

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

International Business

Authors: Alan M. Rugman, Simon Collinson

6th edition

273760971, 978-0273760979

More Books

Students also viewed these Organizational Behavior questions

Question

=+d) What assumptions have you made to answer part c?

Answered: 1 week ago