Answered step by step
Verified Expert Solution
Link Copied!
Question
1 Approved Answer

You will submit your plan pertaining to statements of policy. you will recommend protocols and mitigating factors to the organization. justify how the disaster response

You will submit your plan pertaining to statements of policy. you will recommend protocols and mitigating factors to the organization. justify how the disaster response protocols will mitigate the threats to and vulnerabilities of the organization. you will focus on disaster and incident response protocols as well as access control. assess your proposed method for maintaining the success of the plan going forward. justify how your method will ensure the ongoing effectiveness of the information assurance plan. for additional details, please refer to the final project document and the milestone four guidelines and rubric document in the task guidelines and rubrics section of the course.

atements of Policy a) Develop appropriate incident response protocols to respond to the various threats and vulnerabilities identified within the organization. b) Justify how the incident response protocols will mitigate the threats to and vulnerabilities of the organization. Support your justification with information assurance research and best practices. c) Develop appropriate disaster response protocols to respond to the various threats and vulnerabilities identified within the organization. d) Justify how the disaster response protocols will mitigate the threats to and vulnerabilities of the organization. Support your justification with information assurance research and best practices. e) Develop appropriate access control protocols that provide an appropriate amount of protection while allowing users to continue to operate without denial of service. f) Justify your access control protocols. Support your justification with information assurance research and best practices. g) Recommend a method for maintaining the information assurance plan once it has been established. h) Justify how your maintenance plan will ensure the ongoing effectiveness of the information assurance plan. Support your justification with information assurance research and best practices.

Step by Step Solution

3.37 Rating (153 Votes )

There are 3 Steps involved in it

Step: 1

Background information Information security form the backbone of major industries in fact the IT workers have the most prestigious and easy roles in most organizations With the advancement in technolo... blur-text-image
Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Principles of Information Security

Authors: Michael E. Whitman, Herbert J. Mattord

4th Edition

978-1111138219, 1111138214, 978-1285448367

More Books

Students explore these related Organizational Behavior questions

Question

10. What is meant by a feed rate?

Answered: 3 weeks ago