Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Competency In this project, you will demonstrate your mastery of the following competency: Integrate industry best practices in an organizational information security plan Scenario You

Competency In this project, you will demonstrate your mastery of the following competency: Integrate industry best practices in an organizational information security plan Scenario You are a part of the IT team for a medium-sized company (500 to 1,000 employees) in the e-commerce industry, the same company you provided recommendations for in Project One. As described in the last project, a third-party consultant has assessed the information security posture for the company. The consultant identified a need to establish and implement a security plan for a critical system, the companys online store. This information security plan will ensure that information systems are more secure and are at lower risk of being impacted by cyberattacks and other risks. The consultant has provided you with a template that you and your company will use to generate an information security plan. As the information security manager, you will fill in the template to create the companys new security plan. The company will have to follow through on the plan within the next year.

Directions To complete this project, first review the Project Two Overview of Current System document in the Supporting Materials section. You will also want to take a look at the company overview that you reviewed for Project One, also linked in Supporting Materials. Use these documents to inform your decision making, and to develop a security plan that aligns with the company and its critical system. Then fill in the content for each section of the Project Two Security Plan Template provided in the Supporting Materials section.

Your Security Plan will include:

Roles and Responsibilities: Identify who will be responsible for ensuring information security within the system and describe the responsibilities of each role. User Awareness Training: Explain what kind of additional training employees of the company will need to protect information. This is in addition to the standard training that a new employee receives. Access Control: Describe how accounts are generated and reviewed in order to ensure information security. Vulnerability Management: Describe how system vulnerabilities will be managed for the company and how they will be addressed. Backup and Recovery: Explain how the systems information will be securely backed up and easily recovered if system information is compromised by a data breach or hack. Internet-Facing Security: Describe how the portion of the system that is outside of the company, the internet-facing side, will be protected and secured.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Experiencing MIS

Authors: David Kroenke

3rd Edition

0132667169, 9780132667166

More Books

Students also viewed these General Management questions