Question
Competency In this project, you will demonstrate your mastery of the following competency: Integrate industry best practices in an organizational information security plan Scenario You
Competency In this project, you will demonstrate your mastery of the following competency: Integrate industry best practices in an organizational information security plan Scenario You are a part of the IT team for a medium-sized company (500 to 1,000 employees) in the e-commerce industry, the same company you provided recommendations for in Project One. As described in the last project, a third-party consultant has assessed the information security posture for the company. The consultant identified a need to establish and implement a security plan for a critical system, the companys online store. This information security plan will ensure that information systems are more secure and are at lower risk of being impacted by cyberattacks and other risks. The consultant has provided you with a template that you and your company will use to generate an information security plan. As the information security manager, you will fill in the template to create the companys new security plan. The company will have to follow through on the plan within the next year.
Directions To complete this project, first review the Project Two Overview of Current System document in the Supporting Materials section. You will also want to take a look at the company overview that you reviewed for Project One, also linked in Supporting Materials. Use these documents to inform your decision making, and to develop a security plan that aligns with the company and its critical system. Then fill in the content for each section of the Project Two Security Plan Template provided in the Supporting Materials section.
Your Security Plan will include:
Roles and Responsibilities: Identify who will be responsible for ensuring information security within the system and describe the responsibilities of each role. User Awareness Training: Explain what kind of additional training employees of the company will need to protect information. This is in addition to the standard training that a new employee receives. Access Control: Describe how accounts are generated and reviewed in order to ensure information security. Vulnerability Management: Describe how system vulnerabilities will be managed for the company and how they will be addressed. Backup and Recovery: Explain how the systems information will be securely backed up and easily recovered if system information is compromised by a data breach or hack. Internet-Facing Security: Describe how the portion of the system that is outside of the company, the internet-facing side, will be protected and secured.
Step by Step Solution
There are 3 Steps involved in it
Step: 1
Get Instant Access to Expert-Tailored Solutions
See step-by-step solutions with expert insights and AI powered tools for academic success
Step: 2
Step: 3
Ace Your Homework with AI
Get the answers you need in no time with our AI-driven, step-by-step assistance
Get Started