Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

For this deliverable, you are a newly appointed security officer (SO). The chief information security officer (CISO) has asked you to review the company security

For this deliverable, you are a newly appointed security officer (SO). The chief information security officer (CISO) has asked you to review the company security policy and provide your recommendations for improvement. Note: You may create or make all necessary assumptions needed for the completion of this assignment. Research a security policy of an organization; you can use your employer, an organization you are associated with, or a company on the internet, as long as you have access to their security policy. A suggested resource is provided below. Make an initial assessment of the current security policy of the organization, including its strengths and weaknesses. Review the security policy's objective that should be clearly defined to maintain the confidentiality and integrity of information. Determine whether the security policy covers software and hardware devices, physical parameters, human resource, information, or data and access control within its scope. Check that the security policy includes what must be done rather than how it should be done. Assess the password management, change management, and incident management aspects of the policy. Additionally, assess the effectiveness of the policy and provide recommendations for it. Submission Requirements in Word in which you: Describe the business needs of the organization that you have researched.

  • Review the security policy of the organization and its objective.
  • Compare the security policy with the business needs.
  • Assess the aspects of the security policy noting essential inclusions and omissions.
  • Assess the effectiveness of the policy and provide at least 2-3 recommendations for improvement.
  • Use at least two quality (e.g., peer-reviewed journal articles, credible web resources, valid security policy documents) resources in this assignment. Note: Wikipedia and similar websites do not qualify as quality resources.

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image

Step: 3

blur-text-image

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Algorithm Design And Applications

Authors: Michael T. Goodrich, Roberto Tamassia

1st Edition

1118335910, 978-1118335918

More Books

Students also viewed these Algorithms questions

Question

Analyze financial reporting for intercorporate investments.

Answered: 1 week ago

Question

Analyze financial statement disclosures for investment securities.

Answered: 1 week ago