Answered step by step
Verified Expert Solution
Link Copied!

Question

1 Approved Answer

Throughout this course, you will be working on several aspects of information security assurance that will result in a complete Information Security Assurance Implementation Plan

Throughout this course, you will be working on several aspects of information security assurance that will result in a complete Information Security Assurance Implementation Plan for a project of your choosing. You will not be implementing a information security assurance plan, but you will work extensively with the concepts of information security assurance. Each week, you will complete a part of the Information Security Assurance Implementation Plan, with the final draft due at the end of the course. You will select a real organization or create a hypothetical organization and apply your research to develop the Information Security Assurance Implementation Plan that would be appropriate for the organization and fulfill a need that the organization has for its systems. Additional information and the deliverables for each Individual Project will be provided in the assignment description for the project. This is the course Key Assignment that you will make contributions to each week. Project Selection The first step will be to select an organization as the target for your Information Security Assurance Implementation Plan. This organization will be used as the basis for each of the assignments throughout the course and should conform to the following guidelines: Nontrivial: The selected organization should be large enough to allow reasonable exercise of the information security assurance planning process. Domain knowledge: You should be familiar enough with the organization to allow you to focus on the project tasks without requiring significant time for domain education. Accessibility: You should have good access to the people and other information that is related to the organization, because this will be an important part of the process. Note: The selected organization might already have an information security assurance plan in place, but it may still be used as the basis for the projects in this course. Note: The selected organization must have a need for some kind of information security assurance as part of its operations. Therefore, feel free to identify a hypothetical organization that meets the requirements. You may make any necessary assumptions to fulfill the requirements of organization selection. Select a real or fictitious organization that fits these requirements, and submit your proposal to your instructor before proceeding further with the assignments in the course. Approval should be sought within the first several days of the course. Your instructor will tell you how to submit this proposal and what notification will be given for project approval. Assignment For the assignments in this course, you will not be implementing the actual project, but rather, you will be developing a comprehensive Information Security Assurance Implementation Plan. Your first task in this process will be to select an organization or identify a hypothetical organization to use as the basis of your projects. You will also create the shell document for the final project deliverable that you will be working on during each unit. As you proceed through each project phase, you will add content to each section of the final document to gradually complete the final project delivery. Appropriate research should be conducted to support the development of your document, and assumptions may be made when necessary. The project deliverables for Week 1 are as follows: Submit your organization proposal to your instructor for approval. Information Security Assurance Implementation Plan document shell Use Word Title page Course number and name Project name Your name Date Table of Contents (TOC) Use an autogenerated TOC. This should be on a separate page. This should be a maximum of 3 levels deep. Be sure to update the fields of the TOC so that it is up-to-date before submitting your project. Section Headings Week 1: Information Security Plan Overview Week 2: Risk Assessment Week 3: Security Standards for Development and Deployment Week 4: Vulnerability Management Week 5: Assessment and Assurance Project Outline and Requirements Provide a brief description of the organization where the Information Security Assurance Implementation Plan will be implemented. Include the company's size, location(s), and other pertinent information. Material can be taken from the approved proposal submitted to your instructor. Be sure that this project is approved by the instructor. Information Security Overview Provide an overview of the information security plan overview that is suitable for a nontechnical audience. Include a brief description of the organizations information security issues in areas of network management, server management, Web and non-Web applications, data management, and cloud computing. Name the document "yourname_CS661_IP1.doc."

Step by Step Solution

There are 3 Steps involved in it

Step: 1

blur-text-image

Get Instant Access to Expert-Tailored Solutions

See step-by-step solutions with expert insights and AI powered tools for academic success

Step: 2

blur-text-image_2

Step: 3

blur-text-image_3

Ace Your Homework with AI

Get the answers you need in no time with our AI-driven, step-by-step assistance

Get Started

Recommended Textbook for

Relational Database And SQL

Authors: Lucy Scott

3rd Edition

1087899699, 978-1087899695

More Books

Students also viewed these Databases questions

Question

1. Signs and symbols of the map Briefly by box ?

Answered: 1 week ago

Question

Types of physical Maps?

Answered: 1 week ago

Question

Explain Intermediate term financing in detail.

Answered: 1 week ago

Question

What is the purpose of the Salary Structure Table?

Answered: 1 week ago

Question

What is the scope and use of a Job Family Table?

Answered: 1 week ago