Question: Unit Outcomes addressed in this activity: Create a report that details your work product results in the areas of security assessment. policy, and practice development.


Unit Outcomes addressed in this activity: Create a report that details your work product results in the areas of security assessment. policy, and practice development. + Provide recommendations for improvement to the information technelogy security posture and readiness within your client organization. Detail implementation plans for improvements to the information technology security posture and readiness within your client organization. Course Outcomes addressed in this assignment: ITA89-1: Technology Skills: Analyze a complex computing problem and apply principles of computing and other relevant disciplines to identify solutions. IT489-2: System Specifications: Design, implement, and evaluate a computing-based solution to meet a given set of computing requirements in the context of the program's discipline. IT489-3: Professional Communication: Communicate effectively in a varisty of prefessional contexts. IT489-4: Professional Development: Recognize professional responsibilities and make informed judgments in computing practice based on legal and ethical principles. ITA89-5: Team Management: Function effectively as a member or leader of a team engaged in activities appropriate to the pregram's discipline. IT489-6: Client Specifications: Use systemic approaches to select, develop, apply, integrate, and administer secure computing technelogies to accomplish user goals. In this unit, you will complete the information technology security practice improvement paper you began in Unit 4. This project is based on your experience working with your client. Previously, in Unit 4, you identified and reviewad major areas of potential concern, and you used these to guide your efforts throughout the internship. In Unit 4, you prioritized these in such a way as to identify the areas of greatest impact and likelihood of providing meaningful input and/or change to your client's operations, given your inquiry into and increasing knowledge of client operations and security readiness. It is expected that some of the original content will already be developed as a result of your work with the client. Here, you will bring it all together in one place. You will need to include such things as additional resources, details, timelines, and projected outcomes. Add the additional topics listed in the Guidelines section below to the original paper you began in Unit 4, with the goal of developing 63 pages. Every business has something they could be doing to have their data and operation better secured. Your ongoing task throughout your internship is to identify some of the more important policies, practices, frameworks, and audit requirements at your internship location. Your task in this paper is to detail the issues, solutions, and possible implementation plans, including needed training. Continue working from the template provided in Unit 4 to complete the data analytics security practice improvement report. Utilize the following list to identify possible/prebable areas for your work, evaluation, and solution recommendations. Address, as a priority list based on your client's current situation, some of the following topics: 1. The weakest link in the data security chain and why 2. Different types of users 3. How to govern different types of users with policies 4. Acceptable use policies (AUPs) 5. The significance of a privileged-level access agreement (PAA) B. Security awareness policies (SAPS) 7. The difference between least access privileges and best fit access privileges B. The basic anatomy of a data analysis infrastructure policy 9. Common remote access domain policies 10. Common system/application domain policies 11. Common telecomm policies related to the IT infrastructure 12. Some cloud infrastructure security policy best practices 13. Some data analytics case studies and examples of IT infrastructure security policies 14. Common data classification policies 15. Common data handling policies 16. Common business risks related to information systems 17. What a risk and control self-assessment (RCSA) is and why it is important 18. Common risk assessment policies 19. The methods of quality assurance (QA) and quality control (QC) 20. Common best practices for risk management policies 21. Some case studies and examples of data risk management policies Guidelines: Use the following guidelines to help structure your paper for maximum clarity and impact. Review the detailed grading rubric for this assignment to understand all the detailed requirements of this paper. . Identify the following information technology security improvement focus at place of internship: Describe the problem or system that would ben ement, renovation, or augmentation. Include sufficient detail so that your instructor can really understand the scope of this project. It is a good idea to have your work supervisor involved in this project with you to help ensure that you clearly understand the problem. . Identify the data or system(s) that would be protected from the information technology security improvement: It is important to understand as much as possible the full impact of the problem. By identifying all impacted systems, you will be in a better position to provide a strong solution . Identify three to five key milestones necessary to adopt the practice improvement: Describe how you will measure project accomplishment as you progress through the design, planning. and actual implementation of the project (keep in mind that you will likely only be planning the implementation). Include this acknowledgement: "I realize I cannot actually implement the upgrade during my brief service, but I will make recommendations and propose a solution in my final report." Describe strategies to achieve results: Describe the recommended strategies to achieve the results. Will this require a new workflow, additional contractors, upgraded equipment and training, or new employee protocols? What key elements are necessary to achieve your objectives? Evaluation and validation of new system: Describe how you will evaluate and validate your security practice improvement(s). Explain how you would validate any gains resulting from the new system due to ncreased efficiencies, more secure data archives, complete disaster recovery plans, or increased security practice among the users in your target organization. Recommended timeline for adoption: What timeline do you recommend for total implementation? What are the key benchmarks, and what are your projections for achieving them? Recommended resources or case studies: What sources or case studies would you recommend for your supervisor to review to understand your recommendations and strategies more fully? Are there existing case studies that emulate your goals? Are there vendors offering upgrades or service agreements you feel are critically important? What additional reference materials will help illustrate and support your recommendations
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
