Computer Programming

Get perfect grades by consistently using www.assignmentgeeks.org. Place your order and get a quality paper today. Take advantage of our current 20% discount by using the coupon code GET20


Order a Similar Paper Order a Different Paper

Project 1 – Security Policy Framework

You will create an organizational security plan policy using your assigned readings (pay close attention to Chapter 3 in the Building an Effective Information Security Policy) as well as  the Cybersecurity Framework http://www.nist.gov/cyberframework/upload/cybersecurity-framework-021214.pdf as a resource, creating a two to three page outline for an organizational security plan policy for securing the architecture of the organizations computer assets. You will use this outline to create a security plan security awareness policy in week 8. All critical elements in an organizational plan are to be covered for your plan based on the outline. Address each Enterprise subject area in the Table 4: Initial Framework below. You will prepare an outline for use in preparing a policy based on these subject areas. Confidentiality, Integrity, and Availability will be thoroughly addressed for protection of the enterprise that you choose. Major security controls will be identified. Your outline will provide at least ten headings and list the subject areas with at least two sub-headings in outline format as:

1. Access controls
       a. Select …..
       b. Apply …..

To

10. Privacy
       a. Ensure confidentiality by compliance with HIPAA, ….
       b. Evaluate ….

Each heading and sub-heading will be in complete sentences that will define your plan to complete the plan for an effective enterprise policy.

Table 4: Initial Framework

Building an Effective Information Security Policy Architecture

By Sandy Bacik, Copyright Sandy Bacik © 2008, Publisher: CRC Press

Enterprise Area

ISO 17799

SAS70 Type II

GLBA

PCI DSS

EU Privacy

CobIT

Common Criteria

Generally Accepted Privacy Principles

Generally Accepted Security Principles

Access Control

X

X

X

X

X

X

X

X

X

Application Development

X

X

X

X

X

X

Asset Management

X

X

X

X

X

Business Operations

X

X

X

X

X

X

X

Communications

X

X

X

X

X

X

X

X

X

Compliance

X

X

X

X

X

X

Corporate Governance

X

X

X

Customers

X

X

X

X

X

X

X

X

Incident Management

X

X

X

X

X

X

X

X

X

IT Operations

X

X

X

X

X

X

X

X

X

Outsourcing

X

X

X

X

X

X

X

X

Physical/Environmental

X

X

X

X

Policies & Procedures

X

X

X

X

X

X

X

X

Privacy

X

X

X

X

X

X

Security

X

X

X

X

X

X

X

Writerbay.net

Do you need help with this or a different assignment? We offer CONFIDENTIAL, ORIGINAL (Turnitin/LopesWrite/SafeAssign checks), and PRIVATE services using latest (within 5 years) peer-reviewed articles. Kindly click on ORDER NOW to receive an A++ paper from our masters- and PhD writers.

Get a 15% discount on your order using the following coupon code SAVE15


Order a Similar Paper Order a Different Paper