Layered IT Management Policy

Oct 28th, 2015
Anonymous
Category:
Programming
Price: $70 USD

Question description

Week 9 Assignment 1: Policy Document Development

Learning Objectives and Outcomes

·  Create a layered IT management policy defining separation of duties.

Assignment

In this assignment, you are to create a security management policy that addresses the management and the separation of duties throughout the seven domains of a typical IT infrastructure. You are to define what the information systems security responsibility is for each of the seven domains of a typical IT infrastructure. From this definition, you must incorporate a definition for the separation of duties into the Procedures section of the policy definition template that you will fill out later in this step. The company that’s the subject of this case study is Four Fifths Bank:

·  Four Fifths Bank is a regional Bank that has multiple branches and locations throughout the area.

·  Bank Management made the strategic decision to focus on online banking and use of the Internet.

·  The bank prides itself on its customer service department and their ability to quickly answer customer questions.

·  The organization needs to be in compliance with the Gramm-Leach-Bliley Act (GLBA) and IT best practices regarding its employees.

·  The organization wants to monitor and control use of the Internet by implementing web content filtering.

·  The organization wants to eliminate personal use of organization-owned IT assets and systems. However, they allow BYOD to attach to their guest wireless network.

·  The organization wants to monitor and control use of the e-mail system by implementing e-mail security controls.

·  The bank wants to implement this policy for all the IT assets it owns and to incorporate a policy review process into its annual awareness training.

·  The organization wants to define a policy framework, including a security management policy defining the separation of duties for information systems.

Using the templates in your Security Policy text (pp.160-165), create the IT policy, standard, guideline, and procedure for Four Fifths Bank regarding the use of personal devices (cell phones, tablets, home computers, etc.).  All of these may be contained in a single document, but each one should start on a new page.  


Textbook : Security Policies and Implementation Issues, 2nd edition, By Robert Johnson & Mark Merkow, ©2014, Jones & Bartlett Learning,


Tutor Answer

(Top Tutor) agneta
School: University of Maryland
PREMIUM TUTOR

Studypool has helped 1,244,100 students

Review from student
Anonymous
" Outstanding Job!!!! "
Ask your homework questions. Receive quality answers!

Type your question here (or upload an image)

1831 tutors are online

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors