Layered IT Management Policy

Oct 28th, 2015
KateS
Category:
Computer Science
Price: $70 USD

Question description

Week 9 Assignment 1: Policy Document Development

Learning Objectives and Outcomes

·  Create a layered IT management policy defining separation of duties.

Assignment

In this assignment, you are to create a security management policy that addresses the management and the separation of duties throughout the seven domains of a typical IT infrastructure. You are to define what the information systems security responsibility is for each of the seven domains of a typical IT infrastructure. From this definition, you must incorporate a definition for the separation of duties into the Procedures section of the policy definition template that you will fill out later in this step. The company that’s the subject of this case study is Four Fifths Bank:

·  Four Fifths Bank is a regional Bank that has multiple branches and locations throughout the area.

·  Bank Management made the strategic decision to focus on online banking and use of the Internet.

·  The bank prides itself on its customer service department and their ability to quickly answer customer questions.

·  The organization needs to be in compliance with the Gramm-Leach-Bliley Act (GLBA) and IT best practices regarding its employees.

·  The organization wants to monitor and control use of the Internet by implementing web content filtering.

·  The organization wants to eliminate personal use of organization-owned IT assets and systems. However, they allow BYOD to attach to their guest wireless network.

·  The organization wants to monitor and control use of the e-mail system by implementing e-mail security controls.

·  The bank wants to implement this policy for all the IT assets it owns and to incorporate a policy review process into its annual awareness training.

·  The organization wants to define a policy framework, including a security management policy defining the separation of duties for information systems.

Using the templates in your Security Policy text (pp.160-165), create the IT policy, standard, guideline, and procedure for Four Fifths Bank regarding the use of personal devices (cell phones, tablets, home computers, etc.).  All of these may be contained in a single document, but each one should start on a new page.  


Textbook : Security Policies and Implementation Issues, 2nd edition, By Robert Johnson & Mark Merkow, ©2014, Jones & Bartlett Learning,


Tutor Answer

(Top Tutor) Daniel C.
(997)
School: Carnegie Mellon University
PREMIUM TUTOR

Studypool has helped 1,244,100 students

8 Reviews


Summary
Quality
Communication
On Time
Value
Five Star Tutor
Dec 1st, 2016
" Outstanding Job!!!! "
SjSurvivor143
Nov 15th, 2016
" Thanks for the help. "
Joemoe
Nov 1st, 2016
" <3 it, thanks for saving me time. "
tinytim47
Oct 23rd, 2016
" Wow this is really good.... didn't expect it. Sweet!!!! "
pmallory
Oct 19th, 2016
" Totally impressed with results!! :-) "
mixedballz
Oct 10th, 2016
" excellent work as always thanks for the help "
kiln82
Sep 26th, 2016
" awesome work thanks "
darnay
Sep 17th, 2016
" The best tutor out there!!!! "
Ask your homework questions. Receive quality answers!

Type your question here (or upload an image)

1825 tutors are online

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors