Computer Programming

Oct 30th, 2015
Sigchi4life
Category:
Programming
Price: $35 USD

Question description

Project 1 - Security Policy Framework

You will create an organizational security plan policy using your assigned readings (pay close attention to Chapter 3 in the Building an Effective Information Security Policy) as well as  the Cybersecurity Framework http://www.nist.gov/cyberframework/upload/cybersecurity-framework-021214.pdf as a resource, creating a two to three page outline for an organizational security plan policy for securing the architecture of the organizations computer assets. You will use this outline to create a security plan security awareness policy in week 8. All critical elements in an organizational plan are to be covered for your plan based on the outline. Address each Enterprise subject area in the Table 4: Initial Framework below. You will prepare an outline for use in preparing a policy based on these subject areas. Confidentiality, Integrity, and Availability will be thoroughly addressed for protection of the enterprise that you choose. Major security controls will be identified. Your outline will provide at least ten headings and list the subject areas with at least two sub-headings in outline format as:

1. Access controls
       a. Select …..
       b. Apply …..

To

10. Privacy
       a. Ensure confidentiality by compliance with HIPAA, ….
       b. Evaluate ….

Each heading and sub-heading will be in complete sentences that will define your plan to complete the plan for an effective enterprise policy.

Table 4: Initial Framework

Building an Effective Information Security Policy Architecture

By Sandy Bacik, Copyright Sandy Bacik © 2008, Publisher: CRC Press

Enterprise Area

ISO 17799

SAS70 Type II

GLBA

PCI DSS

EU Privacy

CobIT

Common Criteria

Generally Accepted Privacy Principles

Generally Accepted Security Principles

Access Control

X

X

X

X

X

X

X

X

X

Application Development

X

X

X

X

X

X

Asset Management

X

X

X

X

X

Business Operations

X

X

X

X

X

X

X

Communications

X

X

X

X

X

X

X

X

X

Compliance

X

X

X

X

X

X

Corporate Governance

X

X

X

Customers

X

X

X

X

X

X

X

X

Incident Management

X

X

X

X

X

X

X

X

X

IT Operations

X

X

X

X

X

X

X

X

X

Outsourcing

X

X

X

X

X

X

X

X

Physical/Environmental

X

X

X

X

Policies & Procedures

X

X

X

X

X

X

X

X

Privacy

X

X

X

X

X

X

Security

X

X

X

X

X

X

X


Tutor Answer

(Top Tutor) Daniel C.
(997)
School: UIUC
PREMIUM TUTOR

Studypool has helped 1,244,100 students

8 Reviews


Summary
Quality
Communication
On Time
Value
darnay
Nov 29th, 2016
" The best tutor out there!!!! "
dontuwannaknow
Nov 20th, 2016
" Excellent work as always thanks so much "
SjSurvivor143
Nov 6th, 2016
" Thanks for the help. "
ddg82
Oct 28th, 2016
" Thanks, good work "
tinytim47
Oct 15th, 2016
" Wow this is really good.... didn't expect it. Sweet!!!! "
jestin7
Oct 6th, 2016
" This tutor is great! "
mixedballz
Oct 1st, 2016
" excellent work as always thanks for the help "
lilmoe415
Sep 22nd, 2016
" Thank you, Thank you, for top quality work, this is your guy!! "
Ask your homework questions. Receive quality answers!

Type your question here (or upload an image)

1828 tutors are online

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors