Layered IT Management Policy

Oct 31st, 2015
DotaCN
Category:
Computer Science
Price: $30 USD

Question description

Policy Document Development

Learning Objectives and Outcomes

·  Create a layered IT management policy defining separation of duties.

Assignment

In this assignment, you are to create a security management policy that addresses the management and the separation of duties throughout the seven domains of a typical IT infrastructure. You are to define what the information systems security responsibility is for each of the seven domains of a typical IT infrastructure. From this definition, you must incorporate a definition for the separation of duties into the Procedures section of the policy definition template that you will fill out later in this step. The company that’s the subject of this case study is Four Fifths Bank:

·  Four Fifths Bank is a regional Bank that has multiple branches and locations throughout the area.

·  Bank Management made the strategic decision to focus on online banking and use of the Internet.

·  The bank prides itself on its customer service department and their ability to quickly answer customer questions.

·  The organization needs to be in compliance with the Gramm-Leach-Bliley Act (GLBA) and IT best practices regarding its employees.

·  The organization wants to monitor and control use of the Internet by implementing web content filtering.

·  The organization wants to eliminate personal use of organization-owned IT assets and systems. However, they allow BYOD to attach to their guest wireless network.

·  The organization wants to monitor and control use of the e-mail system by implementing e-mail security controls.

·  The bank wants to implement this policy for all the IT assets it owns and to incorporate a policy review process into its annual awareness training.

·  The organization wants to define a policy framework, including a security management policy defining the separation of duties for information systems.

Using the templates in your Security Policy text (pp.160-165), create the IT policy, standard, guideline, and procedure for Four Fifths Bank regarding the use of personal devices (cell phones, tablets, home computers, etc.).  All of these may be contained in a single document, but each one should start on a new page.  


Textbook : Security Policies and Implementation Issues, 2nd edition by Robert Johnson & Mark Merkow. 


Tutor Answer

(Top Tutor) Daniel C.
(997)
School: Rice University
PREMIUM TUTOR

Studypool has helped 1,244,100 students

8 Reviews


Summary
Quality
Communication
On Time
Value
kevin12622
Nov 30th, 2016
" Goes above and beyond expectations ! "
kiln82
Nov 21st, 2016
" awesome work thanks "
ashleyisgod
Nov 16th, 2016
" Top quality work from this guy! I'll be back! "
likeplum4
Nov 7th, 2016
" Excellent work as usual "
Molly_Moon
Oct 25th, 2016
" AMAZING as always! "
kpcutie
Oct 16th, 2016
" Excellent job "
Hemapathy
Oct 2nd, 2016
" all I can say is wow very fast work, great work thanks "
pmallory
Sep 23rd, 2016
" Totally impressed with results!! :-) "
Ask your homework questions. Receive quality answers!

Type your question here (or upload an image)

1822 tutors are online

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors