Information Security Models

Nov 6th, 2015
DotaCN
Category:
Engineering
Price: $30 USD

Question description

Information Security Models - Week 7

Learning Objective: Compare and contrast common security models.

Assignment Requirements

Q1. Information security models are standards that are used for reference or comparison and often serve as the stepping-off point for emulation and adoption. Your task for this assignment is:

  • Introduce the concept of using information security models (why are they important).
  • Explain that some security architecture models are implemented into computer hardware and software, some are implemented as policies and practices, and some encompass both.
  • Describe, compare, and contrast TWO common security models.
  • Conclude with your recommendation of which model would be best to use in your organization.

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial, 12-Point, Double- Space
  • Citation Style: APA
  • Length: 2–3 pages (plus a cover sheet)

Q2.  Outline of an Information Security Program - Week 6

Assignment Requirements

An information security program, as described in The Many Facets of an Information Security Program, identifies the structured effort needed to contain risks to the information assets of the organization. 

Review The Many Facets of an Information Security Program from the SANS Institute. 

  • Outline the 11 supporting programs within an Information Security Program.
  • In each of the 11 sections, provide a brief description of why YOU think these programs should be included. 

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial, 12-Point, Double- Space
  • Citation Style: APA
  • Length: 2–3 pages (plus a cover sheet)

Q3.  Three Major Types of Information Security Policies - Week 5

Learning Objective: Recognize the three major types of information security policy and know what goes into each type.

The NIST published Generally Accepted Principles and Practices for Securing Information Technology Systems (NIST 800-14) in 1996. 

For many years government agencies used NIST 800-14 as a source for developing information security policies (program, issue-specific, systems-specific, and etc.).  The guide was also to prepare for contingencies, incident handling, and training.

Assignment Requirements

Review 800-14 Generally Accepted Principles and Practices for Securing Information Technology Systems -> http://csrc.nist.gov/publications/nistpubs/800-14/800-14.pdf

After reviewing the NIST document and completing the reading assignment, write a 2-3 page paper that addresses the following:

  1. In the introduction, describe the importance of security policies.
  2. Use your text or other resources and provide an introduction to the three major types of information security policies. (Enterprise information security program policy, Issue-specific information security policies, Systems-specific information security policies)
  3. Identify types of information is contained in each of the three types of policies.
  4. Compare and contrast the three policies.
  5. Conclusion:
    1. How much have policies changed since the 1996 publication?  
    2. Are the same principles identified in 1996 applicable to today?  
    3. Your thoughts? 

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial, 12-Point, Double- Space
  • Citation Style: APA
  • Length: 2–3 pages (plus a cover sheet)

Tutor Answer

(Top Tutor) Daniel C.
(997)
School: Carnegie Mellon University
PREMIUM TUTOR

Studypool has helped 1,244,100 students

Summary
Quality
Communication
On Time
Value
kevin12622
Feb 16th, 2017
" Goes above and beyond expectations ! "
Ask your homework questions. Receive quality answers!

Type your question here (or upload an image)

1819 tutors are online

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors