Infomation Security Management

Nov 8th, 2015
Anonymous
Category:
Engineering
Price: $40 USD

Question description

Q1. Critical Thinking - 10 : Encryption of Data at Rest

Learning Objective: Discuss the encryption process of data at rest.

Assignment Requirements

Write a paper that discusses encryption and how it is used to protect data at rest (i.e., storage).

  • Introduce the concept of encryption.
  • Describe the THREE states of data in an information processing system.
  • Discuss the advantages and disadvantages of encrypting data at rest. 
  • Why should IT professionals be concerned with encrypting data?
  • Conclude with your recommendation of an encryption policy to your organization.

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial, 12-Point, Double- Space
  • Citation Style: APA
  • Length: 2–3 pages (plus a cover sheet)

Q2. Critical Thinking - 9 : Improving Security through Layered Security Control

Learning Objective: Develop an issue-specific security policy (ISSP) that can be used at home or small business.

Assignment Requirements

Consider your incident response plan (IRP) you created last week. Using a similar approach, draft a generic, sample issue-specific policy that would be useful to any home computer user. Let's use the premise that this policy could be available to the general public. Ensure you're covering all of the critical aspects of a security policy.

Also, discuss how layered security proved to be a positive solution in the given problem, including the impacts of layered security.

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial, 12-Point, Double- Space
  • Citation Style: APA
  • Length: 1–2 pages (plus a cover sheet)


Q3. Critical Thinking - 4 : Evaluate a Contingency Plan

Learning Objective: Evaluate a Contingency Plan for a business organization or government agency.

Assignment Requirements

Remember, contingency planning refers to interim measures to recover IT services following an emergency or system disruption.

Browse Contingency Planning Guide for Federal Information Systems (NIST SP 800-34) and review the interim contingency planning procedures developed by the Environmental Protection Agency (EPA).

  • Evaluate the EPA's document with respect to the NIST SP 800-34.
  • Does it appear to you that the EPA followed NIST's guidance?  That is, big picture and not every detail.
  • What are some the contingency plan controls (CPs) did the EPA address?
  • Conclude with your opinion of following establish procedures. (e.g., benefit or drawbacks)

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial, 12-Point, Double- Space
  • Citation Style: APA
  • Length: 2–3 pages (plus a cover sheet)

Points: 50

Q4. Critical Thinking - 3 : Resources for Planning: 

Learning Objective: Evaluate resources used to help plan an information security program for business or government agencies.

Assignment Requirements

Browse the Special Publications (800 series) developed by the National Institute of Standards and Technology (NIST).  Describe in general terms how some (maybe four or five) of the publications can help you plan for developing an information security program at your organization.

  • Introduction that explains the purpose of the SP 800 series.
  • Name each publication that use select to describe.
  • Explain how the specific publication can assist you in planning.
  • Conclude the paper by writing your opinion of the usefulness of the documents to civilian organizations.

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial, 12-Point, Double- Space
  • Citation Style: APA
  • Length: 1–2 pages (plus a cover sheet)

Tutor Answer

(Top Tutor) Studypool Tutor
School: Cornell University
PREMIUM TUTOR

Studypool has helped 1,244,100 students

Review from student
Studypool Student
" Goes above and beyond expectations ! "
Ask your homework questions. Receive quality answers!

Type your question here (or upload an image)

1819 tutors are online

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors