Infomation Security Management

User Generated

Guneha92

Computer Science

Description

Q1. Critical Thinking - 10 : Encryption of Data at Rest

Learning Objective: Discuss the encryption process of data at rest.

Assignment Requirements

Write a paper that discusses encryption and how it is used to protect data at rest (i.e., storage).

  • Introduce the concept of encryption.
  • Describe the THREE states of data in an information processing system.
  • Discuss the advantages and disadvantages of encrypting data at rest. 
  • Why should IT professionals be concerned with encrypting data?
  • Conclude with your recommendation of an encryption policy to your organization.

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial, 12-Point, Double- Space
  • Citation Style: APA
  • Length: 2–3 pages (plus a cover sheet)

Q2. Critical Thinking - 9 : Improving Security through Layered Security Control

Learning Objective: Develop an issue-specific security policy (ISSP) that can be used at home or small business.

Assignment Requirements

Consider your incident response plan (IRP) you created last week. Using a similar approach, draft a generic, sample issue-specific policy that would be useful to any home computer user. Let's use the premise that this policy could be available to the general public. Ensure you're covering all of the critical aspects of a security policy.

Also, discuss how layered security proved to be a positive solution in the given problem, including the impacts of layered security.

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial, 12-Point, Double- Space
  • Citation Style: APA
  • Length: 1–2 pages (plus a cover sheet)


Q3. Critical Thinking - 4 : Evaluate a Contingency Plan

Learning Objective: Evaluate a Contingency Plan for a business organization or government agency.

Assignment Requirements

Remember, contingency planning refers to interim measures to recover IT services following an emergency or system disruption.

Browse Contingency Planning Guide for Federal Information Systems (NIST SP 800-34) and review the interim contingency planning procedures developed by the Environmental Protection Agency (EPA).

  • Evaluate the EPA's document with respect to the NIST SP 800-34.
  • Does it appear to you that the EPA followed NIST's guidance?  That is, big picture and not every detail.
  • What are some the contingency plan controls (CPs) did the EPA address?
  • Conclude with your opinion of following establish procedures. (e.g., benefit or drawbacks)

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial, 12-Point, Double- Space
  • Citation Style: APA
  • Length: 2–3 pages (plus a cover sheet)

Points: 50

Q4. Critical Thinking - 3 : Resources for Planning: 

Learning Objective: Evaluate resources used to help plan an information security program for business or government agencies.

Assignment Requirements

Browse the Special Publications (800 series) developed by the National Institute of Standards and Technology (NIST).  Describe in general terms how some (maybe four or five) of the publications can help you plan for developing an information security program at your organization.

  • Introduction that explains the purpose of the SP 800 series.
  • Name each publication that use select to describe.
  • Explain how the specific publication can assist you in planning.
  • Conclude the paper by writing your opinion of the usefulness of the documents to civilian organizations.

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial, 12-Point, Double- Space
  • Citation Style: APA
  • Length: 1–2 pages (plus a cover sheet)

User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer


Anonymous
Super useful! Studypool never disappoints.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags