CMGT400 Phoenix Cybersecurity Standards Policies & Procedures Paper

User Generated

wqhoo6777

Computer Science

CMGT400

University of Phoenix

Unformatted Attachment Preview

Assignment Content ❖ Cyber Security Engineers are responsible for safeguarding computer networks and systems in an organization in order to protect the sensitive data they store. Take on the role of Cyber Security Engineer for the organization you chose in Week 1. Develop a 6- to 7-page manual using the Security Standards, Policies, and Procedures Template with recommendations to management of security standards, polices, and procedures which should be implemented in your chosen organization. ➢ ➢ ➢ ➢ ➢ ➢ ➢ ➢ ➢ Research and include the following: REFER TO ADDITIONAL RESOURCES BELOW and the grading rubric. Explain the importance to your organization of implementing security policies, plans, and procedures. Discuss how security policies, plans, and procedures will improve the overall security of the organization. Recommend appropriate policies and procedures for: ▪ Data classification policies and procedures (data isolation) ▪ Non-disclosure Agreement policies and procedures ▪ Strong authentication (password policies and procedures... and multi factor authentication) ▪ Acceptable use of organizational assets and data ▪ Employee policies (separation of duties/training) ▪ Risk Management • Avoidance • Transference • Mitigation • Acceptance Compliance examples that might affect your organization or others [Regulatory, Advisory, Informative] ▪ HIPAA ▪ NIST Cybersecurity Framework ▪ Sarbanes/Oxley ▪ GLBA ▪ PCI DSS Incident response (How should we prepare, and what should happen in each phase) ▪ Preparation ▪ Identification ▪ Containment ▪ Eradication ▪ Recovery ▪ Lessons learned (root cause analysis and action plan) Auditing Environmental/Physical Administrative ▪ From the text: • "Controls are implemented as administrative, logical, and physical. Administrative controls are also known as management controls and include policies and procedures. Logical controls are also known as technical controls and are implemented through technology. Physical controls use physical means to protect objects." Configuration (change management and system hardening)
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Hey am through check it out

CMGT/400 v7

Security Standards, Policies, and Procedures
The Cyber Security Engineers for Syberry Corporation have the responsibility to protect the company’s
networks and systems so as to safeguard to safeguard the critical and private data they keep. The team
develops Security Standards, Policies, and Procedures Manual which provide recommendations to the
Syberry management on security standards, polices, and procedures which should be adopted and
utilized.

Syberry Corporation
Overview
Syberry being a Custom Software Development company that provides technical and business expertise
services over the internet require strong network security. The company creates diverse, complex, web
and mobile solutions and require the proper implementation of security measures, plans, and procedures.
It is important for Syberry corporation to implement security measures, plans, and procedures so as to
enhance the overall security of the company. The objectives for the implementation is to maintain
confidentiality, integrity and availability of the company’s networks and systems. Confidentiality involves
the of the safeguarding of the company’s IT resources and networks from unapproved users while
integrity ensures that the changing of IT resources is managed in a definite and authorized manner. The
availability aspect ensures that there is continuous access to the company’s IT assets and networks by
approved users.
The security policies, rules and procedures identify what and how all persons accessing and utilizing the
company’s IT infrastructure and resources must adhere to. These policies help in addressing the security
threats and implementation of strategies that minimize the number of IT security vulnerabilities and
provide means of recovery in an event of a successful network intrusion. They also give guidelines to
company personnel on the course of action and what not to do. In addition, the policies describe the
Peron who has permission to access what company resources and the kind of penalties or consequences
of failing to follow the rules (Vacca, 2017).
Procedures and plans provide support in the deployment of the security policies. For Syberry corporation
that does software development, procedures for software testing and quality assurance are essential.
Other kinds of security plan and procedures in networked systems and environment like auditing provide
details of what is audited as well as maintenance of audit logs.

Data Privacy Policies and Procedures
Syberry corporation respects the privacy of its personnel and other stakeholders like clients, vendors,
service providers, and business partners as well as applicants for employment and emphasizes on the
need for proper safeguard and management of private data. The company is guided by data integrity and
purpose limitation principle where the company only processes personal data in a manner that suits the
purpose for which it was acquired and authorized by the respective party. The company should
implement procedures to ens...


Anonymous
Just the thing I needed, saved me a lot of time.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags