CIS 222 Post University PCS Security Program Charter Research Paper

User Generated

Qwrss87

Writing

CIS 222

Post University

CIS

Description

As the new Chief Information Security Officer (CISO) for PostCyberSolutions (PCS) LLC you are developing a Security Program Plan for the Executive Board approval.

Based on your research for Unit 1:

  • Develop the PCS security program charter for the corporate network and satellite offices.
  • Clearly state the CISOs vision including elements of a strong security program.
  • Include information regarding some of the regulations or laws that influence the direction of your security program.
  • Identify the key roles and responsibilities of the various company stakeholders.

The requirements for your assignment are:

  • 1-2 page APA paper excluding title and reference pages
  • Provide at least two references and in-text citations in APA format
  • College level writing

Unformatted Attachment Preview

Unit 1 Individual Assignment for CIS222: Fundamentals of Security Unit 1 Individual Assignment Due: Midnight Sunday of Unit 1 As the new Chief Information Security Officer (CISO) for PostCyberSolutions (PCS) LLC you are developing a Security Program Plan for the Executive Board approval. Based on your research for Unit 1: • • • • Develop the PCS security program charter for the corporate network and satellite offices. Clearly state the CISOs vision including elements of a strong security program. Include information regarding some of the regulations or laws that influence the direction of your security program. Identify the key roles and responsibilities of the various company stakeholders. The requirements for your assignment are: • • • 1-2 page APA paper excluding title and reference pages Provide at least two references and in-text citations in APA format College level writing Students: Be sure to read the criteria, by which your paper/project will be evaluated, before you write, and again after you write. Evaluation Rubric for Unit 1 Assignment Criteria Mastery of concepts Content length Demonstrated Research Clear and professional writing and format Deficient 0-9 points The deliverable does not convey the relevant concepts and terminology from the Unit reading. 0-5 points The deliverable was significantly short of the length objectives. 0-5 points The submission did not meet the research reference and citation objective. 0-1 points Errors impede professional presentation; guidelines not followed. Proficient 10-39 points The deliverable is missing or unclear on some relevant concepts and terminology from the Unit reading. 6-10 points The deliverable was lacking in length. 6-10 points The research references and/or citations were not presented properly or relevant to the assignment. 2-4 points Few errors that do not impede professional presentation. Exemplary 40-60 points The deliverable strongly conveys the relevant concepts and terminology from the Unit reading. 11-15 points The deliverable met or exceeded the length objectives 11-15 points The deliverable included relevant references and citations that met or exceeded the objectives. 5-10 points Writing and format is clear, professional, and error free.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

Attached.

PCS Security Program Charter
Thesis: Information security systems are critical in risk management, and it is the responsibility
of various stakeholders to ensure effective and efficient implementation of information security
programs.
1. Introduction
2. Mission
3. Scope
4. Objectives
5. CISO’s Vision
6. Regulations or Laws that would Influence the Direction of the Security Program
7. Roles and responsibilities


Running head: PCS SECURITY PROGRAM CHARTER

PCS Security Program Charter
Name
Institutional Affiliation
Date

1

PCS SECURITY PROGRAM CHARTER

2

Introduction
This security program is meant for the corporate network and satellite offices of PCS
LLC, subject to the Executive Board's approval. The Executive Board must approve and
implement the various programs and policies, including security awareness policies, risk
assessment policies, and virus protection programs. The board must also review, approve and
facilitate the implementation of the concepts of encryption, authorization, authentication, and
accountability for the adoption of policies such as Access Control Policy (ACP), Acceptable Use
Policy (AU...


Anonymous
I was having a hard time with this subject, and this was a great help.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Similar Content

Related Tags