Teaching Case Bank Solutions Disaster Recovery and Business Continuity, writing homework help

User Generated

puevfgvar15

Writing

Description

Discussion Question 1. Managing a Remote Workforce

Most work forces are moving to more remote access. How do you manage people remotely? How do you make sure that they are included in the team. Our example has only two countries involved, what if there are many? How do you provide them access into the network securely? Especially if they are coming in from other countries that are known for infiltrating networks??

2. Conflict Management Techniques

Conflict management techniques come in handy when you are working in organizations. Most people do not have a good skill set in this area. Read the article, Conflict Management Techniques, available here, http://www.personalityexplorer.com/home/FREEResources/ConflictManagementTechniques.aspx. You might recognize a technique you already use. Select one technique and provide an example of how you think it may be used during a merger, or formation of a team. Provide details

3.Cultural Differences

Cultural differences when companies merge can last for years. There have been instances when the acquired company had more advanced technology then the other company, and they were forced to step back in time. That is a very frustrating experience. How would you tackle this issue?

4. Actions for Integration Issues


What integration issues do merging companies face? What techniques can a security professional use to ease cultural differences? How would the security professional bring together both IT teams so they feel comfortable? One of the most "invisible" barriers to success is the feeling of other IT professionals or teams "loss of control". How can you ease fears and build a positive team?


Essay question. Project #4 Detailed Assignment Description

Develop a Security Plan and Recommendation Memo to the CIO. The Plan must communicate the security strategy and technologies (minimum of 3) you are recommending from P1/P2/P3. Include a brief description of the technologies you are proposing with associated costs, expected return on investment (ROI), mitigation of risks, barriers to success. You must also include a detailed Network Diagram illustrating how this technology fits into the infrastructure.

The Recommendation Memo is a one page Executive Memo to the CIO summarizing and introducing the Plan. The recommendation memo will be on plain white background and carry the same formatting as a formal letter. You may use one of the MS Office or similar memo styles that meet this requirement. The Plan (your second deliverable for this assignment) will be a minimum 5 page, double-spaced paper using Times New Roman 12 font and APA style formatting for citations and references. It will also include a minimum of 5 references. The Title/Cover page, illustrations (tables/charts/graphs), network diagram, and references are not part of the page count but are required for the assignment. The grading rubric provides additional details as to what should be included in the paper. Your instructor may provide an APA style template to use for this paper.

Unformatted Attachment Preview

CSIA 485 Project #4 Detailed Assignment Description Develop a Security Plan and Recommendation Memo to the CIO. The Plan must communicate the security strategy and technologies (minimum of 3) you are recommending from P1/P2/P3. Include a brief description of the technologies you are proposing with associated costs, expected return on investment (ROI), mitigation of risks, barriers to success. You must also include a detailed Network Diagram illustrating how this technology fits into the infrastructure. The Recommendation Memo is a one page Executive Memo to the CIO summarizing and introducing the Plan. The recommendation memo will be on plain white background and carry the same formatting as a formal letter. You may use one of the MS Office or similar memo styles that meet this requirement. The Plan (your second deliverable for this assignment) will be a minimum 5 page, double-spaced paper using Times New Roman 12 font and APA style formatting for citations and references. It will also include a minimum of 5 references. The Title/Cover page, illustrations (tables/charts/graphs), network diagram, and references are not part of the page count but are required for the assignment. The grading rubric provides additional details as to what should be included in the paper. Your instructor may provide an APA style template to use for this paper. Copyright © 2015 by University of Maryland University College. All rights reserved.
Purchase answer to see full attachment
User generated content is uploaded by users for the purposes of learning and should be used following Studypool's honor code & terms of service.

Explanation & Answer

please find the attached file. i look forward to working with you again. good bye

Running head: SECURITY PLAN

1

Security Plan
Name
Tutor
Institution
Course
Date

SECURITY PLAN

2
Introduction

The organization ought to recognize how critical information is and therefore, just like
any other asset, it ought to be properly managed, protected and controlled. Information as an
asset has a significant effect on the continuity of the business. Therefore, information assets
ought to be protected from access by unauthorized individuals, from modifications by users and
from loss. In addition to protecting information from possible risks, it is important to ensure that
information is available during emergencies and crisis. The organization is exposed to too many
risks which threaten the continuity of the business and the lack of set standards and guidelines on
how to manage and secure systems exposes it more to possible risks.
This strategic plan highlights some of the important priorities on how the organization
can effectively and efficiently protect, control and manage its information assets. It does so by
identifying some important measures and technologies which are necessary in improving
information security. Once in place, these technologies act as a form of control because they are
helpful in monitoring information assets.
Objectives
The organization needs to be effective in managing security risks for its information
assets. To achieve the desired security level, certain initiatives will need to be completed to
realize the set objectives. The objectives for the set strategies are to prevent data loss in case of a
disaster. The organization the will also protect data loss by minimizing the likelihood of
confidential data being disclosed. Security of the system and network will also be achieved.
Initiatives will be put in place by employing a defense in depth architecture to provide increased
security for the organization. Crisis management technologies will also be put in place to help

SECURITY PLAN
the organization recover information in the event of a disaster hence minimizing damages.
Computer crashing can make users feel like their entire world has crashed especially due to the
possibility of data loss. However, with adoption of proper technologies data loss can be
prevented through carrying out a risk assessment, highlighting key risks and thereafter,
mitigating the risksby adopting necessary technologies. The proposed technologies ought to be
implemented as controls.

3

SECURITY PLA...


Anonymous
Excellent! Definitely coming back for more study materials.

Studypool
4.7
Trustpilot
4.5
Sitejabber
4.4

Related Tags