Target company or any other one, writing homework help

Anonymous

Question Description

Specifically, the following critical elements must be addressed:

I. Introduction

a) Provide a brief overview of the goals and objectives of your information assurance plan, including the importance of ensuring the confidentiality, integrity, and availability of information. What are the benefits of creating and maintaining an information assurance plan around those key concepts?

b) Assess the confidentiality, integrity, and availability of information within the organization.

c) Evaluate the current protocols and policies the organization has in place. What deficiencies exist within the organization's current information assurance policies? What are the potential barriers to implementation of a new information assurance plan?

Tutor Answer

Dmitrytutor
School: Carnegie Mellon University

Here is a snippet of the work. Just a paragraph to go, wont take more than 15minutes.

Running head: INFORMATION ASSURANCE PLAN

Google’s Information Assurance Plan

Name
Institutional Affiliation

1

INFORMATION ASSURANCE PLAN

2

Google’s Information Assurance Plan
Information assurance refers to the acts of assuring and managing risks as concerning
information processing, transmission, and use of data as well as their related processes and
systems. In this light, I hope to establish a strategic information assurance plan that hopes to
tailor administrative, technical and physical controls of an organization into concepts relating
information security. As well, this plan hopes to define and integrate consistent methodologies
for development, implementation, and design of electronic and physical data. Additionally, the
information assurance plan will be developed with a view of resolving and detecting information
handling within an organization.
Moreover, the plan will reduce time for delivery of information from the concept of
solution up to implementation. Furthermore, the information assurance plan will seamlessly
integrate information security with processes, workflows, applications, and data into a workplace
environment. Consequently, the information security plan will be built around the CIA triad
which takes into perspective the components of confidentiality, integrity and availability. These
tenets a...

flag Report DMCA
Review

Anonymous
Thanks, good work

Brown University





1271 Tutors

California Institute of Technology




2131 Tutors

Carnegie Mellon University




982 Tutors

Columbia University





1256 Tutors

Dartmouth University





2113 Tutors

Emory University





2279 Tutors

Harvard University





599 Tutors

Massachusetts Institute of Technology



2319 Tutors

New York University





1645 Tutors

Notre Dam University





1911 Tutors

Oklahoma University





2122 Tutors

Pennsylvania State University





932 Tutors

Princeton University





1211 Tutors

Stanford University





983 Tutors

University of California





1282 Tutors

Oxford University





123 Tutors

Yale University





2325 Tutors