Computer Programming

Computer Programming

Project 1 – Security Policy Framework

You will create an organizational security plan policy using your assigned readings (pay close attention to Chapter 3 in the Building an Effective Information Security Policy) as well as  the Cybersecurity Framework http://www.nist.gov/cyberframework/upload/cybersecurity-framework-021214.pdf as a resource, creating a two to three page outline for an organizational security plan policy for securing the architecture of the organizations computer assets. You will use this outline to create a security plan security awareness policy in week 8. All critical elements in an organizational plan are to be covered for your plan based on the outline. Address each Enterprise subject area in the Table 4: Initial Framework below. You will prepare an outline for use in preparing a policy based on these subject areas. Confidentiality, Integrity, and Availability will be thoroughly addressed for protection of the enterprise that you choose. Major security controls will be identified. Your outline will provide at least ten headings and list the subject areas with at least two sub-headings in outline format as:

1. Access controls
       a. Select …..
       b. Apply …..

To

10. Privacy
       a. Ensure confidentiality by compliance with HIPAA, ….
       b. Evaluate ….

Each heading and sub-heading will be in complete sentences that will define your plan to complete the plan for an effective enterprise policy.

Table 4: Initial Framework

Building an Effective Information Security Policy Architecture

By Sandy Bacik, Copyright Sandy Bacik © 2008, Publisher: CRC Press

Enterprise Area

ISO 17799

SAS70 Type II

GLBA

PCI DSS

EU Privacy

CobIT

Common Criteria

Generally Accepted Privacy Principles

Generally Accepted Security Principles

Access Control

X

X

X

X

X

X

X

X

X

Application Development

X

X

X

X

X

X

Asset Management

X

X

X

X

X

Business Operations

X

X

X

X

X

X

X

Communications

X

X

X

X

X

X

X

X

X

Compliance

X

X

X

X

X

X

Corporate Governance

X

X

X

Customers

X

X

X

X

X

X

X

X

Incident Management

X

X

X

X

X

X

X

X

X

IT Operations

X

X

X

X

X

X

X

X

X

Outsourcing

X

X

X

X

X

X

X

X

Physical/Environmental

X

X

X

X

Policies & Procedures

X

X

X

X

X

X

X

X

Privacy

X

X

X

X

X

X

Security

X

X

X

X

X

X

X

"You need a similar assignment done from scratch? Our qualified writers will help you with a guaranteed AI-free & plagiarism-free A+ quality paper, Confidentiality, Timely delivery & Livechat/phone Support.


Discount Code: CIPD30



Click ORDER NOW..

order custom paper