Loading...

Messages

Proposals

Stuck in your homework and missing deadline? Get urgent help in $10/Page with 24 hours deadline

Get Urgent Writing Help In Your Essays, Assignments, Homeworks, Dissertation, Thesis Or Coursework & Achieve A+ Grades.

Privacy Guaranteed - 100% Plagiarism Free Writing - Free Turnitin Report - Professional And Experienced Writers - 24/7 Online Support

Enterprise technical infrastructure security plan

05/11/2020 Client: arwaabdullah Deadline: 7 Days

RUNNING HEAD: COMPREHENSIVE SECURITY 1

COMPREHENSIVE SECURITY 10

Applied Predictive Technologies: Comprehensive Security

NAME

American Military University

ISSC490

Comprehensive Security Outline

Introduction

The IT Security Management for Applied Predictive Technologies (APT) will aim to meet the security requirements of the company and other external requirements, for example, legislation and contracts. The IT Security Management will also provide basic level security to APT, which is independent of external requirements and maintains uninterrupted operations of information technology in the company.

Proposal

Implementation of the IT Security Management in line with the APT’s Safety and Security Management System. The security outline will estimate importance of information and data assets of the company while considering different parameters, for example, email policy, confidential data policy, and password policy among others.

Asset Identification

Overview

Asset identification will be done to establish a process for handling and classifying Applied Predictive Technologies (APT) information assets based on the information’s value, sensitivity, and criticality to the company (Ramachandran & Chang, 2016).

Scope

The procedure will apply to all users who store, process, and access the company’s sensitive information.

Policy

Information management and security policy of Information and Communication Technology (ICT). The policy will be guided by the principles of information asset management.

Enforcement

The company will develop security classification and information asset procedure (Ramachandran & Chang, 2016). The process of handling and classifying the company’s information assets will be developed from the procedure based on the information value, criticality, and sensitivity.

Acceptable Use Policy

Overview

Outline the acceptable use of Applied Predictive Technologies ICT resources by all users.

Scope

The policy will apply equally to all users of the company’s ICT resources.

Policy

Employee equity and diversity policy to enhance analysis if market experiments using the company’s software.

Enforcement

Applied Predictive Technologies will ensure appropriate management controls are implemented to offer acceptable use of ICT resources (Sohrabi & Solms, 2016).

Confidential Data Policy

Overview

Critical and confidential data needs will be secured during transfers across all communication channels of APT.

Scope

Data classified as confidential under the company’s information classification standard.

Policy

All confidential information will be protected from destruction, interception, copying, and modification (Armarego & Murray, 2015). The policy will be achieved through encrypted information and encrypted data and information exchange facilities.

Enforcement

Data owners and custodians should facilitate the security of data while the IT Security department will provide encryption methods and programs.

Email Policy

Overview

Guarantee proper use of APT’s email system and ensure all users are aware of acceptable and improper use of email systems.

Scope

All emails sent from APT’s email address by all employees, agents, and vendors operating on behalf of the company.

Policy

APT’s email system uses should be consistent with the company’s policies and procedures, for example, safety, ethical conduct, and applying proper business practices as required by the law.

Enforcement

Compliance will be verified through business tool reports, feedback to policy owner, internal and external audits, and periodic walk-throughs among other methods (Solms & Sohrabi, 2016).

Mobile Device Policy

Overview

Describes conditions under which APT permits the use of mobile devices and how the company manages mobile technology in the prevention of risks.

Scope

The policy will apply to APT’s staff, faculty, vendors, and other people who are granted privileges to access APT resources.

Policy

APT’s Acceptable usage policy will be used.

Enforcement

Privacy Administrator and Information Security policy contacts support the policy and disciplinary action will be taken when one violates the policy (Armarego & Murray, 2015).

Incident Response Policy

Overview

Provide the process for documentation, appropriate internal and external reporting, and communication when incidents that threaten the company’s digital assets.

Scope

APT’s data, information systems, networks, and any device or person who access the systems or data.

Policy

Information Technology Services (ITS) will be used to report intrusion attempts and any other security related incidents against APT.

Enforcement

Provide oversight on APT’s incident response by through communication, training, and enforcement of the policy (Sohrabi & Solms, 2016).

Network Security Policy

Overview

Establish technical guidance and procedure requirements to ensure protection of APT’s information handled using the computer networks.

Scope

All those who access APT’s computer networks.

Policy

All information exchanged and stored in APT’s network and not identified as property of other parties will be treated as APT’s asset. APT will prohibit the disclosure, duplication, diversion, and any other form that could lead to misuse or theft of information.

Enforcement

The Chief Information Officer of APT will establish, administer, maintain, and implement the network policy.

Password Policy

Overview

Standardize the creation of strong passwords, protect, and frequently update the passwords.

Scope

All personnel with the responsibility of an account in APT and those who require any form of access that requires passwords (Sohrabi & Solms, 2016).

Policy

Password Construction Guidelines will be used at user and system level passwords

Enforcement

Compliance measurement will be done, exceptions should be approved, and non-compliance will be subject to disciplinary action.

Physical Security Policy

Overview

Ensure the physical security of APT’s information and computer systems by providing responsibilities for physical security.

Scope

The policy applies to all APT’s information and computer systems and printed copies which can contain sensitive information.

Policy

Applicable access controls, for example, environmental and protective measures to properly protect physical computer systems.

Enforcement

Violators of the policy are subject to disciplinary action, for example, denial of access and legal penalties.

Wireless Network and Guest Access Policy

Overview

Identify the process for giving access to APT’s wireless network.

Scope

Applies to the use of computing devices, information and network resources on the entire APT’s computing network (Solms & Sohrabi, 2016).

Policy

Implementing wireless service following appropriate procedures for authorized guests.

Enforcement

The APT reserves the rights to audit systems and networks to ensure compliance with the wireless network and guest access policy.

Disaster Recovery

Overview

Defines the requirement for a standard disaster recovery plan for APT describing the process to recover IT systems.

Scope

The IT Security Management Staff of APT to ensure all recovery plans are developed, tested, and updated when need arises.

Policy

Several contingency plans will be created and practiced to the highest extent possible (Torabi & Mansouri, 2015).

Enforcement

Compliance measurement will be done using business tool reports and exceptions must be approved by the APT IT Security Management Staff (Sohrabi & Solms, 2016).

Business Continuity Planning

Overview

Developing the ability of APT to detect, prevent, reduce and where possible deal with IT security management disruptive events.

Scope

The policy will apply to all APT employees and visitors.

Policy

Integrate the disaster recovery and business continuity management culture of the company.

Enforcement

The company will adopt the principles of approach, deployment, results, and improvement cycle. The cycle will establish the stability of the business continuity management framework.

Security Awareness Training

Overview

Establish formal, documented security awareness education programs for APT’s information systems users. Appropriate training controls are facilitated by the security awareness training (Ramachandran & Chang, 2016).

Scope

Applies to all users of APT and all the IT resources owned and operated by the company.

Policy

Basic security awareness training, role-based security training, and security training records.

Enforcement

All APT employees will have to complete security awareness training once in a calendar year.

References Armarego, J., & Murray, D. (2015). Managing information security and privacy risks. Technology in Computer Science, 189-198. Ramachandran, M., & Chang, V. (2016). Cloud computing adoption framework. Transactions on Services Computing, 138-151. Sohrabi, N., & Solms, R. V. (2016). Information security policy compliance model. Computers & Security, 70-82. Solms, R. V., & Sohrabi, N. (2016). Information security policy . Computers & Security, 70-82. Torabi, S. A., & Mansouri, A. (2015). Towards organizational resilience. Operational Research, 261-273.

Homework is Completed By:

Writer Writer Name Amount Client Comments & Rating
Instant Homework Helper

ONLINE

Instant Homework Helper

$36

She helped me in last minute in a very reasonable price. She is a lifesaver, I got A+ grade in my homework, I will surely hire her again for my next assignments, Thumbs Up!

Order & Get This Solution Within 3 Hours in $25/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 3 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 6 Hours in $20/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 6 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

Order & Get This Solution Within 12 Hours in $15/Page

Custom Original Solution And Get A+ Grades

  • 100% Plagiarism Free
  • Proper APA/MLA/Harvard Referencing
  • Delivery in 12 Hours After Placing Order
  • Free Turnitin Report
  • Unlimited Revisions
  • Privacy Guaranteed

6 writers have sent their proposals to do this homework:

Online Assignment Help
Essay Writing Help
Instant Assignments
Top Writing Guru
Quality Homework Helper
Buy Coursework Help
Writer Writer Name Offer Chat
Online Assignment Help

ONLINE

Online Assignment Help

Hi dear, I am ready to do your homework in a reasonable price.

$70 Chat With Writer
Essay Writing Help

ONLINE

Essay Writing Help

I am a qualified and experienced Writer, Researcher, Tutor, analyst and Consultant. I hold MBA (Strategic Management) (Finance and Marketing) & CPA.K (Accounting and Finance.)

$77 Chat With Writer
Instant Assignments

ONLINE

Instant Assignments

Hey, I can write about your given topic according to the provided requirements. I have a few more questions to ask as if there is any specific instructions or deadline issue. I have already completed more than 250 academic papers, articles, and technical articles. I can provide you samples. I believe my capabilities would be perfect for your project. I can finish this job within the necessary interval. I have four years of experience in this field. If you want to give me the project I had be very happy to discuss this further and get started for you as soon as possible.

$70 Chat With Writer
Top Writing Guru

ONLINE

Top Writing Guru

I am an Academic writer with 10 years of experience. As an Academic writer, my aim is to generate unique content without Plagiarism as per the client’s requirements.

$75 Chat With Writer
Quality Homework Helper

ONLINE

Quality Homework Helper

Hi dear, I am ready to do your homework in a reasonable price.

$77 Chat With Writer
Buy Coursework Help

ONLINE

Buy Coursework Help

Hi dear, I am ready to do your homework in a reasonable price.

$77 Chat With Writer

Let our expert academic writers to help you in achieving a+ grades in your homework, assignment, quiz or exam.

Similar Homework Questions

Holst second suite in f movement 4 - Triage assessment model crisis intervention - Q1-2 500 miin word per Q due 8/8 - Security Architecture and Design Project - How to write a pcr narrative - Microarray Paper - Bfs code in c++ using adjacency list - Advanced Ergonomics - Create a guide that security personnel will use that includes procedures for implementing an access control change. - Ballam park athletics track - Uts law cover sheet - Risk control self assessment checklist for nurse practitioners - Baloney detection kit questions - How to write a self introduction speech outline - Acetone to acetic anhydride - Uber case study questions and answers - Mr jason harvey spinal surgeon - All wheel steering system - Solar hot water parts - How strong are the competitive forces confronting lululemon - Hemo the magnificent worksheet answers - Human growth and development broward college - Ethernet physical layer ppt - Hoppy's parts r us geraldton - Real life situations using linear equations - Fort collins force soccer - Week 4 - Statistical Methods for Healthcare Decision Making - The fifth discipline 2006 pdf - Griffith university pass mark - Debate on mobile phones should not be allowed in school - Asterix and obelix druid - Long term objectives in strategic management - Comparison & contrast between plato and machiavelli - Manor farm junior school - Express 21.5 cubic centimeters in quarts - Essay on Individualism - 978 1 4963 0023 2 - Ethical Decision Making and Hiring Paper - Paediatric investigation plan template - Black and deep desires macbeth meaning - North lake senior campus - Cross docking walmart case study - Actron air wiring diagram - Pooled development fund act - A 1000 kg car moving at 20m s slams - Risk Management - Acacia cognata copper cascade - Track software inc integrative case 2 - Case Study - John radcliffe women's centre - What will neutralize sulfuric acid - Match each retail term with the correct definition - Class 5 wind resistance - How similar are the observed phenotypes in each replicate - Bradfords builders merchants trowbridge - Comm/400 - Picasso the green tree frog activities - A view from the bridge cherokee paul mcdonald - Value of equity after recapitalization formula - Coco republic warehouse archerfield - Human resources - Incision and drainage foot cpt code - Why do some executives refuse to function as project sponsors? - Dust of snow figurative language - Forgiving my father lucille clifton - Crisis payment from centrelink - How to write a bcr - Value proposition adidas - Why is macbeth unlucky - Sunset boards case study - Teaming at disney animation - Dante's Inferno Discussion Response - Research Digest - A plate tectonics puzzle - 2 questions - Each question needs 3 answers - with 1 APA reference for each answer - Each answer atleast 200 words - Freak the mighty chapter 16 summary - Young man's guide to the orchestra - Bill gates character traits - Receiver of bequest crossword clue - What was the occasion for monroe's articulation of this doctrine - Week 11 - Girl [email protected]! BOY FRiend +91-9799046502 Love Marriage Problem Solution Specialist Molvi Ji. - Some lessons from the assembly line audience - Visual sourcebook of chinese civilization - So what's so bad about being so so summary - Irish hunger memorial quotes - 1042 lbs to kg - Unicellular organisms and multicellular organisms differences - Research paper art history topics - Create a scenario summary report excel 2013 - Is worstest grammatically correct - Acog guidelines for preeclampsia 2013 - List of masonic passwords - Module 5 Discussion Question - Arm's reach concepts beautiful dreamer cocoon swing toffee natural - Guide dog instructor training - Tony hsieh at zappos structure culture and radical change - Discussion-2 - Ain t ia woman speech audio - I2 cl2 h2o hio3 hcl redox