Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

Throughout this course, you will be working on several aspects of information se

ID: 3856619 • Letter: T

Question

Throughout this course, you will be working on several aspects of information security assurance that will result in a complete Information Security Assurance Implementation Plan for a project of your choosing. You will not be implementing a information security assurance plan, but you will work extensively with the concepts of information security assurance. Each week, you will complete a part of the Information Security Assurance Implementation Plan, with the final draft due at the end of the course. You will select a real organization or create a hypothetical organization and apply your research to develop the Information Security Assurance Implementation Plan that would be appropriate for the organization and fulfill a need that the organization has for its systems. Additional information and the deliverables for each Individual Project will be provided in the assignment description for the project. This is the course Key Assignment that you will make contributions to each week. Project Selection The first step will be to select an organization as the target for your Information Security Assurance Implementation Plan. This organization will be used as the basis for each of the assignments throughout the course and should conform to the following guidelines: Nontrivial: The selected organization should be large enough to allow reasonable exercise of the information security assurance planning process. Domain knowledge: You should be familiar enough with the organization to allow you to focus on the project tasks without requiring significant time for domain education. Accessibility: You should have good access to the people and other information that is related to the organization, because this will be an important part of the process. Note: The selected organization might already have an information security assurance plan in place, but it may still be used as the basis for the projects in this course. Note: The selected organization must have a need for some kind of information security assurance as part of its operations. Therefore, feel free to identify a hypothetical organization that meets the requirements. You may make any necessary assumptions to fulfill the requirements of organization selection. Select a real or fictitious organization that fits these requirements, and submit your proposal to your instructor before proceeding further with the assignments in the course. Approval should be sought within the first several days of the course. Your instructor will tell you how to submit this proposal and what notification will be given for project approval. Assignment For the assignments in this course, you will not be implementing the actual project, but rather, you will be developing a comprehensive Information Security Assurance Implementation Plan. Your first task in this process will be to select an organization or identify a hypothetical organization to use as the basis of your projects. You will also create the shell document for the final project deliverable that you will be working on during each unit. As you proceed through each project phase, you will add content to each section of the final document to gradually complete the final project delivery. Appropriate research should be conducted to support the development of your document, and assumptions may be made when necessary. The project deliverables for Week 1 are as follows: Submit your organization proposal to your instructor for approval. Information Security Assurance Implementation Plan document shell Use Word Title page Course number and name Project name Your name Date Table of Contents (TOC) Use an autogenerated TOC. This should be on a separate page. This should be a maximum of 3 levels deep. Be sure to update the fields of the TOC so that it is up-to-date before submitting your project. Section Headings Week 1: Information Security Plan Overview Week 2: Risk Assessment Week 3: Security Standards for Development and Deployment Week 4: Vulnerability Management Week 5: Assessment and Assurance Project Outline and Requirements Provide a brief description of the organization where the Information Security Assurance Implementation Plan will be implemented. Include the company's size, location(s), and other pertinent information. Material can be taken from the approved proposal submitted to your instructor. Be sure that this project is approved by the instructor. Information Security Overview Provide an overview of the information security plan overview that is suitable for a nontechnical audience. Include a brief description of the organization’s information security issues in areas of network management, server management, Web and non-Web applications, data management, and cloud computing. Name the document "yourname_CS661_IP1.doc."

Explanation / Answer

In my point of view the security planning in an organisation as follows:
week1: Planning the basic security requirments in an organisation
- Developing a security team mission statement that will be used in an company or in an organizational with there goals
- In order to make the security team more successful we should try to Learn to identify, understand, and manage customers.
- In order to have better understand business goals we should Identify market forces that drive the business in present days.
- we always make sure of business and there Understanding on doing business and how business leaders develop strategy
- Make more informed purchase decisions to Apply analysis on security vendors
- Understand the hackers and attacker motivations and techniques in all aspects
- Understand assets and process of business that are most valuable to the business.
- Learn the strategic planning of kill chain and threat intelligence.


week2: Giving the Roadmap Development.
- In order to align security with the corporate culture we should Understand the values and culture of your organization
- Understand the current Strengths and the Weaknesses, and Opportunities, and Threats in the business.
- Identifying what needs to be done in the company or in an organisation.
- Identifying what should be done first in business.
- Approaches to obtaining funding
- Promoting the work of the security team
- Developing effective metrics and Dashboards in the business
- Learning to innovate with the business so that it will be useful to business development


Week3:Developing the Security Policy and Assessment
- we must know the Security managers we must understand how to review, write, assess, and support security policy and procedures.
- we must know the understand the Role of policy
- we must know the how to Establishing acceptable bounds for behavior in the company.
- we must know the Leading the employees to do the right thing
- we must know How policy protects people, organizations, and information
- we must know the Relationship of mission statement to policy
- we must know the Policy versus procedure
- we must know the Policy needs assessment
- we must know the Governing policy
- we must know the Issue-specific policy
- we must know the Positive and negative tone
- we must know be Using the SMART approach
- Policy review and assessment process
- we must know the Role of psychology in implementing policy
- we must know the Organizational culture


week4: Leadership and Management in security
- We all must know about the Leadership of developing the organisation.
- we should Creating and Developing the entire working team.
- we should give them better Coaching and Mentoring the team
- we always maintain the Customer Service Focus
- we should rectify the Conflict Resolution
- We should maintain the Effective Communication
- Leading through Change
- There must be a Relationship Building within the team.
- Motivation and Self-direction
- There must be a effective Teamwork
- There must be Leadership Development

week5: Planning the Strategic Workshop

- we should Create the Security Plan for the CEO
- we should Understanding Business Priorities
- we must Enable Business Innovation
- we should Work with the BYODs
- we should maintaint the Effective Communication
- we should know all the Stakeholder Management

Hire Me For All Your Tutoring Needs
Integrity-first tutoring: clear explanations, guidance, and feedback.
Drop an Email at
drjack9650@gmail.com
Chat Now And Get Quote