l Security Management Plan
As a consultant with the Secure Inc. consulting firm, you have been asked to create a high-level information security management plan to be presented to the senior management of your latest client. The objectives of this project are to incorporate the assignments that you have been completing throughout the course into a high-level information security management plan. The paper should include a cover sheet, table of contents, executive summary, and properly cited references. You are welcome to select one of the sample organizations or your own selection as the basis for the development of your Organizational Security Management Plan.
Two sample organizations have been provided for you. Their descriptions follow:
If you do not choose Happy Health Systems or Mega-Corp, as an alternative you may choose an organization of your own to use for the course project. The organization must be comparable in size and complexity to one of the two sample organizations.
You must develop background information for your alternative organization comparable to that provided for the sample organizations. You will submit this background information to your instructor for approval. If using an existing organization, ensure that identifiers are altered to prevent revealing the identity or proprietary information about the organization.
If approved by your instructor, your individualized organization will be graded using the same scoring guide used to grade the standard course project.
To successfully complete this project, you will be expected to:
To achieve a successful project experience and outcome, you are expected to meet the following requirements.
Using one of the sample organizations or one of similar size and scope, create the Information Security Management Plan document and address the following:
Using the sample organization you have chosen for your project, write a short paper that addresses the following:
The primary way in which security policies fail is in not communicating and ensuring that staff know and follow the policy. Write a short paper that addresses the following:
The selection of a security model and best practices creates the foundation for effective secure operating system architecture. Write a short paper that addresses the following:
Using the framework of the security model that you selected in the last unit conduct a risk assessment and set of recommendations specific to the physical security issues that would impact organizational security:
Using the information that you gathered during the physical security risk assessment in the last unit, create a set of recommendations specific to mitigating any physical security issues identified that would impact organizational security:
Use the information that you gathered from the resources specific to implementing preventative controls that will impact the organizational security management plan. Write a short paper that addresses the following:
Insider risk to information assets resulting from hiring practices and proper separation of duties and oversight are important components of an organizational security plan. Write a short paper and address the following:
There is an increasing number of laws and regulations managing how organizations manage their information assets. Write a short paper and address the following:
Using the framework of the security model that you selected in the last unit, conduct a risk assessment and set of recommendations specific to the physical security issues that would impact organizational security:
When complete, submit your document in the assignment area.
[u05d1] Unit 5 Discussion 1
Virtualization Technologies (1-page Discussion)
Share with your fellow learners what aspect of virtualization you found the most interesting in your research on the topic.
Also share with your fellow learners what you learned about virtualization architectures that you think is important information for understanding the options available.
Our customer is the center of what we do and thus we offer 100% original essays..
By ordering our essays, you are guaranteed the best quality through our qualified experts.All your information and everything that you do on our website is kept completely confidential.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.Read more
The paper ordered is very original. Orders are checked by the most advanced anti-plagiarism software in the industry which ensures that the the essay written is 100% original. In that regard,we have a zero tolerance policy for plagiarism.Read more
Our Company thrives on excellence and thus we help ensure the Customer’s total satisfaction with the completed Order.To do so, we provide a Free Revision policy as a courtesy service. To receive free revision the Company requires that the Customer provides the request within Fifteen (15) days from the first completion date and within a period of thirty (30) days for dissertations and research papers.Read more
The Company is committed to protect the privacy of the Customer and it will never resell or share any of Customer’s personal information, including credit card data, with any third party. All the online transactions are processed through the secure and reliable online payment systems.Read more
By placing an order with us, you agree to the service we provide. We will endeavor to do all that it takes to deliver a comprehensive paper as per your requirements. We also count on your cooperation to ensure that we deliver on this mandate.Read more