information systems security 1571071 2

Instructions

Your security consulting firm has been retained by an insurance company to help it develop and implement a risk reduction program for companies purchasing cybersecurity liability insurance. The next task on this multi-year contract is to develop a set of program plans for organization-level information security programs for small businesses (i.e., up to 100 employees, no more than five offices / work locations). These documents must be tailored to specific industries and, due to the high percentage of Internet-based businesses seeking cybersecurity insurance, must address state, federal, and international laws, regulations, and standards.

  1. To begin this assignment, your team (group) must select one industry or business type from the list below, which links out to the U.S. Small Business Administration website, http://www.sba.gov. (If you wish to use an industry or business type not in this list you must first obtain permission from your instructor.)

     

  2. Next, read Information Security Program Background Information and Concepts (below).
  1. Investigate how businesses in your selected industry use information technology to do business. Research your industry, using the UMUC library and the Internet. As a starting point, use the business guides found at  http://www.sba.gov/category/navigation-structure/starting-managing-business/managing-business/business-guides-industry
  1. As a team, complete the information security program requirements gathering and analysis exercise using the provided worksheet (below).
  1. Finally, each team (group) is to produce an executive-level briefing outlining the organization-level information security program plan, tailored to your chosen industry or type of business, using information from your completed worksheet. Use the outline provided below as a guide for writing your program plan briefing. Organization-level information security program plans describe/specify the required organization and management structures (people and processes), as well as the technologies used to implement required information security protections and countermeasures.

Outline: Information Security Program Plan

  1. Introduction
  2. Security Policy and Planning
  3. Personnel Management
  4. Physical Security Management
  5. Data Security Management
  6. Software Security Management
  7. Hardware Security Management
  8. Network Security Management
  9. Business Continuity/Disaster Recovery
  10. Incident Reporting and Management

 

Worksheet: Information Security Program Plan

 

Copy this table into your own Word document and fill it out.

 

Security area

Responsible party/office of primary responsibility (OPR)

Policy statement

Countermeasures/risk mitigation strategy

Known vulnerabilities/risks

Acquisition (systems/services)

 

 

 

 

Asset management

 

 

 

 

Audit and accountability

 

 

 

 

Authentication and authorization

 

 

 

 

Business continuity

 

 

 

 

Compliance management

 

 

 

 

Configuration control

 

 

 

 

Data*

 

 

 

 

Hardware*

 

 

 

 

Identity management

 

 

 

 

Incident management

 

 

 

 

Maintenance procedures

 

 

 

 

Media protection and destruction

 

 

 

 

Network*

 

 

 

 

Operations

 

 

 

 

Outsourcing

 

 

 

 

Personnel*

 

 

 

 

Physical environment*

 

 

 

 

Planning

 

 

 

 

Risk assessments

 

 

 

 

Security policy and planning*

 

 

 

 

Software*

 

 

 

 

Training

 

 

 

 

 

Security areas marked with an asterisk (*) must be addressed as a major section in your group’s information security program plan. The remaining sections should be addressed as subsections or within a subsection underneath one or more of the major sections.

Order a similar paper and get 15% discount. Use the coupon code GILB

Dr. Padma Myers
Dr. Padma Myers
98% Success Rate
Read More
“Hello, I deliver nursing papers on time following instructions from the client. My primary goal is customer satisfaction. Welcome for plagiarism free papers”
Stern Frea
Stern Frea
98% Success Rate
Read More
Hi! I am an English Language and Literature graduate; I have written many academic essays, including argumentative essays, research papers, and literary analysis.
Dr. Ishid Elsa
Dr. Ishid Elsa
98% Success Rate
Read More
"Hi, count on me to deliver quality papers that meet your expectations. I write well researched papers in the fields of nursing and medicine".
Dr. Paul P. Klug
Dr. Paul P. Klug
99% Success Rate
Read More
"A top writer with proven reliability and experience. I have a 99% success rate, overall rating of 10. Hire me for quality custom written nursing papers. Thank you"

How Our Essay Writing Service Works

Tell Us Your Requirements

Fill out order details and instructions, then upload any files or additional materials if needed. Then, confirm your order by clicking “Place an Order.”

Make your payment

Your payment is processed by a secure system. We accept Mastercard, Visa, Amex, and Discover. We don’t share any informati.on with third parties

The Writing Process

You can communicate with your writer. Clarify or track order with our customer support team. Upload all the necessary files for the writer to use.

Download your paper

Check your paper on your client profile. If it meets your requirements, approve and download. If any changes are needed, request a revision to be done.

Recent Questions

Stay In Touch!

Leave your email and get discount promo codes and the best essay samples from our writers!