Order ID:89JHGSJE83839 | Style:APA/MLA/Harvard/Chicago | Pages:5-10 |
Instructions:
IT 253 Organizational Information Security Plan Paper
In this project, you will demonstrate your mastery of the following competency:
Integrate industry best practices in an organizational information security plan
Scenario
You are a part of the IT team for a medium-sized company (500 to 1,000 employees) in the e-commerce industry, the same company you provided recommendations for in Project One. As described in the last project, a third-party consultant has assessed the information security posture for the company. The consultant identified a need to establish and implement a security plan for a critical system, the company’s online store.
This information security plan will ensure that information systems are more secure and are at lower risk of being impacted by cyberattacks and other risks. The consultant has provided you with a template that you and your company will use to generate an information security plan. As the information security manager, you will fill in the template to create the company’s new security plan. The company will have to follow through on the plan within the next year.
Directions
To complete this project, first review the Project Two Overview of Current System document in the Supporting Materials section. You will also want to take a look at the company overview that you reviewed for Project One, also linked in Supporting Materials. Use these documents to inform your decision making, and to develop a security plan that aligns with the company and its critical system. Then fill in the content for each section of the Project Two Security Plan Template provided in the Supporting Materials section.
Your Security Plan will include:
Roles and Responsibilities: Identify who will be responsible for ensuring information security within the system and describe the responsibilities of each role.
User Awareness Training: Explain what kind of additional training employees of the company will need to protect information. This is in addition to the standard training that a new employee receives.
Access Control: Describe how accounts are generated and reviewed in order to ensure information security.
Vulnerability Management: Describe how system vulnerabilities will be managed for the company and how they will be addressed.
Backup and Recovery: Explain how the system’s information will be securely backed up and easily recovered if system information is compromised by a data breach or hack.
Internet-Facing Security: Describe how the portion of the system that is outside of the company, the internet-facing side, will be protected and secured.
What to Submit
To complete this project, you must submit the following:
Security Plan
Upload your security plan either in a .doc or .pdf file. Use the security plan template first, then upload your updated version. If you use any sources in your plan, they should be cited according to APA style.
Supporting Materials
The following resource(s) may help support your work on the project:
Project Two Overview of Current System: Before you start your plan, be sure to review this description of the current system, which will inform you of the technical components of the system. Using this information will ensure that you are considering how the current system operates in your security plan.
Project One Company Overview: Before you start your plan, you will also want to review this company overview from the first project. Reviewing the background of the company can help you develop a security plan that aligns with the company’s business objectives and operations.
Project Two Security Plan Template: You are required to use this template in order to fill out the sections of the security plan. By using this template, you can write in the six components of the plan.
RUBRIC |
||||||
Excellent Quality 95-100%
|
Introduction
45-41 points The background and significance of the problem and a clear statement of the research purpose is provided. The search history is mentioned. |
Literature Support 91-84 points The background and significance of the problem and a clear statement of the research purpose is provided. The search history is mentioned. |
Methodology 58-53 points Content is well-organized with headings for each slide and bulleted lists to group related material as needed. Use of font, color, graphics, effects, etc. to enhance readability and presentation content is excellent. Length requirements of 10 slides/pages or less is met. |
|||
Average Score 50-85% |
40-38 points More depth/detail for the background and significance is needed, or the research detail is not clear. No search history information is provided. |
83-76 points Review of relevant theoretical literature is evident, but there is little integration of studies into concepts related to problem. Review is partially focused and organized. Supporting and opposing research are included. Summary of information presented is included. Conclusion may not contain a biblical integration. |
52-49 points Content is somewhat organized, but no structure is apparent. The use of font, color, graphics, effects, etc. is occasionally detracting to the presentation content. Length requirements may not be met. |
|||
Poor Quality 0-45% |
37-1 points The background and/or significance are missing. No search history information is provided. |
75-1 points Review of relevant theoretical literature is evident, but there is no integration of studies into concepts related to problem. Review is partially focused and organized. Supporting and opposing research are not included in the summary of information presented. Conclusion does not contain a biblical integration. |
48-1 points There is no clear or logical organizational structure. No logical sequence is apparent. The use of font, color, graphics, effects etc. is often detracting to the presentation content. Length requirements may not be met |
|||
You Can Also Place the Order at www.collegepaper.us/orders/ordernow or www.crucialessay.com/orders/ordernow
IT 253 Organizational Information Security Plan Paper |
IT 253 Organizational Information Security Plan Paper