Chat with us, powered by LiveChat Question Assignment 1: Developing the Corporate Strategy for Information Security  | Writedemy

Question Assignment 1: Developing the Corporate Strategy for Information Security 

Question Assignment 1: Developing the Corporate Strategy for Information Security 

Question

Assignment 1: Developing the Corporate Strategy for Information Security

 

Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security.  You have been recruited to serve as part of a team that will develop this strategy.

As part of the Information Security Strategy development, you are required to define specific Information Technology Security roles that will optimize and secure the organization’s data assets.

Review the “Cybersecurity: The Essential Body of Knowledge (EBK)” textbook for information necessary to complete this assignment.

Write a five to seven (5-7) page paper in which you do the following, based on the scenario described below:

 

1. The Chief Information Security Officer (CISO) is responsible for several functions within an organization.

a. Examine three (3) specific functions a CISO and provide examples of when a CISO would execute these functions within the

organization.

b. Specify at least three (3) competencies that the CISO could perform using the provided Website titled, “ Information Technology

(IT) Security Essential Body of Knowledge (EBK): A Competency and Functional Frame-work for IT Security Workforce

Development.”

 

2. The Chief Information Officer (CIO) is responsible for several accountability functions within an organization:

a. Identify at least four (4) functions of the CIO using the EBK as a guide. Provide examples of how the CIO would execute these

functions within an organization.

b. Classify at least two (2) security assurances that could be achieved by the CIO developing a formal security awareness, training,

and educational program.

c. Suggest methods, processes, or technologies that can be used by the CIO to certify the security functions and data assets of an

organization on a day-to-day basis.

 

3. Describe how the digital forensics function complements the overall security efforts of the organization.

4. Evaluate the operational duties of digital forensic personnel and how these help qualify the integrity of forensic investigations within the enterprise and industry.

 

5. List at least three (3) technical resources available to the digital forensics professional to perform forensic audits and investigations.

 

6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

parper 2

Case Study 2: SCADA Worm

Protecting the nation’s critical infrastructure is a major security challenge within the U.S.  Likewise, the responsibility for protecting the nation’s critical infrastructure encompasses all sectors of government, including private sector cooperation. Search on the Internet for information on the SCADA Worm, such as the article located at http://www.theregister.co.uk/2010/09/22/stuxnet_worm_weapon/.

Write a three to five (3-5) page paper in which you:

  1. Describe the impact and the vulnerability of the SCADA / Stuxnet Worm on the critical infrastructure of the United States.
  2. Describe the methods to mitigate the vulnerabilities, as they relate to the seven (7) domains.
  3. Assess the levels of responsibility between government agencies and the private sector for mitigating threats and vulnerabilities to our critical infrastructure.
  4. Assess the elements of an effective IT Security Policy Framework, and how these elements, if properly implemented, could prevent or mitigate and attack similar to the SCADA / Stuxnet Worm.
  5. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

 

paper 3

Assignment 1: IT Security Policy Framework

Establishing an effective Information Technology Security Policy Framework is critical in the development of a comprehensive security program. Additionally, there are many security frameworks that organizations commonly reference when developing their security programs. Review the security frameworks provided by NIST (SP 800-53), ISO / IEC 27000 series, and COBIT. Assume that you have been hired as a consultant by a medium-sized insurance organization and have been asked to draft an IT Security Policy Framework.

You may create and/or assume all necessary assumptions needed for the completion of this assignment.

Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteDemy. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.

Do you need an answer to this or any other questions?

About Writedemy

We are a professional paper writing website. If you have searched a question and bumped into our website just know you are in the right place to get help in your coursework. We offer HIGH QUALITY & PLAGIARISM FREE Papers.

How It Works

To make an Order you only need to click on “Order Now” and we will direct you to our Order Page. Fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.

Are there Discounts?

All new clients are eligible for 20% off in their first Order. Our payment method is safe and secure.

Hire a tutor today CLICK HERE to make your first order