Develop a manual using the security standards and policies


Assignment: Security Standards, Policies, And Procedures Manual

Cyber Security Engineers are responsible for safeguarding computer networks and systems in an organization in order to protect the sensitive data they store.

Take on the role of Cyber Security Engineer for the organization you chose.

Develop a 5- to 6-page manual using the Security Standards, Policies, and Procedures Template with recommendations to management of security standards, polices, and procedures which should be implemented in your chosen organization. The 5-6 page assignment length requirement applies to the content of the assignment. Start the assignment with an APA formatted title page and add a reference section with at least two professional references. Use the references in the text of the assignment.

Research and include the following:

• Explain the importance to your organization of implementing security policies, plans, and procedures. Discuss how security policies, plans, and procedures will improve the overall security of the organization.

• Recommend appropriate policies and procedures for:

o Data privacy
o Data isolation
o NDA
o IP Protection
o Passwords
o Acceptable use of organizational assets and data
o Employee policies (separation of duties/training)
o Risk response

- Avoidance
- Transference
- Mitigation
- Acceptance

• Compliance examples that might affect your organization or others [Regulatory, Advisory, Informative]

o HIPPA
o FERPA
o ISO
o NIST
o SEC
o Sarbanes/Oxley

• Incident response

o Preparation
o Identification
o Containment
o Eradication
o Recovery
o Lessons learned

• Auditing

• Environmental/Physical

• Administrative

• Configuration.

Format your assignment according to the following formatting requirements:

1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also includes a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

3. Also include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.

Attachment:- Threats-Attacks-and-Vulnerability-Assessment.rar

Solution Preview :

Prepared by a verified Expert
Management Information Sys: Develop a manual using the security standards and policies
Reference No:- TGS02982732

Now Priced at $45 (50% Discount)

Recommended (90%)

Rated (4.3/5)