Explain process that lead to identification of security need


Assignment: Security Needs and Objectives

Imagine you are a newly appointed Security Officer (SO). The Chief Information Security Officer (CISO) has given you sixty days (60) days to deliver a security policy plan to address the organizational growth that the company is anticipating. Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.

Use the Internet to research the process that leads to the identification of security needs in an organization. Also, research an organization with a security policy in place, and review how this organization laid down the foundation for its security policy. Review the business requirements for the security project plan. You will be asked to describe the detailed project including the scope of the project; possible security risks, constraints, and assumptions; integration with other systems and infrastructure; and relevant terms that were used throughout the security project.

Write a three to four page paper in which you:

1. Explain the process that leads to the identification of security needs and how those needs lay down a foundation for a policy.

2. Describe the details regarding the type of business in which the company you researched is engaged.

3. Provide a description about the current system requirements activities within the organization you researched.

4. Describe the types of data that the company you researched collects to support the business. The description should include the following:

a. Operational systems
b. Analytics and interfaces
c. Infrastructure and security

5. Use at least two quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Format your assignment according to the following formatting requirements:

1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also include a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

3. Also Include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.

Course learning outcomes associated with this assignment are:

• Discuss cybersecurity strategies and the various frameworks.
• Analyze the information planning concepts of change control in cybersecurity.
• Analyze the process of security need identification and determine its impact on a specific field of business.
• Use technology and information resources to research issues in information assurance.
• Write clearly and concisely about information assurance topics using proper writing mechanics and technical style conventions.

Solution Preview :

Prepared by a verified Expert
Management Information Sys: Explain process that lead to identification of security need
Reference No:- TGS02962711

Now Priced at $50 (50% Discount)

Recommended (99%)

Rated (4.3/5)

2015 ©TutorsGlobe All rights reserved. TutorsGlobe Rated 4.8/5 based on 34139 reviews.