What information systems security is what the tenets of


Need to write a minimum 500 word description covering the below criteria.

Assume you are a Project Manager/ Scrum Master with a IT Organization.

Write a summary how the knowledge gained in the two subjects mentioned below has helped the candidate to successfully perform his/her duties as Project Manager/Scrum Master.

It has to clearly explain how the topics mentioned below helped in performing the current role as a Project Manager

Take the topics and analyze their relatedness and how helpful are they for the duties mentioned below

Topics covered in each subject are also mentioned.

Role: Project Manager / Scrum Master

Responsibilities:

· Project planning and execution

· Management of project resources

· Status reporting (status, risk, issues, action items, etc.) to project teams as well as to senior management/governance committees.

· Experience with management project financials - budgeting, tracking and reporting actual costs, as well as forecasting project spend.

· Management of project plans in MS Project

· Managing service delivery of application development project using Agile and Waterfall methodologies.

· Disaster Recovery and Business Continuity POC

Subject 1: Information Security and Risk Management

· Information Systems Security

· Risk, Threat, Vulnerability

· Risk-Related Concerns for Business

· Seven Domains of a Typical IT Infrastructure

· Risk Management Elements/Process

· Techniques of Risk Management

· Components of Risk Management

· Objectives of a Risk Management Plan

· Using a Cause and Effect Diagram

· Risk Assessment

· Best Practices for Performing Risk Assessments

· Identify procedural controls, Identify technical controls, Identify physical controls, Compare functional controls

· Creating a Risk Mitigation Plan

· Performing a Cost-Benefit Analysis

Subject 2: Application Security

· Microsoft Windows and the Threat Landscape

• What information systems security is

• What the tenets of information security are: the Confidentiality-Integrity-Availability (C-I-A) triad

• What mapping Microsoft Windows and applications into a typical IT infrastructure is

· Security in the Microsoft Windows Operating System

• What access controls and authentication are

• What security tokens, rights, and permissions are

• What users, groups, and Active Directory are

· Access Controls in Microsoft Windows

• What the principle of least privilege is

• What access models are, including identification, authentication, authorization, ACLs, and more

• What Windows objects and access controls are

• What forms of identification are, including SIDs, GUIDs, and CLSIDs

· Microsoft Windows Encryption Tools and Technologies

• What security certificates are

• What the public key infrastructure (PKI) is

• What best practices for Microsoft Windows encryption techniques are

· Protecting Microsoft Windows Against Malware

• What the purpose of malware is

• What different types of malware are

• What antivirus and anti-spyware software are

• Why updating software is important

· Group Policy Control in Microsoft Windows

• What Group Policy and Group Policy Objects are

• How to make Group Policy conform to security policy

• Which types of GPOs are in the Registry

· Microsoft Windows Network Security

• What network security is & What the principles of Microsoft Windows network security are

• What Microsoft Windows security protocols and services are

• How to secure Microsoft Windows environment network services

Solution Preview :

Prepared by a verified Expert
Management Information Sys: What information systems security is what the tenets of
Reference No:- TGS02404522

Now Priced at $20 (50% Discount)

Recommended (90%)

Rated (4.3/5)