Hits: 0
Cybersecurity Management Policy Assignment
22) The security team has been tasked to create a draft for a security policy for the director. From the list of 12 topics provided, SELECT ONE TOPIC.
Summarize what the policy is and any key points you would implement within the company. Explain why you chose those points and how they work to protect your organization.
a)Acceptable Use Policy for End-Users
b)Remote Access Policy
c)Email Policy
d)Unauthorized Access
e)Limitations of Liability
f)Prohibited Uses
g)Logging Standards
h)Physical Access Control Policy
i)Operating System Updates
j)Anti-Virus Protection
k)Application Security
l)Data Classification Standards. Cybersecurity Management Policy Assignment Help
23) In order to succeed in any program in the professional world we must plan.
Select any industry that is of interest to you. It may be retail, education, telecommunications, health care, finance, etc.
Create a fictional business within this industry to be the basis for your project.
Your role
——–
You are either the Chief Intelligence Officer for Master of Science in Information Technology and MBA in Cybersecurity students,
OR
the Chief Information Security Office for Master of Science in Information Assurance and Cybersecurity and Master of Science in Cybersecurity students.
NOTE
Cybersecurity Management Policy Assignment Help
It is important to remember that according to the definition provided in ISO 32302, a BCP is “documented procedures that guide organizations to respond, recover, resume, and restore to a pre-defined level of operation following disruption.”
A)Complete the first stage of your Business Continuity Plan (BCP) by developing the primary outline for a BCP to identify key aspects of the organization.
Resources associated with ISO 27001 and NIST SP 800-53 and conduct your own research about each to prepare for this assignment.
Reference the “FEMA Small Business Continuity Plan Template” and “Risk Assessment Matrix”. The FEMA template can be used but copying and pasting any section of the document for the assignment constitutes plagiarism and will be treated as such. Use your own words when filling out each section of the BCP.
B)Develop the content for your company’s BCP.It should include all the following:
1)Executive Overview: Cybersecurity Management Policy Assignment Help
Be precise and detailed and provide a detailed understanding of the program.
2) Document Change Control:
Chart should be completed.
3)Introduction:
Include the Overview, Plan Scope, and Applicability that evaluates the appropriateness of cybersecurity frameworks for developing a cybersecurity program to align with business needs, Plan Objectives, and Plan Assumptions.
4)Risk Assessment Matrix Template: Complete the “Risk Assessment Matrix Template” provided as this element is not shown in the sample BCP template.
5)Critical Business Functions Overview: Detail components that are critical to business operations and provide a clear understanding of what the program is designed to address.
6)Company Organizational Chart: Create your own as this is not shown in the sample template. Include the following key positions: CEO, CFO, CIO, CISO, and COO.
Submit the BCP including the completed “Risk Assessment Matrix Template” and Company Organizational Chart. Cybersecurity Management Policy Assignment Help
Support the BCP with a minimum of three scholarly resources.
24) 16) CHOOSE ONE of the following principles of cybersecurity:
Encapsulation
Modularity
Simplicity of design (economy of mechanism)
Minimization of implementation (least common mechanism)
Open design
Complete mediation
Least privilege
Fail-safe defaults/Fail secure
Least astonishment (psychological acceptability)
Minimize trust surface (reluctance to trust)
Usability
Trust relationships
Imagine you are the department head for a local business and your director has asked you to explain in simplistic terms the core concepts of the selected principle. Provide a clear and precise definition and example of the concept and how it is used in your systems for the organization where you work.
For Cybersecurity Management Policy Assignment Help please click here