SlideShare a Scribd company logo
1 of 28
Running head: PRACTICAL CONNECTIONS PAPER 1
Executive Program Practical Connection Assignment
Application Security ISOL-534-41
Name
University of the Cumberlands
Prof. Name
Application security course has been very interesting for me so
far and I have learned many new things related to IT security. I
already have good experience in my previous company for most
of the topics I learned in this course such as managing Active
Directory, Group Policy, Group Policy Object, Windows
systems administrations, etc. Knowledge of application security
policies plays most essential role for securing network and
system in any organization. I think I have gained good
command on security topic after taking this course and will help
me to apply my knowledge in my current or future companies.
The course content has been well defined and well balanced for
student like us who are inspired to make their career in
application securities. The lab assignments of this course have
helped me to apply practical knowledge which I have learned so
far in this course.
In my previous company I was working as Systems Engineer
and I used to create new user accounts in Active Directory and
provide them access as required for their roles, just like we did
in Lab 01 assignment. In addition, I have worked on creating
Virtual Machines for clients and install different application
into the VM servers. I have also worked and managed on Citrix
Severs including publishing and assigning the user permissions
to access the Applications in Citrix Management Console.
In this course I have learned how to secure applications,
operating systems, databases, network and systems. In addition,
the lab assignments have practically helped me on encryption
policies used for password, files or disk. We have also studied
various tools and technologies for encryption of Microsoft
windows, different methodologies for encryption, malware and
how to defend Microsoft windows against malware using
antivirus and anti-spyware applications, malware prevention
strategies. Our residency research topic is BYOD and I have
learned many positive and negative aspects of using BYOD
devices.
We have also studied various tools and technologies for encrypt
ion of Microsoft
windows, different methodologies for encryption, malware and
how to defend Microsoft windows against malware using antivir
us and antispyware applications, malware prevention strategies.
Our residency research topic is BYOD and I have learned many
positive and negative things during our research about this
topic. The discussion topics for this course also helped me
understand about information securities and its management,
and how other students are using it in their organizations.
In my current company, we use two factor authorization to login
to our systems and/or applications, which makes login
authentication more secure. The tools which we use to generate
passcodes for login are Entrust and Duo Mobile. My current job
role is not directly related to application security, but it is
related to managing client’s applications.
I have done certifications such as CCNA (CISCO Certified
Network Associate), MCITP (Microsoft Certified IT
Professional), CCA (Citrix Certified Associate) and ITIL which
are somewhat related to the IT security. Hence, I got more
interested in taking this course which will help me to get better
job in application security field. The knowledge which I gained
in this course will help me to proactively identity and mitigates
against any possible threats and vulnerabilities in an
organization.
Contents
Preface
Acknowledgments
PART ONE The Need for IT Security Policy
Frameworks
CHAPTER 1 Information Systems Security
Policy Management
What Is Information Systems Security?
Information Systems Security Management Life Cycle
What Is Information Assurance?
Confidentiality
Integrity
Nonrepudiation
What Is Governance?
Why Is Governance Important?
What Are Information Systems Security Policies?
Where Do Information Systems Security Policies Fit Within an
Organization?
Why Information Systems Security Policies Are Important
Policies That Support Operational Success
Challenges of Running a Business Without Policies
Dangers of Not Implementing Policies
Dangers of Implementing the Wrong Policies
When Do You Need Information Systems Security Policies?
Business Process Reengineering (BPR)
Continuous Improvement
Making Changes in Response to Problems
Why Enforcing and Winning Acceptance for Policies Is
Challenging
CHAPTER SUMMARY
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/09_ch1.xhtml#sec_21
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/09_ch1.xhtml#sec_20
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/09_ch1.xhtml#sec_19
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/09_ch1.xhtml#sec_18
https://www.safaribooksonline.c om/library/view/security-
policies-and/9781284055993/09_ch1.xhtml#sec_17
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/09_ch1.xhtml#sec_16
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/09_ch1.xhtml#sec_15
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/09_ch1.xhtml#sec_14
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/09_ch1.xhtml#sec_13
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/09_ch1.xhtml#sec_12
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/09_ch1.xhtml#sec_11
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/09_ch1.xhtml#sec_10
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/09_ch1.xhtml#sec_9
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/09_ch1.xhtml#sec_8
https://www.safaribooksonli ne.com/library/view/security-
policies-and/9781284055993/09_ch1.xhtml#sec_7
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/09_ch1.xhtml#sec_6
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/09_ch1.xhtml#sec_5
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/09_ch1.xhtml#sec_4
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/09_ch1.xhtml#sec_3
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/09_ch1.xhtml#sec_2
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/09_ch1.xhtml#sec_1
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/09_ch1.xhtml
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/08_part1.xhtml
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/07_ack.xhtml
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/06_pre.xhtml
KEY CONCEPTS AND TERMS
CHAPTER 1 ASSESSMENT
CHAPTER 2 Business Drivers for Information
Security Policies
Why Are Business Drivers Important?
Maintaining Compliance
Compliance Requires Proper Security Controls
Security Controls Must Include Information Security Policies
Relationship Between Security Controls and Information
Security Policy
Mitigating Risk Exposure
Educate Employees and Drive Security Awareness
Prevent Loss of Intellectual Property
Protect Digital Assets
Secure Privacy of Data
Lower Risk Exposure
Minimizing Liability of the Organization
Separation Between Employer and Employee
Acceptable Use Policies
Confidentiality Agreement and Nondisclosure Agreement
Business Liability Insurance Policies
Implementing Policies to Drive Operational Consistency
Forcing Repeatable Business Processes Across the Entire
Organization
Differences Between Mitigating and Compensating Controls
Policies Help Prevent Operational Deviation
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 2 ASSESSMENT
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/10_ch2.xhtml#sec_46
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/10_ch2.xhtml#sec_45
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/10_ch2.xhtml#sec_44
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/10_ch2.xhtml#sec_43
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/10_ch2.xhtml#sec_42
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/10_ch2.xhtml#sec_41
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/10_ch2.xhtml#sec_40
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/10_ch2.xhtml#sec_39
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/10_ch2.xhtml#sec_38
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/10_ch2.xhtml#sec_37
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/10_ch2.xhtml#sec_36
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/10_ch2.xhtml#sec_35
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/10_ch2.xhtml#sec_34
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/10_ch2.xhtml#sec_33
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/10_ch2.xhtml#sec_32
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/10_ch2.xhtml#sec_31
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/10_ch2.xhtml#sec_30
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/10_ch2.xhtml#sec_29
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/10_ch2.xhtml#sec_28
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/10_ch2.xhtml#sec_27
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/10_ch2.xhtml#sec_26
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/10_ch2.xhtml#sec_25
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/10_ch2.xhtml#sec_24
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/10_ch2.xhtml
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/09_ch1.xhtml#sec_23
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/09_ch1.xhtml#sec_22
ENDNOTES
CHAPTER 3 U.S. Compliance Laws and
Information Security Policy Requirements
U.S. Compliance Laws
What Are U.S. Compliance Laws?
Why Did U.S. Compliance Laws Come About?
Whom Do the Laws Protect?
Which Laws Require Proper Security Controls to Be Included in
Policies?
Which Laws Require Proper Security Controls for Handling
Privacy Data?
Aligning Security Policies and Controls with Regulations
Industry Leading Practices and Self-Regulation
Some Important Industry Standards
Payment Card Industry Data Security Standard (PCI DSS)
Statement on Standards for Attestation Engagements No. 16
(SSAE16)
Information Technology Infrastructure Library (ITIL)
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 3 ASSESSMENT
ENDNOTES
CHAPTER 4 Business Challenges Within the
Seven Domains of IT Responsibility
The Seven Domains of a Typical IT Infrastructure
User Domain
Workstation Domain
LAN Domain
LAN-to-WAN Domain
WAN Domain
Remote Access Domain
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/12_ch4.xhtml#sec_69
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/12_ch4.xhtml#sec_68
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/12_ch4.xhtml#sec_67
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/12_ch4.xhtml#sec_66
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/12_ch4.xhtml#sec_65
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/12_ch4.xhtml#sec_64
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/12_ch4.xhtml#sec_63
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/12_ch4.xhtml
https://www.safaribooksonli ne.com/library/view/security-
policies-and/9781284055993/11_ch3.xhtml#sec_62
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/11_ch3.xhtml#sec_61
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/11_ch3.xhtml#sec_60
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/11_ch3.xhtml#sec_59
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/11_ch3.xhtml#sec_58
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/11_ch3.xhtml#sec_57
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/11_ch3.xhtml#sec_56a
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/11_ch3.xhtml#sec_56
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/11_ch3.xhtml#sec_55
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/11_ch3.xhtml#sec_54
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/11_ch3.xhtml#sec_53
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/11_ch3.xhtml#sec_52
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/11_ch3.xhtml#sec_51
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/11_ch3.xhtml#sec_50
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/11_ch3.xhtml#sec_49
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/11_ch3.xhtml#sec_48
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/11_ch3.xhtml
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/10_ch2.xhtml#sec_47
System/Application Domain
Information Security Business Challenges and Security Policies
That Mitigate Risk Within the Seven
Domains
User Domain
Workstation Domain
LAN Domain
LAN-to-WAN Domain
WAN Domain
Remote Access Domain
System/Application Domain
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 4 ASSESSMENT
CHAPTER 5 Information Security Policy
Implementation Issues
Human Nature in the Workplace
Basic Elements of Motivation
Personality Types of Employees
Leadership, Values, and Ethics
Organizational Structure
Flat Organizations
Hierarchical Organizations
The Challenge of User Apathy
The Importance of Executive Management Support
Selling Information Security Policies to an Executive
Before, During, and After Policy Implementation
The Role of Human Resources Policies
Relationship Between HR and Security Policies
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/13_ch5.xhtml#sec_93
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/13_ch5.xhtml#sec_92
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/13_ch5.xhtml#sec_91
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/13_ch5.xhtml#sec_90
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/13_ch5.xhtml#sec_89
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/13_ch5.xhtml#sec_88
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/13_ch5.xhtml#sec_87
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/13_ch5.xhtml#sec_86
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/13_ch5.xhtml#sec_85
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/13_ch5.xhtml#sec_84
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/13_ch5.xhtml#sec_83
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/13_ch5.xhtml#sec_82
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/13_ch5.xhtml#sec_81
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/13_ch5.xhtml
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/12_ch4.xhtml#sec_80
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/12_ch4.xhtml#sec_79
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/12_ch4.xhtml#sec_78
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/12_ch4.xhtml#sec_77
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/12_ch4.xhtml#sec_76
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/12_ch4.xhtml#sec_75
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/12_ch4.xhtml#sec_74a
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/12_ch4.xhtml#sec_74
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/12_ch4.xhtml#sec_73
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/12_ch4.xhtml#sec_72
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/12_ch4.xhtml#sec_71
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/12_ch4.xhtml#sec_71
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/12_ch4.xhtml#sec_70
Lack of Support
Policy Roles, Responsibilities, and Accountability
Change Model
Responsibilities During Change
Roles and Accountabilities
When Policy Fulfillment Is Not Part of Job Descriptions
Impact on Entrepreneurial Productivity and Efficiency
Applying Security Policies to an Entrepreneurial Business
Tying Security Policy to Performance and Accountability
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 5 ASSESSMENT
ENDNOTE
PART TWO Types of Policies and Appropriate
Frameworks
CHAPTER 6 IT Security Policy Frameworks
What Is an IT Policy Framework?
What Is a Program Framework Policy or Charter?
Industry-Standard Policy Frameworks
What Is a Policy?
What Are Standards?
What Are Procedures?
What Are Guidelines?
Business Considerations for the Framework
Roles for Policy and Standards Development and Compliance
Information Assurance Considerations
Confidentiality
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/15_ch6.xhtml#sec_117
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/15_ch6.xhtml#sec_116
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/15_ch6.xhtml#sec_115
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/15_ch6.xhtml#sec_114
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/15_ch6.xhtml#sec_113
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/15_ch6.xhtml#sec_112
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/15_ch6.xhtml#sec_111
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/15_ch6.xhtml#sec_110
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/15_ch6.xhtml#sec_109
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/15_ch6.xhtml#sec_108
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/15_ch6.xhtml#sec_107
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/15_ch6.xhtml
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/14_part2.xhtml
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/13_ch5.xhtml#sec_106
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/13_ch5.xhtml#sec_105
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/13_ch5.xhtml#sec_104
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/13_ch5.xhtml#sec_103
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/13_ch5.xhtml#sec_102
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/13_ch5.xhtml#sec_101
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/13_ch5.xhtml#sec_100
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/13_ch5.xhtml#sec_99
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/13_ch5.xhtml#sec_98
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/13_ch5.xhtml#sec_97
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/13_ch5.xhtml#sec_96
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/13_ch5.xhtml#sec_95
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/13_ch5.xhtml#sec_94
Integrity
Availability
Information Systems Security Considerations
Unauthorized Access to and Use of the System
Unauthorized Disclosure of the Information
Disruption of the System or Services
Modification of Information
Destruction of Information Resources
Best Practices for IT Security Policy Framework Creation
Case Studies in Policy Framework Development
Private Sector Case Study
Public Sector Case Study
Private Sector Case Study
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 6 ASSESSMENT
CHAPTER 7 How to Design, Organize,
Implement, and Maintain IT Security Policies
Policies and Standards Design Considerations
Architecture Operating Model
Principles for Policy and Standards Development
The Importance of Transparency with Regard to Customer Data
Types of Controls for Policies and Standards
Document Organization Considerations
Sample Templates
Considerations for Implementing Policies and Standards
Building Consensus on Intent
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/16_ch7.xhtml#sec_141
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/16_ch7.xhtml#sec_140
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/16_ch7.xhtml#sec_139
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/16_ch7.xhtml#sec_138
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/16_ch7.xhtml#sec_137
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/16_ch7.xhtml#sec_136a
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/16_ch7.xhtml#sec_136
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/16_ch7.xhtml#sec_135
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/16_ch7.xhtml#sec_134
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/16_ch7.xhtml
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/15_ch6.xhtml#sec_133
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/15_ch6.xhtml#sec_132
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/15_ch6.xhtml#sec_131
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/15_ch6.xhtml#sec_130
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/15_ch6.xhtml#sec_129
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/15_ch6.xhtml#sec_128
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/15_ch6.xhtml#sec_127
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/15_ch6.xhtml#sec_126
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/15_ch6.xhtml#sec_125
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/15_ch6.xhtml#sec_124
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/15_ch6.xhtml#sec_123
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/15_ch6.xhtml#sec_122
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/15_ch6.xhtml#sec_121
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/15_ch6.xhtml#sec_120
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/15_ch6.xhtml#sec_119
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/15_ch6.xhtml#sec_118
Reviews and Approvals
Publishing Your Policies and Standards Library
Awareness and Training
Policy Change Control Board
Business Drivers for Policy and Standards Changes
Maintaining Your Policies and Standards Library
Updates and Revisions
Best Practices for Policies and Standards Maintenance
Case Studies and Examples of Designing, Organizing,
Implementing, and Maintaining IT Security Policies
Private Sector Case Study
Public Sector Case Study
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 7 ASSESSMENT
CHAPTER 8 IT Security Policy Framework
Approaches
IT Security Policy Framework Approaches
Risk Management and Compliance Approach
The Physical Domains of IT Responsibility Approach
Roles, Responsibilities, and Accountability for Personnel
The Seven Domains of a Typical IT Infrastructure
Organizational Structure
Organizational Culture
Separation of Duties
Layered Security Approach
Domain of Responsibility and Accountability
Governance and Compliance
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/17_ch8.xhtml#sec_166
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/17_ch8.xhtml#sec_165
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/17_ch8.xhtml#sec_164
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/17_ch8.xhtml#sec_163
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/17_ch8.xhtml#sec_162
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/17_ch8.xhtml#sec_161
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/17_ch8.xhtml#sec_160
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/17_ch8.xhtml#sec_159
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/17_ch8.xhtml#sec_158
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/17_ch8.xhtml#sec_157
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/17_ch8.xhtml#sec_156
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/17_ch8.xhtml
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/16_ch7.xhtml#sec_155
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/16_ch7.xhtml#sec_154
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/16_ch7.xhtml#sec_153
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/16_ch7.xhtml#sec_152
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/16_ch7.xhtml#sec_151
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/16_ch7.xhtml#sec_150
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/16_ch7.xhtml#sec_149
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/16_ch7.xhtml#sec_148
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/16_ch7.xhtml#sec_147
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/16_ch7.xhtml#sec_146
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/16_ch7.xhtml#sec_145
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/16_ch7.xhtml#sec_144
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/16_ch7.xhtml#sec_143
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/16_ch7.xhtml#sec_142
IT Security Controls
IT Security Policy Framework
Best Practices for IT Security Policy Framework Approaches
What Is the Difference Between GRC and ERM?
Case Studies and Examples of IT Security Policy Framework
Approaches
Private Sector Case Study
Public Sector Case Study
Critical Infrastructure Case Study
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 8 ASSESSMENT
ENDNOTE
CHAPTER 9 User Domain Policies
The Weakest Link in the Information Security Chain
Social Engineering
Human Mistakes
Insiders
Seven Types of Users
Employees
Systems Administrators
Security Personnel
Contractors
Vendors
Guests and General Public
Control Partners
Contingent
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/18_ch9.xhtml#sec_190
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/18_ch9.xhtml#sec_189
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/18_ch9.xhtml#sec_188
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/18_ch9.xhtml#sec_187
https://www.safaribooksonline.com/library/view/securi ty-
policies-and/9781284055993/18_ch9.xhtml#sec_186
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/18_ch9.xhtml#sec_185
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/18_ch9.xhtml#sec_1 84
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/18_ch9.xhtml#sec_183
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/18_ch9.xhtml#sec_182
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/18_ch9.xhtml#sec_181
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/18_ch9.xhtml#sec_180
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/18_ch9.xhtml#sec_180a
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/18_ch9.xhtml#sec_179
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/18_ch9.xhtml
https://www.safaribooksonline.com/library/vi ew/security-
policies-and/9781284055993/17_ch8.xhtml#sec_178
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/17_ch8.xhtml#sec_177
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/17_ch8.xhtml#sec_176
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/17_ch8.xhtml#sec_175
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/17_ch8.xhtml#sec_174
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/17_ch8.xhtml#sec_173
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/17_ch8.xhtml#sec_172
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/17_ch8.xhtml#sec_171
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/17_ch8.xhtml#sec_170
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/17_ch8.xhtml#sec_169
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/17_ch8.xhtml#sec_168
https://www.safaribooksonline.com/library/view/security-
policies-and/9781284055993/17_ch8.xhtml#sec_167
System
Why Govern Users with Policies?
Acceptable Use Policy (AUP)
The Privileged-Level Access Agreement (PAA)
Security Awareness Policy (SAP)
Best Practices for User Domain Policies
Understanding Least Access Privileges and Best Fit Privileges
Case Studies and Examples of User Domain Policies
Government Laptop Compromised
The Collapse of Barings Bank, 1995
Unauthorized Access to Defense Department Systems
CHAPTER SUMMARY
KEY CONCEPTS AND TERMS
CHAPTER 9 ASSESSMENT
CHAPTER 10 IT Infrastructure …

More Related Content

Similar to Running head PRACTICAL CONNECTIONS PAPER 1Executive P

Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxinfosec train
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadaysPECB
 
Advisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docxAdvisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docxkatherncarlyle
 
Advisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docxAdvisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docxdaniahendric
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueRapidValue
 
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAEIT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE360 BSI
 
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docxvickeryr87
 
Chapter 1Information Security OverviewCopyright © 2014 by Mc
Chapter 1Information Security OverviewCopyright © 2014 by McChapter 1Information Security OverviewCopyright © 2014 by Mc
Chapter 1Information Security OverviewCopyright © 2014 by McEstelaJeffery653
 
7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 DefenderMighty Guides, Inc.
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai360 BSI
 
CMIT 321 EXECUTIVE PROPOSAL PROJECT
CMIT 321 EXECUTIVE PROPOSAL PROJECTCMIT 321 EXECUTIVE PROPOSAL PROJECT
CMIT 321 EXECUTIVE PROPOSAL PROJECTHamesKellor
 
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAEIT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE360 BSI
 
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docxalinainglis
 
Cyber Defence Intelligence (CDI)
Cyber Defence Intelligence  (CDI)Cyber Defence Intelligence  (CDI)
Cyber Defence Intelligence (CDI)FloydCarrasquillo
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxInfosectrain3
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxwkyra78
 
How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?Robert Smith
 
Key Concepts And Principles Of Internal Quality Assurance...
Key Concepts And Principles Of Internal Quality Assurance...Key Concepts And Principles Of Internal Quality Assurance...
Key Concepts And Principles Of Internal Quality Assurance...Lanate Drummond
 
Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...Laura Benitez
 

Similar to Running head PRACTICAL CONNECTIONS PAPER 1Executive P (20)

Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptxTop_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
Top_10_Interview_Questions_That_You_Should_Know_as_an_Information.pptx
 
The importance of information security nowadays
The importance of information security nowadaysThe importance of information security nowadays
The importance of information security nowadays
 
Advisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docxAdvisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docx
 
Advisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docxAdvisory from Professionals Preparing Information .docx
Advisory from Professionals Preparing Information .docx
 
How to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValueHow to Secure your Fintech Solution - A Whitepaper by RapidValue
How to Secure your Fintech Solution - A Whitepaper by RapidValue
 
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAEIT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
IT Security Architecture & Leadership, 03 - 06 March 2019 Dubai, UAE
 
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
1Running Header ORGANIZATIONAL SECURITY 4ORGANIZATIONAL SEC.docx
 
Chapter 1Information Security OverviewCopyright © 2014 by Mc
Chapter 1Information Security OverviewCopyright © 2014 by McChapter 1Information Security OverviewCopyright © 2014 by Mc
Chapter 1Information Security OverviewCopyright © 2014 by Mc
 
7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender7 Experts on Implementing Microsoft 365 Defender
7 Experts on Implementing Microsoft 365 Defender
 
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 DubaiIT Risk Management & Leadership 23 - 26 June 2013 Dubai
IT Risk Management & Leadership 23 - 26 June 2013 Dubai
 
CMIT 321 EXECUTIVE PROPOSAL PROJECT
CMIT 321 EXECUTIVE PROPOSAL PROJECTCMIT 321 EXECUTIVE PROPOSAL PROJECT
CMIT 321 EXECUTIVE PROPOSAL PROJECT
 
Safeguarding the Enterprise
Safeguarding the EnterpriseSafeguarding the Enterprise
Safeguarding the Enterprise
 
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAEIT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
IT Security Architecture & Leadership, 24 - 27 November 2013 Dubai UAE
 
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx
4MANUAL OVERVIEW5SECTION 1Introduction Welcome.docx
 
Cyber Defence Intelligence (CDI)
Cyber Defence Intelligence  (CDI)Cyber Defence Intelligence  (CDI)
Cyber Defence Intelligence (CDI)
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptx
 
Project Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docxProject Quality-SIPOCSelect a process of your choice and creat.docx
Project Quality-SIPOCSelect a process of your choice and creat.docx
 
How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?How Cyber Security Courses Opens Up Amazing Career Opportunities?
How Cyber Security Courses Opens Up Amazing Career Opportunities?
 
Key Concepts And Principles Of Internal Quality Assurance...
Key Concepts And Principles Of Internal Quality Assurance...Key Concepts And Principles Of Internal Quality Assurance...
Key Concepts And Principles Of Internal Quality Assurance...
 
Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...Information Assurance Guidelines For Commercial Buildings...
Information Assurance Guidelines For Commercial Buildings...
 

More from MalikPinckney86

Find a recent merger or acquisition that has been announced in the.docx
Find a recent merger or acquisition that has been announced in the.docxFind a recent merger or acquisition that has been announced in the.docx
Find a recent merger or acquisition that has been announced in the.docxMalikPinckney86
 
Find an example of a document that misuses graphics. This can be a d.docx
Find an example of a document that misuses graphics. This can be a d.docxFind an example of a document that misuses graphics. This can be a d.docx
Find an example of a document that misuses graphics. This can be a d.docxMalikPinckney86
 
Find a scholarly research study from the Ashford University Library .docx
Find a scholarly research study from the Ashford University Library .docxFind a scholarly research study from the Ashford University Library .docx
Find a scholarly research study from the Ashford University Library .docxMalikPinckney86
 
Find a work of visual art, architecture, or literature from either A.docx
Find a work of visual art, architecture, or literature from either A.docxFind a work of visual art, architecture, or literature from either A.docx
Find a work of visual art, architecture, or literature from either A.docxMalikPinckney86
 
Find a real-life” example of one of the following institutions. Exa.docx
Find a real-life” example of one of the following institutions. Exa.docxFind a real-life” example of one of the following institutions. Exa.docx
Find a real-life” example of one of the following institutions. Exa.docxMalikPinckney86
 
Find a listing of expenses by diagnosis or by procedure. The source .docx
Find a listing of expenses by diagnosis or by procedure. The source .docxFind a listing of expenses by diagnosis or by procedure. The source .docx
Find a listing of expenses by diagnosis or by procedure. The source .docxMalikPinckney86
 
Financial Reporting Problem  and spreedsheet exercise.This is an.docx
Financial Reporting Problem  and spreedsheet exercise.This is an.docxFinancial Reporting Problem  and spreedsheet exercise.This is an.docx
Financial Reporting Problem  and spreedsheet exercise.This is an.docxMalikPinckney86
 
Find a Cybersecurity-related current event that happned THIS WEEK, a.docx
Find a Cybersecurity-related current event that happned THIS WEEK, a.docxFind a Cybersecurity-related current event that happned THIS WEEK, a.docx
Find a Cybersecurity-related current event that happned THIS WEEK, a.docxMalikPinckney86
 
Financing Health Care in a Time of Insurance Restructuring Pleas.docx
Financing Health Care in a Time of Insurance Restructuring Pleas.docxFinancing Health Care in a Time of Insurance Restructuring Pleas.docx
Financing Health Care in a Time of Insurance Restructuring Pleas.docxMalikPinckney86
 
Financing International Trade Please respond to the followingCom.docx
Financing International Trade Please respond to the followingCom.docxFinancing International Trade Please respond to the followingCom.docx
Financing International Trade Please respond to the followingCom.docxMalikPinckney86
 
Financial Statement Analysis and DisclosuresDiscuss the import.docx
Financial Statement Analysis and DisclosuresDiscuss the import.docxFinancial Statement Analysis and DisclosuresDiscuss the import.docx
Financial Statement Analysis and DisclosuresDiscuss the import.docxMalikPinckney86
 
Financial Ratios what are the limitations of financial ratios  .docx
Financial Ratios what are the limitations of financial ratios  .docxFinancial Ratios what are the limitations of financial ratios  .docx
Financial Ratios what are the limitations of financial ratios  .docxMalikPinckney86
 
Financial mangers make decisions today that will affect the firm i.docx
Financial mangers make decisions today that will affect the firm i.docxFinancial mangers make decisions today that will affect the firm i.docx
Financial mangers make decisions today that will affect the firm i.docxMalikPinckney86
 
Financial Laws and RegulationsComplete an APA formatted 2 page pap.docx
Financial Laws and RegulationsComplete an APA formatted 2 page pap.docxFinancial Laws and RegulationsComplete an APA formatted 2 page pap.docx
Financial Laws and RegulationsComplete an APA formatted 2 page pap.docxMalikPinckney86
 
Financial Management DiscussionWhen reviewing the financial st.docx
Financial Management DiscussionWhen reviewing the financial st.docxFinancial Management DiscussionWhen reviewing the financial st.docx
Financial Management DiscussionWhen reviewing the financial st.docxMalikPinckney86
 
Final Written Art Project (500 words) carefully and creatively wri.docx
Final Written Art Project (500 words) carefully and creatively wri.docxFinal Written Art Project (500 words) carefully and creatively wri.docx
Final Written Art Project (500 words) carefully and creatively wri.docxMalikPinckney86
 
Final Research Paper Research the responsibility of a critical t.docx
Final Research Paper Research the responsibility of a critical t.docxFinal Research Paper Research the responsibility of a critical t.docx
Final Research Paper Research the responsibility of a critical t.docxMalikPinckney86
 
Financial management homeworkUnit III Financial Planning, .docx
Financial management homeworkUnit III Financial Planning, .docxFinancial management homeworkUnit III Financial Planning, .docx
Financial management homeworkUnit III Financial Planning, .docxMalikPinckney86
 
Final ProjectThe Final Project should demonstrate an understanding.docx
Final ProjectThe Final Project should demonstrate an understanding.docxFinal ProjectThe Final Project should demonstrate an understanding.docx
Final ProjectThe Final Project should demonstrate an understanding.docxMalikPinckney86
 
Final ProjectImagine that you work for a health department and hav.docx
Final ProjectImagine that you work for a health department and hav.docxFinal ProjectImagine that you work for a health department and hav.docx
Final ProjectImagine that you work for a health department and hav.docxMalikPinckney86
 

More from MalikPinckney86 (20)

Find a recent merger or acquisition that has been announced in the.docx
Find a recent merger or acquisition that has been announced in the.docxFind a recent merger or acquisition that has been announced in the.docx
Find a recent merger or acquisition that has been announced in the.docx
 
Find an example of a document that misuses graphics. This can be a d.docx
Find an example of a document that misuses graphics. This can be a d.docxFind an example of a document that misuses graphics. This can be a d.docx
Find an example of a document that misuses graphics. This can be a d.docx
 
Find a scholarly research study from the Ashford University Library .docx
Find a scholarly research study from the Ashford University Library .docxFind a scholarly research study from the Ashford University Library .docx
Find a scholarly research study from the Ashford University Library .docx
 
Find a work of visual art, architecture, or literature from either A.docx
Find a work of visual art, architecture, or literature from either A.docxFind a work of visual art, architecture, or literature from either A.docx
Find a work of visual art, architecture, or literature from either A.docx
 
Find a real-life” example of one of the following institutions. Exa.docx
Find a real-life” example of one of the following institutions. Exa.docxFind a real-life” example of one of the following institutions. Exa.docx
Find a real-life” example of one of the following institutions. Exa.docx
 
Find a listing of expenses by diagnosis or by procedure. The source .docx
Find a listing of expenses by diagnosis or by procedure. The source .docxFind a listing of expenses by diagnosis or by procedure. The source .docx
Find a listing of expenses by diagnosis or by procedure. The source .docx
 
Financial Reporting Problem  and spreedsheet exercise.This is an.docx
Financial Reporting Problem  and spreedsheet exercise.This is an.docxFinancial Reporting Problem  and spreedsheet exercise.This is an.docx
Financial Reporting Problem  and spreedsheet exercise.This is an.docx
 
Find a Cybersecurity-related current event that happned THIS WEEK, a.docx
Find a Cybersecurity-related current event that happned THIS WEEK, a.docxFind a Cybersecurity-related current event that happned THIS WEEK, a.docx
Find a Cybersecurity-related current event that happned THIS WEEK, a.docx
 
Financing Health Care in a Time of Insurance Restructuring Pleas.docx
Financing Health Care in a Time of Insurance Restructuring Pleas.docxFinancing Health Care in a Time of Insurance Restructuring Pleas.docx
Financing Health Care in a Time of Insurance Restructuring Pleas.docx
 
Financing International Trade Please respond to the followingCom.docx
Financing International Trade Please respond to the followingCom.docxFinancing International Trade Please respond to the followingCom.docx
Financing International Trade Please respond to the followingCom.docx
 
Financial Statement Analysis and DisclosuresDiscuss the import.docx
Financial Statement Analysis and DisclosuresDiscuss the import.docxFinancial Statement Analysis and DisclosuresDiscuss the import.docx
Financial Statement Analysis and DisclosuresDiscuss the import.docx
 
Financial Ratios what are the limitations of financial ratios  .docx
Financial Ratios what are the limitations of financial ratios  .docxFinancial Ratios what are the limitations of financial ratios  .docx
Financial Ratios what are the limitations of financial ratios  .docx
 
Financial mangers make decisions today that will affect the firm i.docx
Financial mangers make decisions today that will affect the firm i.docxFinancial mangers make decisions today that will affect the firm i.docx
Financial mangers make decisions today that will affect the firm i.docx
 
Financial Laws and RegulationsComplete an APA formatted 2 page pap.docx
Financial Laws and RegulationsComplete an APA formatted 2 page pap.docxFinancial Laws and RegulationsComplete an APA formatted 2 page pap.docx
Financial Laws and RegulationsComplete an APA formatted 2 page pap.docx
 
Financial Management DiscussionWhen reviewing the financial st.docx
Financial Management DiscussionWhen reviewing the financial st.docxFinancial Management DiscussionWhen reviewing the financial st.docx
Financial Management DiscussionWhen reviewing the financial st.docx
 
Final Written Art Project (500 words) carefully and creatively wri.docx
Final Written Art Project (500 words) carefully and creatively wri.docxFinal Written Art Project (500 words) carefully and creatively wri.docx
Final Written Art Project (500 words) carefully and creatively wri.docx
 
Final Research Paper Research the responsibility of a critical t.docx
Final Research Paper Research the responsibility of a critical t.docxFinal Research Paper Research the responsibility of a critical t.docx
Final Research Paper Research the responsibility of a critical t.docx
 
Financial management homeworkUnit III Financial Planning, .docx
Financial management homeworkUnit III Financial Planning, .docxFinancial management homeworkUnit III Financial Planning, .docx
Financial management homeworkUnit III Financial Planning, .docx
 
Final ProjectThe Final Project should demonstrate an understanding.docx
Final ProjectThe Final Project should demonstrate an understanding.docxFinal ProjectThe Final Project should demonstrate an understanding.docx
Final ProjectThe Final Project should demonstrate an understanding.docx
 
Final ProjectImagine that you work for a health department and hav.docx
Final ProjectImagine that you work for a health department and hav.docxFinal ProjectImagine that you work for a health department and hav.docx
Final ProjectImagine that you work for a health department and hav.docx
 

Recently uploaded

_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting DataJhengPantaleon
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docxPoojaSen20
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfakmcokerachita
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformChameera Dedduwage
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Celine George
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityGeoBlogs
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsKarinaGenton
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application ) Sakshi Ghasle
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionSafetyChain Software
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...M56BOOKSTORE PRODUCT/SERVICE
 

Recently uploaded (20)

_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data_Math 4-Q4 Week 5.pptx Steps in Collecting Data
_Math 4-Q4 Week 5.pptx Steps in Collecting Data
 
mini mental status format.docx
mini    mental       status     format.docxmini    mental       status     format.docx
mini mental status format.docx
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Class 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdfClass 11 Legal Studies Ch-1 Concept of State .pdf
Class 11 Legal Studies Ch-1 Concept of State .pdf
 
A Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy ReformA Critique of the Proposed National Education Policy Reform
A Critique of the Proposed National Education Policy Reform
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
Incoming and Outgoing Shipments in 1 STEP Using Odoo 17
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Paris 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activityParis 2024 Olympic Geographies - an activity
Paris 2024 Olympic Geographies - an activity
 
Science 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its CharacteristicsScience 7 - LAND and SEA BREEZE and its Characteristics
Science 7 - LAND and SEA BREEZE and its Characteristics
 
Hybridoma Technology ( Production , Purification , and Application )
Hybridoma Technology  ( Production , Purification , and Application  ) Hybridoma Technology  ( Production , Purification , and Application  )
Hybridoma Technology ( Production , Purification , and Application )
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
Mastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory InspectionMastering the Unannounced Regulatory Inspection
Mastering the Unannounced Regulatory Inspection
 
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
KSHARA STURA .pptx---KSHARA KARMA THERAPY (CAUSTIC THERAPY)————IMP.OF KSHARA ...
 

Running head PRACTICAL CONNECTIONS PAPER 1Executive P