Difference Between Search & Browse Methods in Odoo 17
CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx
1. CMGT/400 v7
Threats, Attacks, and Vulnerability Assessment Template
CMGT/400 v7
Page 2 of 2Security Standards, Policies, and Procedures Manual
Template
Instructions: Replace the information in brackets [ ] with
information relevant to your project.
Cyber Security Engineers are responsible for safeguarding
computer networks and systems in an organization in order to
protect the sensitive data they store.
Take on the role of Cyber Security Engineer for the
organization you chose in Week 1. Research the following
information for your chosen organization. Develop a Security
Standards, Policies, and Procedures Manual using this template
with recommendations to management of security standards,
polices, and procedures which should be implemented in your
organization.[Organization Name]
Overview
Explain the importance to your organization of implementing
security policies, plans, and procedures. Discuss how security
policies, plans, and procedures will improve the overall security
of the organization.
[Response]
Data Privacy Policies and Procedures
[Response]
Data Isolation Policies and Procedures
[Response]
Non-Disclosure Agreement (NDA) Policies and Procedures
[Response]
2. Intellectual Property (IP) Policies and Procedures
[Response]
Password Policies and Procedures
[Response]
Acceptable Use of Organizational Assets and Data Policies and
Procedures
[Response]
Employee Policies and Procedures (Separation of
Duties/Training)
[Response]
Risk Response Policies and Procedures
Define avoidance, transference, mitigation, and acceptance
strategies and criteria.
[Response]
Compliance (Regulatory, Advisory, Informative)
Examples could include: HIPPA, FERPA, ISO, NIST, SEC, and
Sarbanes/Oxley.
[Response]
Incident Response Policies and Procedures
Include: Preparation, Identification, Containment, Eradication,
Recovery, and Lessons Learned
[Response]
Auditing Policies and Procedures
[Response]
Environmental/Physical Policies and Procedures
[Response]
Administrative Policies and Procedures
4. · IP Protection
· Passwords
· Acceptable use of organizational assets and data
· Employee policies (separation of duties / training)
· Environmental/Physical
· Risk response (9)
· Avoidance
· Transference
· Mitigation
· Acceptance
· Compliance examples that might affect your organization or
others [Regulatory, Advisory, Informative] (9)
· HIPPA
· FERPA
· ISO
· NIST
· SEC
· Sarbanes/Oxley
· Incident response (9)
· Preparation
· Identification
· Containment
· Eradication
· Recovery
· Lessons learned
· Miscellaneous (9)
· Auditing
· Administrative
· Configuration
88
X out of 97
Research
5. Assignment has research depth including at least two outside
relevant peer reviewed references from course material and/or
the library.
10
Organization
Assignment is organized appropriately covering all required
topics in a logical sequence and applies the Security Standards,
Policies, and Procedures Template. Title, introduction, body,
conclusion and references are included in required sequence.
4
Quality and APA:
Assignment projects professional, quality image, meets
academic integrity requirements. Includes Power Point and MS
Word document required by the assignment in APA format with
label. Include title page and reference section. References in
APA format. No spelling errors - the paper has obviously been
proofread. Title and reference slides/pages do not count toward
the length requirement.
4
TOTAL POINTS FOR RESEARCH, ORGANIZATION,
QUALITY, AND APA REQUIREMENTS
6. X out of 18
TOTAL POINTS
(X out of 115 possible points) 04-29-19 rpg