SlideShare a Scribd company logo
1 of 6
CMGT/400 v7
Threats, Attacks, and Vulnerability Assessment Template
CMGT/400 v7
Page 2 of 2Security Standards, Policies, and Procedures Manual
Template
Instructions: Replace the information in brackets [ ] with
information relevant to your project.
Cyber Security Engineers are responsible for safeguarding
computer networks and systems in an organization in order to
protect the sensitive data they store.
Take on the role of Cyber Security Engineer for the
organization you chose in Week 1. Research the following
information for your chosen organization. Develop a Security
Standards, Policies, and Procedures Manual using this template
with recommendations to management of security standards,
polices, and procedures which should be implemented in your
organization.[Organization Name]
Overview
Explain the importance to your organization of implementing
security policies, plans, and procedures. Discuss how security
policies, plans, and procedures will improve the overall security
of the organization.
[Response]
Data Privacy Policies and Procedures
[Response]
Data Isolation Policies and Procedures
[Response]
Non-Disclosure Agreement (NDA) Policies and Procedures
[Response]
Intellectual Property (IP) Policies and Procedures
[Response]
Password Policies and Procedures
[Response]
Acceptable Use of Organizational Assets and Data Policies and
Procedures
[Response]
Employee Policies and Procedures (Separation of
Duties/Training)
[Response]
Risk Response Policies and Procedures
Define avoidance, transference, mitigation, and acceptance
strategies and criteria.
[Response]
Compliance (Regulatory, Advisory, Informative)
Examples could include: HIPPA, FERPA, ISO, NIST, SEC, and
Sarbanes/Oxley.
[Response]
Incident Response Policies and Procedures
Include: Preparation, Identification, Containment, Eradication,
Recovery, and Lessons Learned
[Response]
Auditing Policies and Procedures
[Response]
Environmental/Physical Policies and Procedures
[Response]
Administrative Policies and Procedures
[Response]
Configuration Policies and Procedures
[Response]
Copyright© 2018 by University of Phoenix. All rights reserved.
Copyright© 2018 by University of Phoenix. All rights reserved.
3CMGT 400 Grading Rubric Individual – Week 3 Security
Standards, Policies, Procedures Manual
MEETS CRITERIA?
Security Standards, Policies, and Procedures Manual
PTs
Grade
COMMENTS
Content (97 points)
Take on the role of Cyber Security Engineer for the
organization you chose in Week 1 .Develop a 5- to 6-page
manual using the Security Standards, Policies, and Procedures
Template with recommendations to management of security
standards, polices, and procedures which should be
implemented in your chosen organization.
9
Research and include the following:
· Explain the importance to your organization of implementing
security policies, plans, and procedures. Discuss how security
policies, plans, and procedures with improve the overall
security of the organization. (35pts)
· Recommend appropriate policies and procedures for: (17pts)
· Data privacy
· Data isolation
· NDA
· IP Protection
· Passwords
· Acceptable use of organizational assets and data
· Employee policies (separation of duties / training)
· Environmental/Physical
· Risk response (9)
· Avoidance
· Transference
· Mitigation
· Acceptance
· Compliance examples that might affect your organization or
others [Regulatory, Advisory, Informative] (9)
· HIPPA
· FERPA
· ISO
· NIST
· SEC
· Sarbanes/Oxley
· Incident response (9)
· Preparation
· Identification
· Containment
· Eradication
· Recovery
· Lessons learned
· Miscellaneous (9)
· Auditing
· Administrative
· Configuration
88
X out of 97
Research
Assignment has research depth including at least two outside
relevant peer reviewed references from course material and/or
the library.
10
Organization
Assignment is organized appropriately covering all required
topics in a logical sequence and applies the Security Standards,
Policies, and Procedures Template. Title, introduction, body,
conclusion and references are included in required sequence.
4
Quality and APA:
Assignment projects professional, quality image, meets
academic integrity requirements. Includes Power Point and MS
Word document required by the assignment in APA format with
label. Include title page and reference section. References in
APA format. No spelling errors - the paper has obviously been
proofread. Title and reference slides/pages do not count toward
the length requirement.
4
TOTAL POINTS FOR RESEARCH, ORGANIZATION,
QUALITY, AND APA REQUIREMENTS
X out of 18
TOTAL POINTS
(X out of 115 possible points) 04-29-19 rpg

More Related Content

Similar to CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx

Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standardsprimeteacher32
 
Responses needed, a paragraph per bullet question (7-8 sentences).docx
Responses needed, a paragraph per bullet question (7-8 sentences).docxResponses needed, a paragraph per bullet question (7-8 sentences).docx
Responses needed, a paragraph per bullet question (7-8 sentences).docxronak56
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.pptImXaib
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011codka
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011codka
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Tammy Clark
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policycharlesgarrett
 
Cmgt 582 Effective Communication / snaptutorial.com
Cmgt 582  Effective Communication / snaptutorial.comCmgt 582  Effective Communication / snaptutorial.com
Cmgt 582 Effective Communication / snaptutorial.comHarrisGeorg12
 
There are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database managThere are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database managGrazynaBroyles24
 
CIS333 – Assignments and Rubrics © 2017 Strayer Unive.docx
CIS333 – Assignments and Rubrics   © 2017 Strayer Unive.docxCIS333 – Assignments and Rubrics   © 2017 Strayer Unive.docx
CIS333 – Assignments and Rubrics © 2017 Strayer Unive.docxAASTHA76
 
CIS333 – Networking Security Fundamentals © 2017 Stray.docx
 CIS333 – Networking Security Fundamentals  © 2017 Stray.docx CIS333 – Networking Security Fundamentals  © 2017 Stray.docx
CIS333 – Networking Security Fundamentals © 2017 Stray.docxaryan532920
 
CIS333 – Networking Security Fundamentals © 2017 Stray.docx
CIS333 – Networking Security Fundamentals  © 2017 Stray.docxCIS333 – Networking Security Fundamentals  © 2017 Stray.docx
CIS333 – Networking Security Fundamentals © 2017 Stray.docxAASTHA76
 
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 CMGT 582 STUDY Inspiring Innovation--cmgt582study.com CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
CMGT 582 STUDY Inspiring Innovation--cmgt582study.comKeatonJennings98
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62AlliedConSapCourses
 
Cmgt 582 Education Specialist -snaptutorial.com
Cmgt 582  Education Specialist -snaptutorial.comCmgt 582  Education Specialist -snaptutorial.com
Cmgt 582 Education Specialist -snaptutorial.comDavisMurphyC37
 
What are policies procedures guidelines standards
What are policies procedures guidelines standardsWhat are policies procedures guidelines standards
What are policies procedures guidelines standardsManish Chaurasia
 
Information Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsInformation Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsPECB
 

Similar to CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx (20)

Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
Responses needed, a paragraph per bullet question (7-8 sentences).docx
Responses needed, a paragraph per bullet question (7-8 sentences).docxResponses needed, a paragraph per bullet question (7-8 sentences).docx
Responses needed, a paragraph per bullet question (7-8 sentences).docx
 
Policy formation and enforcement.ppt
Policy formation and enforcement.pptPolicy formation and enforcement.ppt
Policy formation and enforcement.ppt
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
Information security policy_2011
Information security policy_2011Information security policy_2011
Information security policy_2011
 
Start With A Great Information Security Plan!
Start With A Great Information Security Plan!Start With A Great Information Security Plan!
Start With A Great Information Security Plan!
 
File000169
File000169File000169
File000169
 
Importance Of A Security Policy
Importance Of A Security PolicyImportance Of A Security Policy
Importance Of A Security Policy
 
Cmgt 582 Effective Communication / snaptutorial.com
Cmgt 582  Effective Communication / snaptutorial.comCmgt 582  Effective Communication / snaptutorial.com
Cmgt 582 Effective Communication / snaptutorial.com
 
There are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database managThere are two general types of data dictionaries a database manag
There are two general types of data dictionaries a database manag
 
Lesson 1
Lesson 1Lesson 1
Lesson 1
 
Lesson 1- Information Policy
Lesson 1- Information PolicyLesson 1- Information Policy
Lesson 1- Information Policy
 
CIS333 – Assignments and Rubrics © 2017 Strayer Unive.docx
CIS333 – Assignments and Rubrics   © 2017 Strayer Unive.docxCIS333 – Assignments and Rubrics   © 2017 Strayer Unive.docx
CIS333 – Assignments and Rubrics © 2017 Strayer Unive.docx
 
CIS333 – Networking Security Fundamentals © 2017 Stray.docx
 CIS333 – Networking Security Fundamentals  © 2017 Stray.docx CIS333 – Networking Security Fundamentals  © 2017 Stray.docx
CIS333 – Networking Security Fundamentals © 2017 Stray.docx
 
CIS333 – Networking Security Fundamentals © 2017 Stray.docx
CIS333 – Networking Security Fundamentals  © 2017 Stray.docxCIS333 – Networking Security Fundamentals  © 2017 Stray.docx
CIS333 – Networking Security Fundamentals © 2017 Stray.docx
 
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 CMGT 582 STUDY Inspiring Innovation--cmgt582study.com CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 
D1 security and risk management v1.62
D1 security and risk management  v1.62D1 security and risk management  v1.62
D1 security and risk management v1.62
 
Cmgt 582 Education Specialist -snaptutorial.com
Cmgt 582  Education Specialist -snaptutorial.comCmgt 582  Education Specialist -snaptutorial.com
Cmgt 582 Education Specialist -snaptutorial.com
 
What are policies procedures guidelines standards
What are policies procedures guidelines standardsWhat are policies procedures guidelines standards
What are policies procedures guidelines standards
 
Information Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO StandardsInformation Security between Best Practices and ISO Standards
Information Security between Best Practices and ISO Standards
 

More from gordienaysmythe

CLINICAL SCHOLARSHIPTuberculosis Treatment for Mexican Ame.docx
CLINICAL SCHOLARSHIPTuberculosis Treatment for Mexican Ame.docxCLINICAL SCHOLARSHIPTuberculosis Treatment for Mexican Ame.docx
CLINICAL SCHOLARSHIPTuberculosis Treatment for Mexican Ame.docxgordienaysmythe
 
cmdfile.txtsleep 5ls -latrsleep 3pwdsleep 1wc .docx
cmdfile.txtsleep 5ls -latrsleep 3pwdsleep 1wc .docxcmdfile.txtsleep 5ls -latrsleep 3pwdsleep 1wc .docx
cmdfile.txtsleep 5ls -latrsleep 3pwdsleep 1wc .docxgordienaysmythe
 
CLOUD COMPUTINGAssessment item 3 - AWS implementation – 10Ove.docx
CLOUD COMPUTINGAssessment item 3 - AWS implementation – 10Ove.docxCLOUD COMPUTINGAssessment item 3 - AWS implementation – 10Ove.docx
CLOUD COMPUTINGAssessment item 3 - AWS implementation – 10Ove.docxgordienaysmythe
 
Clinical Case Studies8(6) 417 –423© The Author(s) 2009.docx
Clinical Case Studies8(6) 417 –423© The Author(s) 2009.docxClinical Case Studies8(6) 417 –423© The Author(s) 2009.docx
Clinical Case Studies8(6) 417 –423© The Author(s) 2009.docxgordienaysmythe
 
Clinical Case Studies8(5) 383 –402© The Author(s) 2009.docx
Clinical Case Studies8(5) 383 –402© The Author(s) 2009.docxClinical Case Studies8(5) 383 –402© The Author(s) 2009.docx
Clinical Case Studies8(5) 383 –402© The Author(s) 2009.docxgordienaysmythe
 
Climate ChangeWhat every designer should know.This i.docx
Climate ChangeWhat every designer should know.This i.docxClimate ChangeWhat every designer should know.This i.docx
Climate ChangeWhat every designer should know.This i.docxgordienaysmythe
 
CLIENT INTERVIEW SHEETDate ______________.docx
CLIENT INTERVIEW SHEETDate     ______________.docxCLIENT INTERVIEW SHEETDate     ______________.docx
CLIENT INTERVIEW SHEETDate ______________.docxgordienaysmythe
 
Click the link above to submit your assignment.Students, please .docx
Click the link above to submit your assignment.Students, please .docxClick the link above to submit your assignment.Students, please .docx
Click the link above to submit your assignment.Students, please .docxgordienaysmythe
 
click the link and watch the following video death by socialism an.docx
click the link and watch the following video death by socialism an.docxclick the link and watch the following video death by socialism an.docx
click the link and watch the following video death by socialism an.docxgordienaysmythe
 
Click the link above to complete this journal.  The topics of the jo.docx
Click the link above to complete this journal.  The topics of the jo.docxClick the link above to complete this journal.  The topics of the jo.docx
Click the link above to complete this journal.  The topics of the jo.docxgordienaysmythe
 
Classify man from the Domain to the species and discuss each categor.docx
Classify man from the Domain to the species and discuss each categor.docxClassify man from the Domain to the species and discuss each categor.docx
Classify man from the Domain to the species and discuss each categor.docxgordienaysmythe
 
Classroom Discussion is a valuable learning tool in that it.docx
Classroom Discussion is a valuable learning tool in that it.docxClassroom Discussion is a valuable learning tool in that it.docx
Classroom Discussion is a valuable learning tool in that it.docxgordienaysmythe
 
CLASSICSOFWESTERN PHILOSOPHY2CLASSICSO.docx
CLASSICSOFWESTERN PHILOSOPHY2CLASSICSO.docxCLASSICSOFWESTERN PHILOSOPHY2CLASSICSO.docx
CLASSICSOFWESTERN PHILOSOPHY2CLASSICSO.docxgordienaysmythe
 
Classification Alternative Techniques Assignment1) Define a.docx
Classification Alternative Techniques Assignment1) Define a.docxClassification Alternative Techniques Assignment1) Define a.docx
Classification Alternative Techniques Assignment1) Define a.docxgordienaysmythe
 
Classic Combo PlateDirectionsBefore there were all th.docx
Classic Combo PlateDirectionsBefore there were all th.docxClassic Combo PlateDirectionsBefore there were all th.docx
Classic Combo PlateDirectionsBefore there were all th.docxgordienaysmythe
 
Class- As stated on in Chapter 6, Walsh & Sattes (2010) write that” .docx
Class- As stated on in Chapter 6, Walsh & Sattes (2010) write that” .docxClass- As stated on in Chapter 6, Walsh & Sattes (2010) write that” .docx
Class- As stated on in Chapter 6, Walsh & Sattes (2010) write that” .docxgordienaysmythe
 
Classic Gardens and Landscapes counts responses to specialty pro.docx
Classic Gardens and Landscapes counts responses to specialty pro.docxClassic Gardens and Landscapes counts responses to specialty pro.docx
Classic Gardens and Landscapes counts responses to specialty pro.docxgordienaysmythe
 
Class, this is the final forum of the course.  From our readings fro.docx
Class, this is the final forum of the course.  From our readings fro.docxClass, this is the final forum of the course.  From our readings fro.docx
Class, this is the final forum of the course.  From our readings fro.docxgordienaysmythe
 
Class Subjects we went overWEEK 1 April 5thMULTICULTURAL.docx
Class Subjects we went overWEEK 1         April 5thMULTICULTURAL.docxClass Subjects we went overWEEK 1         April 5thMULTICULTURAL.docx
Class Subjects we went overWEEK 1 April 5thMULTICULTURAL.docxgordienaysmythe
 
Class ProfileStudent NameEnglish Language LearnerSocio.docx
Class ProfileStudent NameEnglish Language LearnerSocio.docxClass ProfileStudent NameEnglish Language LearnerSocio.docx
Class ProfileStudent NameEnglish Language LearnerSocio.docxgordienaysmythe
 

More from gordienaysmythe (20)

CLINICAL SCHOLARSHIPTuberculosis Treatment for Mexican Ame.docx
CLINICAL SCHOLARSHIPTuberculosis Treatment for Mexican Ame.docxCLINICAL SCHOLARSHIPTuberculosis Treatment for Mexican Ame.docx
CLINICAL SCHOLARSHIPTuberculosis Treatment for Mexican Ame.docx
 
cmdfile.txtsleep 5ls -latrsleep 3pwdsleep 1wc .docx
cmdfile.txtsleep 5ls -latrsleep 3pwdsleep 1wc .docxcmdfile.txtsleep 5ls -latrsleep 3pwdsleep 1wc .docx
cmdfile.txtsleep 5ls -latrsleep 3pwdsleep 1wc .docx
 
CLOUD COMPUTINGAssessment item 3 - AWS implementation – 10Ove.docx
CLOUD COMPUTINGAssessment item 3 - AWS implementation – 10Ove.docxCLOUD COMPUTINGAssessment item 3 - AWS implementation – 10Ove.docx
CLOUD COMPUTINGAssessment item 3 - AWS implementation – 10Ove.docx
 
Clinical Case Studies8(6) 417 –423© The Author(s) 2009.docx
Clinical Case Studies8(6) 417 –423© The Author(s) 2009.docxClinical Case Studies8(6) 417 –423© The Author(s) 2009.docx
Clinical Case Studies8(6) 417 –423© The Author(s) 2009.docx
 
Clinical Case Studies8(5) 383 –402© The Author(s) 2009.docx
Clinical Case Studies8(5) 383 –402© The Author(s) 2009.docxClinical Case Studies8(5) 383 –402© The Author(s) 2009.docx
Clinical Case Studies8(5) 383 –402© The Author(s) 2009.docx
 
Climate ChangeWhat every designer should know.This i.docx
Climate ChangeWhat every designer should know.This i.docxClimate ChangeWhat every designer should know.This i.docx
Climate ChangeWhat every designer should know.This i.docx
 
CLIENT INTERVIEW SHEETDate ______________.docx
CLIENT INTERVIEW SHEETDate     ______________.docxCLIENT INTERVIEW SHEETDate     ______________.docx
CLIENT INTERVIEW SHEETDate ______________.docx
 
Click the link above to submit your assignment.Students, please .docx
Click the link above to submit your assignment.Students, please .docxClick the link above to submit your assignment.Students, please .docx
Click the link above to submit your assignment.Students, please .docx
 
click the link and watch the following video death by socialism an.docx
click the link and watch the following video death by socialism an.docxclick the link and watch the following video death by socialism an.docx
click the link and watch the following video death by socialism an.docx
 
Click the link above to complete this journal.  The topics of the jo.docx
Click the link above to complete this journal.  The topics of the jo.docxClick the link above to complete this journal.  The topics of the jo.docx
Click the link above to complete this journal.  The topics of the jo.docx
 
Classify man from the Domain to the species and discuss each categor.docx
Classify man from the Domain to the species and discuss each categor.docxClassify man from the Domain to the species and discuss each categor.docx
Classify man from the Domain to the species and discuss each categor.docx
 
Classroom Discussion is a valuable learning tool in that it.docx
Classroom Discussion is a valuable learning tool in that it.docxClassroom Discussion is a valuable learning tool in that it.docx
Classroom Discussion is a valuable learning tool in that it.docx
 
CLASSICSOFWESTERN PHILOSOPHY2CLASSICSO.docx
CLASSICSOFWESTERN PHILOSOPHY2CLASSICSO.docxCLASSICSOFWESTERN PHILOSOPHY2CLASSICSO.docx
CLASSICSOFWESTERN PHILOSOPHY2CLASSICSO.docx
 
Classification Alternative Techniques Assignment1) Define a.docx
Classification Alternative Techniques Assignment1) Define a.docxClassification Alternative Techniques Assignment1) Define a.docx
Classification Alternative Techniques Assignment1) Define a.docx
 
Classic Combo PlateDirectionsBefore there were all th.docx
Classic Combo PlateDirectionsBefore there were all th.docxClassic Combo PlateDirectionsBefore there were all th.docx
Classic Combo PlateDirectionsBefore there were all th.docx
 
Class- As stated on in Chapter 6, Walsh & Sattes (2010) write that” .docx
Class- As stated on in Chapter 6, Walsh & Sattes (2010) write that” .docxClass- As stated on in Chapter 6, Walsh & Sattes (2010) write that” .docx
Class- As stated on in Chapter 6, Walsh & Sattes (2010) write that” .docx
 
Classic Gardens and Landscapes counts responses to specialty pro.docx
Classic Gardens and Landscapes counts responses to specialty pro.docxClassic Gardens and Landscapes counts responses to specialty pro.docx
Classic Gardens and Landscapes counts responses to specialty pro.docx
 
Class, this is the final forum of the course.  From our readings fro.docx
Class, this is the final forum of the course.  From our readings fro.docxClass, this is the final forum of the course.  From our readings fro.docx
Class, this is the final forum of the course.  From our readings fro.docx
 
Class Subjects we went overWEEK 1 April 5thMULTICULTURAL.docx
Class Subjects we went overWEEK 1         April 5thMULTICULTURAL.docxClass Subjects we went overWEEK 1         April 5thMULTICULTURAL.docx
Class Subjects we went overWEEK 1 April 5thMULTICULTURAL.docx
 
Class ProfileStudent NameEnglish Language LearnerSocio.docx
Class ProfileStudent NameEnglish Language LearnerSocio.docxClass ProfileStudent NameEnglish Language LearnerSocio.docx
Class ProfileStudent NameEnglish Language LearnerSocio.docx
 

Recently uploaded

HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxChelloAnnAsuncion2
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxsqpmdrvczh
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Mark Reed
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomnelietumpap1
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPCeline George
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designMIPLM
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 

Recently uploaded (20)

HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptxGrade 9 Q4-MELC1-Active and Passive Voice.pptx
Grade 9 Q4-MELC1-Active and Passive Voice.pptx
 
Romantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptxRomantic Opera MUSIC FOR GRADE NINE pptx
Romantic Opera MUSIC FOR GRADE NINE pptx
 
Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)Influencing policy (training slides from Fast Track Impact)
Influencing policy (training slides from Fast Track Impact)
 
Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"Rapple "Scholarly Communications and the Sustainable Development Goals"
Rapple "Scholarly Communications and the Sustainable Development Goals"
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
ENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choomENGLISH6-Q4-W3.pptxqurter our high choom
ENGLISH6-Q4-W3.pptxqurter our high choom
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdfTataKelola dan KamSiber Kecerdasan Buatan v022.pdf
TataKelola dan KamSiber Kecerdasan Buatan v022.pdf
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
How to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERPHow to do quick user assign in kanban in Odoo 17 ERP
How to do quick user assign in kanban in Odoo 17 ERP
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Keynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-designKeynote by Prof. Wurzer at Nordex about IP-design
Keynote by Prof. Wurzer at Nordex about IP-design
 
Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 

CMGT400 v7Threats, Attacks, and Vulnerability Assessment Templa.docx

  • 1. CMGT/400 v7 Threats, Attacks, and Vulnerability Assessment Template CMGT/400 v7 Page 2 of 2Security Standards, Policies, and Procedures Manual Template Instructions: Replace the information in brackets [ ] with information relevant to your project. Cyber Security Engineers are responsible for safeguarding computer networks and systems in an organization in order to protect the sensitive data they store. Take on the role of Cyber Security Engineer for the organization you chose in Week 1. Research the following information for your chosen organization. Develop a Security Standards, Policies, and Procedures Manual using this template with recommendations to management of security standards, polices, and procedures which should be implemented in your organization.[Organization Name] Overview Explain the importance to your organization of implementing security policies, plans, and procedures. Discuss how security policies, plans, and procedures will improve the overall security of the organization. [Response] Data Privacy Policies and Procedures [Response] Data Isolation Policies and Procedures [Response] Non-Disclosure Agreement (NDA) Policies and Procedures [Response]
  • 2. Intellectual Property (IP) Policies and Procedures [Response] Password Policies and Procedures [Response] Acceptable Use of Organizational Assets and Data Policies and Procedures [Response] Employee Policies and Procedures (Separation of Duties/Training) [Response] Risk Response Policies and Procedures Define avoidance, transference, mitigation, and acceptance strategies and criteria. [Response] Compliance (Regulatory, Advisory, Informative) Examples could include: HIPPA, FERPA, ISO, NIST, SEC, and Sarbanes/Oxley. [Response] Incident Response Policies and Procedures Include: Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned [Response] Auditing Policies and Procedures [Response] Environmental/Physical Policies and Procedures [Response] Administrative Policies and Procedures
  • 3. [Response] Configuration Policies and Procedures [Response] Copyright© 2018 by University of Phoenix. All rights reserved. Copyright© 2018 by University of Phoenix. All rights reserved. 3CMGT 400 Grading Rubric Individual – Week 3 Security Standards, Policies, Procedures Manual MEETS CRITERIA? Security Standards, Policies, and Procedures Manual PTs Grade COMMENTS Content (97 points) Take on the role of Cyber Security Engineer for the organization you chose in Week 1 .Develop a 5- to 6-page manual using the Security Standards, Policies, and Procedures Template with recommendations to management of security standards, polices, and procedures which should be implemented in your chosen organization. 9 Research and include the following: · Explain the importance to your organization of implementing security policies, plans, and procedures. Discuss how security policies, plans, and procedures with improve the overall security of the organization. (35pts) · Recommend appropriate policies and procedures for: (17pts) · Data privacy · Data isolation · NDA
  • 4. · IP Protection · Passwords · Acceptable use of organizational assets and data · Employee policies (separation of duties / training) · Environmental/Physical · Risk response (9) · Avoidance · Transference · Mitigation · Acceptance · Compliance examples that might affect your organization or others [Regulatory, Advisory, Informative] (9) · HIPPA · FERPA · ISO · NIST · SEC · Sarbanes/Oxley · Incident response (9) · Preparation · Identification · Containment · Eradication · Recovery · Lessons learned · Miscellaneous (9) · Auditing · Administrative · Configuration 88 X out of 97 Research
  • 5. Assignment has research depth including at least two outside relevant peer reviewed references from course material and/or the library. 10 Organization Assignment is organized appropriately covering all required topics in a logical sequence and applies the Security Standards, Policies, and Procedures Template. Title, introduction, body, conclusion and references are included in required sequence. 4 Quality and APA: Assignment projects professional, quality image, meets academic integrity requirements. Includes Power Point and MS Word document required by the assignment in APA format with label. Include title page and reference section. References in APA format. No spelling errors - the paper has obviously been proofread. Title and reference slides/pages do not count toward the length requirement. 4 TOTAL POINTS FOR RESEARCH, ORGANIZATION, QUALITY, AND APA REQUIREMENTS
  • 6. X out of 18 TOTAL POINTS (X out of 115 possible points) 04-29-19 rpg