SlideShare a Scribd company logo
1 of 9
Assignment 1: Developing the Corporate Strategy for
Information Security
Due Week 4 and worth 100 points
Imagine that you are working for a startup technology
organization that has had overnight success. The organization’s
immediate growth requires for it to formulate a corporate
strategy for information security. You have been recruited to
serve as part of a team that will develop this strategy.
As part of the Information Security Strategy development, you
are required to define specific Information Technology Security
roles that will optimize and secure the organization’s data
assets.
Review the following
Website
titled “Information Technology (IT) Security Essential Body of
Knowledge (EBK): A Competency and Functional Frame-work
for IT Security Workforce Development” for additional
information necessary to complete this assignment.
Write a five to seven (5-7) page paper in which you do the
following, based on the scenario described below:
1. The Chief Information Security Officer (CISO) is responsible
for several functions within an organization.
a. Examine three (3) specific functions a CISO and provide
examples of when a CISO would execute these functions within
the
organization.
b. Specify at least three (3) competencies that the CISO
could perform using the provided Website titled, “ Information
Technology
(IT) Security Essential Body of Knowledge (EBK): A
Competency and Functional Frame-work for IT Security
Workforce
Development.”
2. The Chief Information Officer (CIO) is responsible for
several accountability functions within an organization:
a. Identify at least four (4) functions of the CIO using the
EBK as a guide. Provide examples of how the CIO would
execute these
functions within an organization.
b. Classify at least two (2) security assurances that could be
achieved by the CIO developing a formal security awareness,
training,
and educational program.
c. Suggest methods, processes, or technologies that can be
used by the CIO to certify the security functions and data assets
of an
organization on a day-to-day basis.
3. Describe how the digital forensics function complements the
overall security efforts of the organization.
4. Evaluate the operational duties of digital forensic personnel
and how these help qualify the integrity of forensic
investigations within the enterprise and industry.
5. List at least three (3) technical resources available to the
digital forensics professional to perform forensic audits and
investigations.
6. Use at least three (3) quality resources in this assignment.
Note: Wikipedia and similar Websites do not qualify as quality
resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and references
must follow APA or school-specific format. Check with your
professor for any additional instructions.
Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
The specific course learning outcomes associated with this
assignment are:
Describe and apply the 14 areas of common practice in the
Department of Homeland Security (DHS) Essential Body of
Knowledge.
Describe best practices in cybersecurity.
Identify and analyze the role of the Chief Information Officer,
Information Security Officer, and IT Security Compliance
Officer in the context of cybersecurity.
Compare and contrast the functional roles of an organization in
the context of cybersecurity.
Describe the corollary roles of security in an enterprise.
Evaluate the ethical concerns inherent in cybersecurity and how
these concerns affect organizational policies.
Use technology and information resources to research issues in
cybersecurity.
Write clearly and concisely about topics associated with
cybersecurity using proper writing mechanics and technical
style conventions.
Grading for this assignment will be based on answer quality,
logic / organization of the paper, and language and writing
skills.
Points: 100
Assignment 1
: Developing the Corporate Strategy for Information Security
Criteria
Unacceptable
Below 60% F
Meets Minimum Expectations
60-69% D
Fair
70-79% C
Proficient
80-89% B
Exemplary
90-100% A
1a. Examine three (3) specific functions a CISO and provide
examples of when a CISO would execute these functions within
the organization.
Weight: 10%
Did not submit or incompletely examined three (3) specific
functions a CISO; did not submit or incompletely provided
examples of when a CISO would execute these functions within
the organization.
Insufficiently examined three (3) specific functions a CISO;
insufficiently provided examples of when a CISO would execute
these functions within the organization.
Partially examined three (3) specific functions a CISO; partially
provided examples of when a CISO would execute these
functions within the organization.
Satisfactorily examined three (3) specific functions a CISO;
satisfactorily provided examples of when a CISO would execute
these functions within the organization.
Thoroughly examined three (3) specific functions a CISO;
thoroughly provided examples of when a CISO would execute
these functions within the organization.
1b. Specify at least three (3) competencies that the CISO could
perform using the provided website titled, “Information
Technology (IT) Security Essential Body of Knowledge (EBK):
A Competency and Functional Frame-work for IT Security
Workforce Development.”
Weight: 10%
Did not submit or incompletely specified at least three (3)
competencies that the CISO could perform using the provided
website titled, “Information Technology (IT) Security Essential
Body of Knowledge (EBK): A Competency and Functional
Frame-work for IT Security Workforce Development.”
Insufficiently specified at least three (3) competencies that the
CISO could perform using the provided website titled,
“Information Technology (IT) Security Essential Body of
Knowledge (EBK): A Competency and Functional Frame-work
for IT Security Workforce Development.”
Partially specified at least three (3) competencies that the CISO
could perform using the provided website titled, “Information
Technology (IT) Security Essential Body of Knowledge (EBK):
A Competency and Functional Frame-work for IT Security
Workforce Development.”
Satisfactorily specified at least three (3) competencies that the
CISO could perform using the provided website titled,
“Information Technology (IT) Security Essential Body of
Knowledge (EBK): A Competency and Functional Frame-work
for IT Security Workforce Development.”
Thoroughly specified at least three (3) competencies that the
CISO could perform using the provided website titled,
“Information Technology (IT) Security Essential Body of
Knowledge (EBK): A Competency and Functional Frame-work
for IT Security Workforce Development.”
2a. Identify at least four (4) functions of the CIO using the EBK
as a guide. Provide examples of how the CIO would execute
these functions within an organization.
Weight: 10%
Did not submit or incompletely identified at least four (4)
functions of the CIO using the EBK as a guide; did not submit
or incompletely provided examples of how the CIO would
execute these functions within an organization.
Insufficiently identified at least four (4) functions of the CIO
using the EBK as a guide; insufficiently provided examples of
how the CIO would execute these functions within an
organization.
Partially identified at least four (4) functions of the CIO using
the EBK as a guide; partially provided examples of how the CIO
would execute these functions within an organization.
Satisfactorily identified at least four (4) functions of the CIO
using the EBK as a guide; satisfactorily provided examples of
how the CIO would execute these functions within an
organization.
Thoroughly identified at least four (4) functions of the CIO
using the EBK as a guide; thoroughly provided examples of how
the CIO would execute these functions within an organization.
2b. Classify at least two (2) security assurances that could be
achieved by the CIO developing a formal security awareness,
training, and educational program.
Weight: 10%
Did not submit or incompletely classified at least two (2)
security assurances that could be achieved by the CIO
developing a formal security awareness, training, and
educational program.
Insufficiently classified at least two (2) security assurances that
could be achieved by the CIO developing a formal security
awareness, training, and educational program.
Partially classified at least two (2) security assurances that
could be achieved by the CIO developing a formal security
awareness, training, and educational program.
Satisfactorily classified at least two (2) security assurances that
could be achieved by the CIO developing a formal security
awareness, training, and educational program.
Thoroughly classified at least two (2) security assurances that
could be achieved by the CIO developing a formal security
awareness, training, and educational program.
2c. Suggest methods, processes, or technologies that can be
used by the CIO to certify the security functions and data assets
of an organization on a day-to-day basis.
Weight: 10%
Did not submit or incompletely suggested methods, processes,
or technologies that can be used by the CIO to certify the
security functions and data assets of an organization on a day-
to-day basis.
Insufficiently suggested methods, processes, or technologies
that can be used by the CIO to certify the security functions and
data assets of an organization on a day-to-day basis.
Partially suggested methods, processes, or technologies that can
be used by the CIO to certify the security functions and data
assets of an organization on a day-to-day basis.
Satisfactorily suggested methods, processes, or technologies
that can be used by the CIO to certify the security functions and
data assets of an organization on a day-to-day basis.
Thoroughly suggested methods, processes, or technologies that
can be used by the CIO to certify the security functions and data
assets of an organization on a day-to-day basis.
3. Describe how the digital forensics function complements the
overall security efforts of the organization.
Weight: 10%
Did not submit or incompletely described how the digital
forensics function complements the overall security efforts of
the organization.
Insufficiently described how the digital forensics function
complements the overall security efforts of the organization.
Partially described how the digital forensics function
complements the overall security efforts of the organization.
Satisfactorily described how the digital forensics function
complements the overall security efforts of the organization.
Thoroughly described how the digital forensics function
complements the overall security efforts of the organization.
4. Evaluate the operational duties of digital forensic personnel
and how these help qualify the integrity of forensic
investigations within the enterprise and industry.
Weight: 15%
Did not submit or incompletely evaluated the operational duties
of digital forensic personnel and how these help qualify the
integrity of forensic investigations within the enterprise and
industry.
Insufficiently evaluated the operational duties of digital
forensic personnel and how these help qualify the integrity of
forensic investigations within the enterprise and industry.
Partially evaluated the operational duties of digital forensic
personnel and how these help qualify the integrity of forensic
investigations within the enterprise and industry.
Satisfactorily evaluated the operational duties of digital
forensic personnel and how these help qualify the integrity of
forensic investigations within the enterprise and industry.
Thoroughly evaluated the operational duties of digital forensic
personnel and how these help qualify the integrity of forensic
investigations within the enterprise and industry.
5. List at least three (3) technical resources available to the
digital forensics professional to perform forensic audits and
investigations.
Weight: 10%
Did not submit or incompletely listed at least three (3) technical
resources available to the digital forensics professional to
perform forensic audits and investigations.
Insufficiently listed at least three (3) technical resources
available to the digital forensics professional to perform
forensic audits and investigations.
Partially listed at least three (3) technical resources available to
the digital forensics professional to perform forensic audits and
investigations.
Satisfactorily listed at least three (3) technical resources
available to the digital forensics professional to perform
forensic audits and investigations.
Thoroughly listed at least three (3) technical resources available
to the digital forensics professional to perform forensic audits
and investigations.
6. 3 references
Weight: 5%
No references provided
Does not meet the required number of references; all references
poor quality choices.
Does not meet the required number of references; some
references poor quality choices.
Meets number of required references; all references high quality
choices.
Exceeds number of required references; all references high
quality choices.
7. Clarity, writing mechanics, and formatting requirements
Weight: 10%
More than 8 errors present
7-8 errors present
5-6 errors present
3-4 errors present
0-2 errors present

More Related Content

Similar to Assignment 1 Developing the Corporate Strategy for Information Secu.docx

Term Paper The Rookie Chief Information Security OfficerThis assi.docx
Term Paper The Rookie Chief Information Security OfficerThis assi.docxTerm Paper The Rookie Chief Information Security OfficerThis assi.docx
Term Paper The Rookie Chief Information Security OfficerThis assi.docx
jacqueliner9
 
This assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docxThis assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docx
gasciognecaren
 
The Rookie Chief Information Security OfficerThis assignment c.docx
The Rookie Chief Information Security OfficerThis assignment c.docxThe Rookie Chief Information Security OfficerThis assignment c.docx
The Rookie Chief Information Security OfficerThis assignment c.docx
oreo10
 
The Rookie Chief Information Security OfficerThis assignme
The Rookie Chief Information Security OfficerThis assignmeThe Rookie Chief Information Security OfficerThis assignme
The Rookie Chief Information Security OfficerThis assignme
jacvzpline
 
The security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docxThe security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docx
joshua2345678
 
Assignment 2 Organizational Risk Appetite and Risk AssessmentDu.docx
Assignment 2 Organizational Risk Appetite and Risk AssessmentDu.docxAssignment 2 Organizational Risk Appetite and Risk AssessmentDu.docx
Assignment 2 Organizational Risk Appetite and Risk AssessmentDu.docx
josephinepaterson7611
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
ogglili
 

Similar to Assignment 1 Developing the Corporate Strategy for Information Secu.docx (20)

Term Paper The Rookie Chief Information Security OfficerThis assi.docx
Term Paper The Rookie Chief Information Security OfficerThis assi.docxTerm Paper The Rookie Chief Information Security OfficerThis assi.docx
Term Paper The Rookie Chief Information Security OfficerThis assi.docx
 
This assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docxThis assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docx
 
The Rookie Chief Information Security OfficerThis assignment c.docx
The Rookie Chief Information Security OfficerThis assignment c.docxThe Rookie Chief Information Security OfficerThis assignment c.docx
The Rookie Chief Information Security OfficerThis assignment c.docx
 
Cis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.comCis 558 Exceptional Education-snaptutorial.com
Cis 558 Exceptional Education-snaptutorial.com
 
CIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.comCIS 558 Enhance teaching / snaptutorial.com
CIS 558 Enhance teaching / snaptutorial.com
 
Cis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.comCis 558 Education Specialist-snaptutorial.com
Cis 558 Education Specialist-snaptutorial.com
 
CIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.comCIS 558 Education Organization / snaptutorial.com
CIS 558 Education Organization / snaptutorial.com
 
Cis 558 Effective Communication-snaptutorial.com
Cis 558  Effective Communication-snaptutorial.comCis 558  Effective Communication-snaptutorial.com
Cis 558 Effective Communication-snaptutorial.com
 
CIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.comCIS 558 Success Begins / snaptutorial.com
CIS 558 Success Begins / snaptutorial.com
 
Cis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.comCis 558 Technology levels--snaptutorial.com
Cis 558 Technology levels--snaptutorial.com
 
Cis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.comCis 558 Enthusiastic Study / snaptutorial.com
Cis 558 Enthusiastic Study / snaptutorial.com
 
The Rookie Chief Information Security OfficerThis assignme
The Rookie Chief Information Security OfficerThis assignmeThe Rookie Chief Information Security OfficerThis assignme
The Rookie Chief Information Security OfficerThis assignme
 
The security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docxThe security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docx
 
Assignment 2 Organizational Risk Appetite and Risk AssessmentDu.docx
Assignment 2 Organizational Risk Appetite and Risk AssessmentDu.docxAssignment 2 Organizational Risk Appetite and Risk AssessmentDu.docx
Assignment 2 Organizational Risk Appetite and Risk AssessmentDu.docx
 
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and worCase Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
Case Study 1 Mitigating Cloud Computing RisksDue Week 4 and wor
 
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
 
CIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.comCIS 341 Success Begins / snaptutorial.com
CIS 341 Success Begins / snaptutorial.com
 
Cis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.comCis 341 Technology levels--snaptutorial.com
Cis 341 Technology levels--snaptutorial.com
 
Cis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.comCis 341 Enthusiastic Study - snaptutorial.com
Cis 341 Enthusiastic Study - snaptutorial.com
 
CIS 560 Entire Course NEW
CIS 560 Entire Course NEWCIS 560 Entire Course NEW
CIS 560 Entire Course NEW
 

More from murgatroydcrista

Assignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docx
Assignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docxAssignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docx
Assignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docx
murgatroydcrista
 
Assignment 1 LASA 2 Your State v. MarkMark Davis has been char.docx
Assignment 1 LASA 2 Your State v. MarkMark Davis has been char.docxAssignment 1 LASA 2 Your State v. MarkMark Davis has been char.docx
Assignment 1 LASA 2 Your State v. MarkMark Davis has been char.docx
murgatroydcrista
 
Assignment 1 LASA 2 Policy, Lawsuits, and the Mitigation PlanI.docx
Assignment 1 LASA 2 Policy, Lawsuits, and the Mitigation PlanI.docxAssignment 1 LASA 2 Policy, Lawsuits, and the Mitigation PlanI.docx
Assignment 1 LASA 2 Policy, Lawsuits, and the Mitigation PlanI.docx
murgatroydcrista
 
Assignment 1 LASA 2 Setting Minds at EaseHeres What Happened . .docx
Assignment 1 LASA 2 Setting Minds at EaseHeres What Happened . .docxAssignment 1 LASA 2 Setting Minds at EaseHeres What Happened . .docx
Assignment 1 LASA 2 Setting Minds at EaseHeres What Happened . .docx
murgatroydcrista
 
Assignment 1 LASA 2 Parole SupervisionHeres What HappenedMar.docx
Assignment 1 LASA 2 Parole SupervisionHeres What HappenedMar.docxAssignment 1 LASA 2 Parole SupervisionHeres What HappenedMar.docx
Assignment 1 LASA 2 Parole SupervisionHeres What HappenedMar.docx
murgatroydcrista
 
Assignment 1 LASA 2 Monitoring Our Home PlanetThe Internet is a .docx
Assignment 1 LASA 2 Monitoring Our Home PlanetThe Internet is a .docxAssignment 1 LASA 2 Monitoring Our Home PlanetThe Internet is a .docx
Assignment 1 LASA 2 Monitoring Our Home PlanetThe Internet is a .docx
murgatroydcrista
 
Assignment 1 Human Sexuality Throughout History Time-lineThe text.docx
Assignment 1 Human Sexuality Throughout History Time-lineThe text.docxAssignment 1 Human Sexuality Throughout History Time-lineThe text.docx
Assignment 1 Human Sexuality Throughout History Time-lineThe text.docx
murgatroydcrista
 
Assignment 1 Implications of Health Economic Concepts for Health Ca.docx
Assignment 1 Implications of Health Economic Concepts for Health Ca.docxAssignment 1 Implications of Health Economic Concepts for Health Ca.docx
Assignment 1 Implications of Health Economic Concepts for Health Ca.docx
murgatroydcrista
 
Assignment 1 Historical Transitioning and Growth of the U.S. Health.docx
Assignment 1 Historical Transitioning and Growth of the U.S. Health.docxAssignment 1 Historical Transitioning and Growth of the U.S. Health.docx
Assignment 1 Historical Transitioning and Growth of the U.S. Health.docx
murgatroydcrista
 
Assignment 1 Historical PerspectiveDue Week 3 and worth 150 point.docx
Assignment 1 Historical PerspectiveDue Week 3 and worth 150 point.docxAssignment 1 Historical PerspectiveDue Week 3 and worth 150 point.docx
Assignment 1 Historical PerspectiveDue Week 3 and worth 150 point.docx
murgatroydcrista
 
Assignment 1 Financial Statement AnalysisDue Week 4 and worth 200.docx
Assignment 1 Financial Statement AnalysisDue Week 4 and worth 200.docxAssignment 1 Financial Statement AnalysisDue Week 4 and worth 200.docx
Assignment 1 Financial Statement AnalysisDue Week 4 and worth 200.docx
murgatroydcrista
 
Assignment 1 Essay – Exploring Ancient MysteriesDue Week 4 and wo.docx
Assignment 1 Essay – Exploring Ancient MysteriesDue Week 4 and wo.docxAssignment 1 Essay – Exploring Ancient MysteriesDue Week 4 and wo.docx
Assignment 1 Essay – Exploring Ancient MysteriesDue Week 4 and wo.docx
murgatroydcrista
 
Assignment 1 Essay Due Week 2 and worth 100 points  Choose one (1.docx
Assignment 1 Essay Due Week 2 and worth 100 points  Choose one (1.docxAssignment 1 Essay Due Week 2 and worth 100 points  Choose one (1.docx
Assignment 1 Essay Due Week 2 and worth 100 points  Choose one (1.docx
murgatroydcrista
 
Assignment 1 Essay Due Week 4 and worth 100 pointsChoose one (1.docx
Assignment 1 Essay Due Week 4 and worth 100 pointsChoose one (1.docxAssignment 1 Essay Due Week 4 and worth 100 pointsChoose one (1.docx
Assignment 1 Essay Due Week 4 and worth 100 pointsChoose one (1.docx
murgatroydcrista
 
Assignment 1 Discussion—Multifaceted Assessment Anne M.docx
Assignment 1 Discussion—Multifaceted Assessment Anne M.docxAssignment 1 Discussion—Multifaceted Assessment Anne M.docx
Assignment 1 Discussion—Multifaceted Assessment Anne M.docx
murgatroydcrista
 
Assignment 1 Discussion—Environmental FactorsIn this assignment, .docx
Assignment 1 Discussion—Environmental FactorsIn this assignment, .docxAssignment 1 Discussion—Environmental FactorsIn this assignment, .docx
Assignment 1 Discussion—Environmental FactorsIn this assignment, .docx
murgatroydcrista
 
Assignment 1 Discussion—Emerging IT TrendsInformation technology .docx
Assignment 1 Discussion—Emerging IT TrendsInformation technology .docxAssignment 1 Discussion—Emerging IT TrendsInformation technology .docx
Assignment 1 Discussion—Emerging IT TrendsInformation technology .docx
murgatroydcrista
 
Assignment 1 Discussion—Cultural Differences Kayin’s CaseProfess.docx
Assignment 1 Discussion—Cultural Differences Kayin’s CaseProfess.docxAssignment 1 Discussion—Cultural Differences Kayin’s CaseProfess.docx
Assignment 1 Discussion—Cultural Differences Kayin’s CaseProfess.docx
murgatroydcrista
 
Assignment 1 Discussion—Developing TrustCommunicating ethically t.docx
Assignment 1 Discussion—Developing TrustCommunicating ethically t.docxAssignment 1 Discussion—Developing TrustCommunicating ethically t.docx
Assignment 1 Discussion—Developing TrustCommunicating ethically t.docx
murgatroydcrista
 

More from murgatroydcrista (20)

Assignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docx
Assignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docxAssignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docx
Assignment 1 LASA 2—Exceptionality PresentationIn this course, yo.docx
 
Assignment 1 LASA 2 Your State v. MarkMark Davis has been char.docx
Assignment 1 LASA 2 Your State v. MarkMark Davis has been char.docxAssignment 1 LASA 2 Your State v. MarkMark Davis has been char.docx
Assignment 1 LASA 2 Your State v. MarkMark Davis has been char.docx
 
Assignment 1 LASA 2 Policy, Lawsuits, and the Mitigation PlanI.docx
Assignment 1 LASA 2 Policy, Lawsuits, and the Mitigation PlanI.docxAssignment 1 LASA 2 Policy, Lawsuits, and the Mitigation PlanI.docx
Assignment 1 LASA 2 Policy, Lawsuits, and the Mitigation PlanI.docx
 
Assignment 1 LASA 2 Setting Minds at EaseHeres What Happened . .docx
Assignment 1 LASA 2 Setting Minds at EaseHeres What Happened . .docxAssignment 1 LASA 2 Setting Minds at EaseHeres What Happened . .docx
Assignment 1 LASA 2 Setting Minds at EaseHeres What Happened . .docx
 
Assignment 1 LASA 2 Parole SupervisionHeres What HappenedMar.docx
Assignment 1 LASA 2 Parole SupervisionHeres What HappenedMar.docxAssignment 1 LASA 2 Parole SupervisionHeres What HappenedMar.docx
Assignment 1 LASA 2 Parole SupervisionHeres What HappenedMar.docx
 
Assignment 1 LASA 2 Monitoring Our Home PlanetThe Internet is a .docx
Assignment 1 LASA 2 Monitoring Our Home PlanetThe Internet is a .docxAssignment 1 LASA 2 Monitoring Our Home PlanetThe Internet is a .docx
Assignment 1 LASA 2 Monitoring Our Home PlanetThe Internet is a .docx
 
Assignment 1 Human Sexuality Throughout History Time-lineThe text.docx
Assignment 1 Human Sexuality Throughout History Time-lineThe text.docxAssignment 1 Human Sexuality Throughout History Time-lineThe text.docx
Assignment 1 Human Sexuality Throughout History Time-lineThe text.docx
 
Assignment 1 Implications of Health Economic Concepts for Health Ca.docx
Assignment 1 Implications of Health Economic Concepts for Health Ca.docxAssignment 1 Implications of Health Economic Concepts for Health Ca.docx
Assignment 1 Implications of Health Economic Concepts for Health Ca.docx
 
Assignment 1 Historical Transitioning and Growth of the U.S. Health.docx
Assignment 1 Historical Transitioning and Growth of the U.S. Health.docxAssignment 1 Historical Transitioning and Growth of the U.S. Health.docx
Assignment 1 Historical Transitioning and Growth of the U.S. Health.docx
 
Assignment 1 Historical PerspectiveDue Week 3 and worth 150 point.docx
Assignment 1 Historical PerspectiveDue Week 3 and worth 150 point.docxAssignment 1 Historical PerspectiveDue Week 3 and worth 150 point.docx
Assignment 1 Historical PerspectiveDue Week 3 and worth 150 point.docx
 
Assignment 1 Financial Statement AnalysisDue Week 4 and worth 200.docx
Assignment 1 Financial Statement AnalysisDue Week 4 and worth 200.docxAssignment 1 Financial Statement AnalysisDue Week 4 and worth 200.docx
Assignment 1 Financial Statement AnalysisDue Week 4 and worth 200.docx
 
Assignment 1 Essay – Exploring Ancient MysteriesDue Week 4 and wo.docx
Assignment 1 Essay – Exploring Ancient MysteriesDue Week 4 and wo.docxAssignment 1 Essay – Exploring Ancient MysteriesDue Week 4 and wo.docx
Assignment 1 Essay – Exploring Ancient MysteriesDue Week 4 and wo.docx
 
Assignment 1 DyslexiaBy Saturday, May 30, 2015, submit your.docx
Assignment 1 DyslexiaBy Saturday, May 30, 2015, submit your.docxAssignment 1 DyslexiaBy Saturday, May 30, 2015, submit your.docx
Assignment 1 DyslexiaBy Saturday, May 30, 2015, submit your.docx
 
Assignment 1 Essay Due Week 2 and worth 100 points  Choose one (1.docx
Assignment 1 Essay Due Week 2 and worth 100 points  Choose one (1.docxAssignment 1 Essay Due Week 2 and worth 100 points  Choose one (1.docx
Assignment 1 Essay Due Week 2 and worth 100 points  Choose one (1.docx
 
Assignment 1 Essay Due Week 4 and worth 100 pointsChoose one (1.docx
Assignment 1 Essay Due Week 4 and worth 100 pointsChoose one (1.docxAssignment 1 Essay Due Week 4 and worth 100 pointsChoose one (1.docx
Assignment 1 Essay Due Week 4 and worth 100 pointsChoose one (1.docx
 
Assignment 1 Discussion—Multifaceted Assessment Anne M.docx
Assignment 1 Discussion—Multifaceted Assessment Anne M.docxAssignment 1 Discussion—Multifaceted Assessment Anne M.docx
Assignment 1 Discussion—Multifaceted Assessment Anne M.docx
 
Assignment 1 Discussion—Environmental FactorsIn this assignment, .docx
Assignment 1 Discussion—Environmental FactorsIn this assignment, .docxAssignment 1 Discussion—Environmental FactorsIn this assignment, .docx
Assignment 1 Discussion—Environmental FactorsIn this assignment, .docx
 
Assignment 1 Discussion—Emerging IT TrendsInformation technology .docx
Assignment 1 Discussion—Emerging IT TrendsInformation technology .docxAssignment 1 Discussion—Emerging IT TrendsInformation technology .docx
Assignment 1 Discussion—Emerging IT TrendsInformation technology .docx
 
Assignment 1 Discussion—Cultural Differences Kayin’s CaseProfess.docx
Assignment 1 Discussion—Cultural Differences Kayin’s CaseProfess.docxAssignment 1 Discussion—Cultural Differences Kayin’s CaseProfess.docx
Assignment 1 Discussion—Cultural Differences Kayin’s CaseProfess.docx
 
Assignment 1 Discussion—Developing TrustCommunicating ethically t.docx
Assignment 1 Discussion—Developing TrustCommunicating ethically t.docxAssignment 1 Discussion—Developing TrustCommunicating ethically t.docx
Assignment 1 Discussion—Developing TrustCommunicating ethically t.docx
 

Recently uploaded

MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MysoreMuleSoftMeetup
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
EADTU
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
EADTU
 

Recently uploaded (20)

MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
MuleSoft Integration with AWS Textract | Calling AWS Textract API |AWS - Clou...
 
OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...OS-operating systems- ch05 (CPU Scheduling) ...
OS-operating systems- ch05 (CPU Scheduling) ...
 
How to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptxHow to Manage Website in Odoo 17 Studio App.pptx
How to Manage Website in Odoo 17 Studio App.pptx
 
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjjStl Algorithms in C++ jjjjjjjjjjjjjjjjjj
Stl Algorithms in C++ jjjjjjjjjjjjjjjjjj
 
OSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & SystemsOSCM Unit 2_Operations Processes & Systems
OSCM Unit 2_Operations Processes & Systems
 
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
TỔNG HỢP HƠN 100 ĐỀ THI THỬ TỐT NGHIỆP THPT TOÁN 2024 - TỪ CÁC TRƯỜNG, TRƯỜNG...
 
8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management8 Tips for Effective Working Capital Management
8 Tips for Effective Working Capital Management
 
Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"Mattingly "AI & Prompt Design: Named Entity Recognition"
Mattingly "AI & Prompt Design: Named Entity Recognition"
 
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptxCOMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
COMMUNICATING NEGATIVE NEWS - APPROACHES .pptx
 
Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...Andreas Schleicher presents at the launch of What does child empowerment mean...
Andreas Schleicher presents at the launch of What does child empowerment mean...
 
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
Transparency, Recognition and the role of eSealing - Ildiko Mazar and Koen No...
 
Graduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptxGraduate Outcomes Presentation Slides - English (v3).pptx
Graduate Outcomes Presentation Slides - English (v3).pptx
 
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUMDEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
DEMONSTRATION LESSON IN ENGLISH 4 MATATAG CURRICULUM
 
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)ESSENTIAL of (CS/IT/IS) class 07 (Networks)
ESSENTIAL of (CS/IT/IS) class 07 (Networks)
 
male presentation...pdf.................
male presentation...pdf.................male presentation...pdf.................
male presentation...pdf.................
 
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of TransportBasic Civil Engineering notes on Transportation Engineering & Modes of Transport
Basic Civil Engineering notes on Transportation Engineering & Modes of Transport
 
e-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopale-Sealing at EADTU by Kamakshi Rajagopal
e-Sealing at EADTU by Kamakshi Rajagopal
 
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes GuàrdiaPersonalisation of Education by AI and Big Data - Lourdes Guàrdia
Personalisation of Education by AI and Big Data - Lourdes Guàrdia
 
Supporting Newcomer Multilingual Learners
Supporting Newcomer  Multilingual LearnersSupporting Newcomer  Multilingual Learners
Supporting Newcomer Multilingual Learners
 
The Liver & Gallbladder (Anatomy & Physiology).pptx
The Liver &  Gallbladder (Anatomy & Physiology).pptxThe Liver &  Gallbladder (Anatomy & Physiology).pptx
The Liver & Gallbladder (Anatomy & Physiology).pptx
 

Assignment 1 Developing the Corporate Strategy for Information Secu.docx

  • 1. Assignment 1: Developing the Corporate Strategy for Information Security Due Week 4 and worth 100 points Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy. As part of the Information Security Strategy development, you are required to define specific Information Technology Security roles that will optimize and secure the organization’s data assets. Review the following Website titled “Information Technology (IT) Security Essential Body of Knowledge (EBK): A Competency and Functional Frame-work for IT Security Workforce Development” for additional information necessary to complete this assignment. Write a five to seven (5-7) page paper in which you do the following, based on the scenario described below: 1. The Chief Information Security Officer (CISO) is responsible for several functions within an organization. a. Examine three (3) specific functions a CISO and provide examples of when a CISO would execute these functions within the organization. b. Specify at least three (3) competencies that the CISO could perform using the provided Website titled, “ Information Technology (IT) Security Essential Body of Knowledge (EBK): A Competency and Functional Frame-work for IT Security Workforce Development.”
  • 2. 2. The Chief Information Officer (CIO) is responsible for several accountability functions within an organization: a. Identify at least four (4) functions of the CIO using the EBK as a guide. Provide examples of how the CIO would execute these functions within an organization. b. Classify at least two (2) security assurances that could be achieved by the CIO developing a formal security awareness, training, and educational program. c. Suggest methods, processes, or technologies that can be used by the CIO to certify the security functions and data assets of an organization on a day-to-day basis. 3. Describe how the digital forensics function complements the overall security efforts of the organization. 4. Evaluate the operational duties of digital forensic personnel and how these help qualify the integrity of forensic investigations within the enterprise and industry. 5. List at least three (3) technical resources available to the digital forensics professional to perform forensic audits and investigations. 6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are:
  • 3. Describe and apply the 14 areas of common practice in the Department of Homeland Security (DHS) Essential Body of Knowledge. Describe best practices in cybersecurity. Identify and analyze the role of the Chief Information Officer, Information Security Officer, and IT Security Compliance Officer in the context of cybersecurity. Compare and contrast the functional roles of an organization in the context of cybersecurity. Describe the corollary roles of security in an enterprise. Evaluate the ethical concerns inherent in cybersecurity and how these concerns affect organizational policies. Use technology and information resources to research issues in cybersecurity. Write clearly and concisely about topics associated with cybersecurity using proper writing mechanics and technical style conventions. Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills. Points: 100 Assignment 1 : Developing the Corporate Strategy for Information Security Criteria Unacceptable Below 60% F Meets Minimum Expectations 60-69% D Fair 70-79% C Proficient 80-89% B
  • 4. Exemplary 90-100% A 1a. Examine three (3) specific functions a CISO and provide examples of when a CISO would execute these functions within the organization. Weight: 10% Did not submit or incompletely examined three (3) specific functions a CISO; did not submit or incompletely provided examples of when a CISO would execute these functions within the organization. Insufficiently examined three (3) specific functions a CISO; insufficiently provided examples of when a CISO would execute these functions within the organization. Partially examined three (3) specific functions a CISO; partially provided examples of when a CISO would execute these functions within the organization. Satisfactorily examined three (3) specific functions a CISO; satisfactorily provided examples of when a CISO would execute these functions within the organization. Thoroughly examined three (3) specific functions a CISO; thoroughly provided examples of when a CISO would execute these functions within the organization. 1b. Specify at least three (3) competencies that the CISO could perform using the provided website titled, “Information Technology (IT) Security Essential Body of Knowledge (EBK): A Competency and Functional Frame-work for IT Security Workforce Development.” Weight: 10% Did not submit or incompletely specified at least three (3) competencies that the CISO could perform using the provided website titled, “Information Technology (IT) Security Essential Body of Knowledge (EBK): A Competency and Functional Frame-work for IT Security Workforce Development.” Insufficiently specified at least three (3) competencies that the CISO could perform using the provided website titled,
  • 5. “Information Technology (IT) Security Essential Body of Knowledge (EBK): A Competency and Functional Frame-work for IT Security Workforce Development.” Partially specified at least three (3) competencies that the CISO could perform using the provided website titled, “Information Technology (IT) Security Essential Body of Knowledge (EBK): A Competency and Functional Frame-work for IT Security Workforce Development.” Satisfactorily specified at least three (3) competencies that the CISO could perform using the provided website titled, “Information Technology (IT) Security Essential Body of Knowledge (EBK): A Competency and Functional Frame-work for IT Security Workforce Development.” Thoroughly specified at least three (3) competencies that the CISO could perform using the provided website titled, “Information Technology (IT) Security Essential Body of Knowledge (EBK): A Competency and Functional Frame-work for IT Security Workforce Development.” 2a. Identify at least four (4) functions of the CIO using the EBK as a guide. Provide examples of how the CIO would execute these functions within an organization. Weight: 10% Did not submit or incompletely identified at least four (4) functions of the CIO using the EBK as a guide; did not submit or incompletely provided examples of how the CIO would execute these functions within an organization. Insufficiently identified at least four (4) functions of the CIO using the EBK as a guide; insufficiently provided examples of how the CIO would execute these functions within an organization. Partially identified at least four (4) functions of the CIO using the EBK as a guide; partially provided examples of how the CIO would execute these functions within an organization. Satisfactorily identified at least four (4) functions of the CIO using the EBK as a guide; satisfactorily provided examples of how the CIO would execute these functions within an
  • 6. organization. Thoroughly identified at least four (4) functions of the CIO using the EBK as a guide; thoroughly provided examples of how the CIO would execute these functions within an organization. 2b. Classify at least two (2) security assurances that could be achieved by the CIO developing a formal security awareness, training, and educational program. Weight: 10% Did not submit or incompletely classified at least two (2) security assurances that could be achieved by the CIO developing a formal security awareness, training, and educational program. Insufficiently classified at least two (2) security assurances that could be achieved by the CIO developing a formal security awareness, training, and educational program. Partially classified at least two (2) security assurances that could be achieved by the CIO developing a formal security awareness, training, and educational program. Satisfactorily classified at least two (2) security assurances that could be achieved by the CIO developing a formal security awareness, training, and educational program. Thoroughly classified at least two (2) security assurances that could be achieved by the CIO developing a formal security awareness, training, and educational program. 2c. Suggest methods, processes, or technologies that can be used by the CIO to certify the security functions and data assets of an organization on a day-to-day basis. Weight: 10% Did not submit or incompletely suggested methods, processes, or technologies that can be used by the CIO to certify the security functions and data assets of an organization on a day- to-day basis. Insufficiently suggested methods, processes, or technologies that can be used by the CIO to certify the security functions and data assets of an organization on a day-to-day basis. Partially suggested methods, processes, or technologies that can
  • 7. be used by the CIO to certify the security functions and data assets of an organization on a day-to-day basis. Satisfactorily suggested methods, processes, or technologies that can be used by the CIO to certify the security functions and data assets of an organization on a day-to-day basis. Thoroughly suggested methods, processes, or technologies that can be used by the CIO to certify the security functions and data assets of an organization on a day-to-day basis. 3. Describe how the digital forensics function complements the overall security efforts of the organization. Weight: 10% Did not submit or incompletely described how the digital forensics function complements the overall security efforts of the organization. Insufficiently described how the digital forensics function complements the overall security efforts of the organization. Partially described how the digital forensics function complements the overall security efforts of the organization. Satisfactorily described how the digital forensics function complements the overall security efforts of the organization. Thoroughly described how the digital forensics function complements the overall security efforts of the organization. 4. Evaluate the operational duties of digital forensic personnel and how these help qualify the integrity of forensic investigations within the enterprise and industry. Weight: 15% Did not submit or incompletely evaluated the operational duties of digital forensic personnel and how these help qualify the integrity of forensic investigations within the enterprise and industry. Insufficiently evaluated the operational duties of digital forensic personnel and how these help qualify the integrity of forensic investigations within the enterprise and industry. Partially evaluated the operational duties of digital forensic personnel and how these help qualify the integrity of forensic investigations within the enterprise and industry.
  • 8. Satisfactorily evaluated the operational duties of digital forensic personnel and how these help qualify the integrity of forensic investigations within the enterprise and industry. Thoroughly evaluated the operational duties of digital forensic personnel and how these help qualify the integrity of forensic investigations within the enterprise and industry. 5. List at least three (3) technical resources available to the digital forensics professional to perform forensic audits and investigations. Weight: 10% Did not submit or incompletely listed at least three (3) technical resources available to the digital forensics professional to perform forensic audits and investigations. Insufficiently listed at least three (3) technical resources available to the digital forensics professional to perform forensic audits and investigations. Partially listed at least three (3) technical resources available to the digital forensics professional to perform forensic audits and investigations. Satisfactorily listed at least three (3) technical resources available to the digital forensics professional to perform forensic audits and investigations. Thoroughly listed at least three (3) technical resources available to the digital forensics professional to perform forensic audits and investigations. 6. 3 references Weight: 5% No references provided Does not meet the required number of references; all references poor quality choices. Does not meet the required number of references; some references poor quality choices. Meets number of required references; all references high quality choices. Exceeds number of required references; all references high quality choices.
  • 9. 7. Clarity, writing mechanics, and formatting requirements Weight: 10% More than 8 errors present 7-8 errors present 5-6 errors present 3-4 errors present 0-2 errors present