SlideShare a Scribd company logo
1 of 13
1
Running head: IDENTITY MANAGEMENT AND SECURITY
AWARENESS TRAINING PLAN STRATEGY
Identity management and security awareness training plan
strategy 4
Identity management and security awareness training plan
strategy
Student’s name
Institutional affiliation
Security Plan for the Organization
A good security awareness training in IT puts focus on problems
that are broader, that do not give themselves to only technology
solutions (Long, 2010). The training can be split into two main
groups; one, the general security training is suitable for the
entire employees despite their work role. Two, the group
specific training in security centers on specific skills which are
significant to only a section of the organization.
General Security Training:
1. Procedures and policies education.
2. Information on the person to be contacted when an employee
thinks that she or he has recognized a security risk or threat.
3. Rules for handling information that is confidential.
Group specific training:
1. Regarding the IT operations employees: There should be
training in business continuity and disaster recovery planning
(Willemssen, 2000).
2. Concerning development organization: Training for design,
architecture or coding should be performed.
3. For the staff of finance in the organization, training in fraud
detection should be offered.
In conclusion, a security awareness training program that is
properly implemented does not only give the Human Resource
department with documentation that is necessary for following
actions against the staff who disrespect security practices, but
also minimizes the amount of penalizing actions (Webel, 2004).
References
Long, J. (2010). Global information security factors.
International Journal of Information Security and Privacy
(IJISP), 4(2), 49-60.
Webel, B. (2004). The Economic Impact of Cyber-Attacks.
Congressional Research Service, Government and Finance
Division. Washington DC: The Library of Congress.
Willemssen, J. (2000). "FAA Computer Security". GAO/T-
AIMD-00-330. Presented at Committee on Science, House of
Representatives.
Running head: FORENSICS AND CSIRT 1
SECURITY PLAN 5
Forensics and CSIRT
Name
Institution
SECURITY PLAN
Abstract.
CSIRT, commonly known as a Computer Security Incident
Response Team, refers to an organization mandated with the
responsibility of reviewing, receiving and correction of security
incidence related to computers for governments, Corporate and
religious institutions or even paid clients(Stein, 2009). This
paper shows the forensics and CSIRT plan strategy for the
organization.
Introduction.
Network administrators are given the responsibility to maintain
computer networks. Security is an important requirement in the
organizations systems, as these have an impact on day to day
activities. Unauthorized access to organizations critical
information is detrimental to its operations and could be used to
cause the failure of the organization as a whole.
Basic risk assessment
The main risk facing the organization is the risk of access to
organizations records and sensitive data by unauthorized
persons. Confidentiality in information systems enables the
limited access to documents and information. This is always
ensured by the use of identification cards or passwords. The
main methods of attack used are hacking and use of an insider
in the organization. Main assets to be destroyed by unauthorized
users are organizational data and destruction of organization
copyrights and patents(Davis, 2011).
Proactive Security planning.
The organizations network administrator should therefor e
ensures that known vulnerabilities are patched on hosts on a
network that has no connection to any external network. This
strategy enables detection of anything that may interfere with
the smooth running of the network systems and control frequent
system breakdowns. Policies to ensure that the organizations
security system is effective include the use of passwords and
strict administrative policies to ensure all the personnel are
careful on information dissemination.
The floor plan of the target environment
Threats facing the organization, apart from unauthorized access
into the organization system are such as cyber-attacks and the
risk of losing funds to cyber criminals. These risks are both
detrimental to the organization and should be looked into to
ensure the continued profitability of the enterprise(Collen, G
and Erika M, 2012). Current gaps include; untrustworthy
employees and lack of skills to effect policies to protect the
organizations security system. These vulnerability gaps should
be looked into in order to affect necessary policies.
Emergency plans shouldbe put in place for both bomb threats
and fire risks. In the case of bomb threats, organization
personnel should be trained on the required response under such
circumstances. In the case of a fire, extinguishers should be
place in all strategic areas in the organization for higher safety
levels. Files should be consistently backed up to ensure their
ease in retrieval in case they are lost due to misplacements of
theft in the organization. Monitoring the implementation of the
security plan is critical to ensure all activities are well
implemented and put into practice to achieve desired results.
Conclusion
Organization security is the most important element to ensure
that the data, assets and critical areas in the organization are
well protected and monitored. Finances should be set aside to
ensure this area is not neglected and that the correct
implementation of laid out plans is facilitated effectively and
efficiently.
References
Colleen Garton & Erika McCulloch. (2012). Fundamentals of
Technology Project Management. Chicago: MC Press.
Davis, G. (2011). IPad & iPhone administrator's guide:
enterprise deployment strategies and security solutions. New
York: McGraw-Hill.
Stein, R. J. (2009). Internet safety. New York: H.W. Wilson Co.
Running Head: ENTERPRISE RISK ASSESSMENT, AUDIT
AND CYBER LAW 1
ENTERPRISE RISK ASSESMENT, AUDIT AND CYBER LAW
3
Enterprise Risk Assessment, Audit
Student’s Name
Institutional Affiliation
ENTERPRISE RISK ASSESMENT, AUDIT AND CYBER LAW
Introduction
The main aim of any security plan is to eliminate the threats of
external malfeasance which always comes in the form of
information theft, hacking and other nefarious activities which
are custom made to hinder an organization’s continuous growth.
Any organization that involves itself in business, whether local
or international must find a way of preserving its wide-ranging
digital records so that they can achieve 100% data protection
(Colleen Garton & Erika McCulloch 2012).
The proactive security plan involves the development of
security policies and controls, types of security policies and
password policies and administrative responsibilities. Also there
is a provision for emergency plan in case disasters like
terrorism attacks or fire strike. These emergency plan will
prevent data loss in case these events take place. Technologies
to keep the security plan working in the event of failure include
the monitor implementation, performing off-site data back-up
and storage and back-up laptops and desktops (Davis, 2011).
The field of modern information security lay emphasis on a
multilayered approach to maintaining system integrity,
comprising the use of firewalls, cryptographic algorithms,
access regulations and other protection procedures, but giving
rise to effective blockages to deliver physical security which is
always the main priority of the enterprise risk assessment plan
(Stein, 2009).
References
Colleen Garton & Erika McCulloch. (2012). Fundamentals of
Technology Project Management. Chicago: MC Press.
Davis, G. (2011). IPad & iPhone administrator's guide:
enterprise deployment strategies and security solutions. New
York: McGraw-Hill.
Stein, R. J. (2009). Internet safety. New York: H.W. Wilson Co.
Running Head: BUSINESS CONTINUITY AND DISASTER
RECOVERY PLAN 1
BUSINESS CONTINUITY AND DISASTER RECOVERY
PLAN 3
Business Continuity and Disaster Recovery Plan Strategy
Student’s Name
Institutional Affiliation
BUSINESS CONTINUITY AND DISASTER RECOVERY
PLAN STRATEGY
Introduction
A disaster recovery plan is a documented procedure to recover
and protect IT infrastructure in the event of disaster. There are
different types of disasters which can be categorized into two,
that is, natural and man-made disasters. The organization
heavily relies on information technology to run its operations
and therefore, this disaster recovery plan will increasingly be
connected with the recovery of IT systems data, assets and
facilities (Stein, 2009).
Emergency plan and disaster response
The plan should involve the following procedures, preventive
measures, detective measures and corrective measures. The
preventive measures are a set of documented procedures to
circumvent any man-made threat to the IT systems through the
internet. Issues like hacking and threat of destruction through
natural disasters. This is done by cloud back-up where
information will be stored and nothing will be able to destroy it
there (Davis, 2011).
The corrective measure in case data is lost and it was backed up
in the cloud will be restoring it. This involves a series of
procedures that IT technicians can perform and authentication
from various organization stakeholders to authorize such an
operation. Back up will prevent the organization from not
operating in case disasters strike.
Detective measures are suitable to detect any threat that’s
impending to destroy the data. A detective measure could be
fire alarms and smoke detectors which will detect fire. The
corrective measure here will be the installation of fire
sprinklers and the triggering of the fire alarm to alert the fire
fighter (Colleen Garton & Erika McCulloch, 2012).
References
Colleen Garton & Erika McCulloch. (2012). Fundamentals of
Technology Project Management. Chicago: MC Press.
Davis, G. (2011). IPad & iPhone administrator's guide:
enterprise deployment strategies and security solutions. New
York: McGraw-Hill.
Stein, R. J. (2009). Internet safety. New York: H.W. Wilson Co.
Running Head: SECURITY PLAN
1
SECURITY PLAN
4
Enterprise Technical Infrastructure Security Plan
for the Organization
Name
Institution
Enterprise Technical Infrastructure Security Plan
for the Organization
Computer security focuses on the protection and privatization of
their systems and this can be found in two types: Logical
security that focuses on the protection of content and
information and physical security as applied to computers such
as the attack is not strictly the software and hardware and IT
infrastructure is fundamental to the preservation of the most
valuable asset share is information, also seeks to maintain the
confidentiality, integrity, authenticity, and availability are the
remembering data symbols representing events, situations,
conditions or information is the result of processing or
transforming data information is meaningful to the user.
Therefore, we must consider, from a formal point of view, those
factors that can ensure the continuity of a company in adverse
circumstances. This process involves the following steps:
· Scoping Phase 0: If your company has a certain organizational
or process complexity, addressing a process of continuous
improvement may involve a number of resources and an
excessive period. It is therefore advisable to start by those
departments or areas with greater importance and gradually
increase progressively continuity throughout the
organization. To do this always with the commitment and
involvement of management.
· Phase 1. Analysis of the organization: During this phase we
collect all the information needed to establish critical business
processes, assets that support them and what are the temporal
needs and resources.
· Phase 2. Determination of continuity strategy: Known assets
that support critical processes, we must determine whether
disaster, we will be able to recover such assets in the required
time. In cases where it does not, we must determine the various
recovery strategies.
· Phase 3. Development of a contingency response: From chosen
recovery strategies, selection and implementation of the
necessary steps is performed, and Crisis Plan and the relevant
documents for retrieval environments is documented.
· Phase 4. Testing, maintenance and review: From the
technological infrastructure of our company, develop test plans
and maintenance.
· Phase 5. Awareness: In addition to analysis and
implementation, it is necessary that both the technical staff
responsible for our company know what is and assumes the
Business Continuity Plan and what is expected of them.
References
Colleen Garton & Erika McCulloch. (2012). Fundamentals of
Technology Project Management. Chicago: MC Press.
Davis, G. (2011). IPad & iPhone administrator's guide:
enterprise deployment strategies and security solutions. New
York: McGraw-Hill.
Stein, R. J. (2009). Internet safety. New York: H.W. Wilson Co.
Running head: IMPLEMENTING IT SECURITY
MANAGEMENT
1
IMPLEMENTING IT SECURITY MANAGEMENT
2
Implementing IT security management
Student’s Name
University Affiliation
Proposal for implementing IT security management
In the past years, nearly all organizations have increased their
dependency on suitable secure information systems. Security
being one of the most issues that are argued about, Standards
for managing the information security and collection of the best
practice measures should be developed and established (Wood,
1999). Security concerns in information systems typically arise
from authentication and access control which include issues of
physical access as well as credential and identity management.
Virtualization is also another issue of concern as it comes with
a number of risks. The shared use of computing resources is
also another security concern.
The IT security management will come in to solve all these
problems as it will offer security controls for the users. The
system will manage the diverse data. The security management
will also offer privacy for all the data by ensuring that the right
data is viewed by the appropriate personnel. By the system
being used by many users, the risks of security will also be
high. By the fact that the network is shared, various access
controls and authentication methods will be required and this is
where the security management will come in to offer the access
controls and authentication methods for the users.
In order for organizations to function efficiently and
effectively, they need to identify and manage many activities
one of them being the issue of security. Any activity that is
using resources will require to be managed properly in order to
enable a safe transformation of inputs into outputs using
interrelated activities (Wilson, Mark, & Joan, 2004). The
security management is designed to offer information security
and risk assessment which is the overall process of risk
evaluation and risk analysis. It will also provide information
security risk treatment which involves the selection and
implementation of measures in order to modify risks. Controls
will now be determined in this stage.
References
Wilson, Mark, &Joan, H. (2004). “National Institute of
Standards and technology special
publication: building information technology security awareness
and training program.
Wood, C. (1999). Information security policies made easy.
Sausalito, CA: Baseline software,
Inc.
Running Head: SECURITY PLAN
1
SECURITY PLAN
3
SECURITY PLAN
I. Abstract
II. Introduction
III. Basic risk assessment
· Overview
· Identification of assets
· Identifying the types of threats and method of attack
IV. Proactive Security planning
· Overview and planning
· Development of security policies and controls
· Types of security policies
· Password policies and administrative responsibilities.
v. The floor plan of the target environment
· · A list of threats
· · A risk assessment for each threat
· · Current vulnerability gaps
Vi Emergency plan and disaster response for the following:
o Bomb threat
o Fire
vi. Backup and restore policies
vii. Technologies to keep the security plan working in the event
of failure
· Monitor implementation
· Perform off-site data back-up and storage
· Back-up laptops and desktops
viii. Conclusion
References
Colleen Garton & Erika McCulloch. (2012). Fundamentals of
Technology Project Management. Chicago: MC Press.
Davis, G. (2011). IPad & iPhone administrator's guide:
enterprise deployment strategies and security solutions. New
York: McGraw-Hill.
Stein, R. J. (2009). Internet safety. New York: H.W. Wilson Co.

More Related Content

Similar to 1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx

Risk Management
Risk ManagementRisk Management
Risk Managementijtsrd
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practiceswacasr
 
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
Presentation(group j)implementing  trustworthy computing by Sundas IlyasPresentation(group j)implementing  trustworthy computing by Sundas Ilyas
Presentation(group j)implementing trustworthy computing by Sundas IlyasSundas Kayani
 
Best Open Threat Management Platform in USA
Best Open Threat Management Platform in USABest Open Threat Management Platform in USA
Best Open Threat Management Platform in USACompanySeceon
 
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...Jacqueline Fick
 
Vskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills
 
Protection and defense against sensitive data leakage problem within organiza...
Protection and defense against sensitive data leakage problem within organiza...Protection and defense against sensitive data leakage problem within organiza...
Protection and defense against sensitive data leakage problem within organiza...Alexander Decker
 
Protection and defense against sensitive data leakage problem within organiza...
Protection and defense against sensitive data leakage problem within organiza...Protection and defense against sensitive data leakage problem within organiza...
Protection and defense against sensitive data leakage problem within organiza...Alexander Decker
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligenceseadeloitte
 
Information Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and ProspectInformation Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and ProspectIOSR Journals
 
An information security governance framework
An information security governance frameworkAn information security governance framework
An information security governance frameworkAnne ndolo
 
System Security Threats and Risks)
System Security Threats and Risks)System Security Threats and Risks)
System Security Threats and Risks)BPalmer13
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & StrategyTony Hauxwell
 
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...IJNSA Journal
 
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdfInsider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdfEnterprise Insider
 
Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10Deepa Devadas
 
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docx
Running Head STATEMENT OF WORKSTATEMENT OF WORK                .docxRunning Head STATEMENT OF WORKSTATEMENT OF WORK                .docx
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docxtoltonkendal
 

Similar to 1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx (20)

Risk Management
Risk ManagementRisk Management
Risk Management
 
Challenges in implementing effective data security practices
Challenges in implementing effective data security practicesChallenges in implementing effective data security practices
Challenges in implementing effective data security practices
 
Computer security
Computer securityComputer security
Computer security
 
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
Presentation(group j)implementing  trustworthy computing by Sundas IlyasPresentation(group j)implementing  trustworthy computing by Sundas Ilyas
Presentation(group j)implementing trustworthy computing by Sundas Ilyas
 
Best Open Threat Management Platform in USA
Best Open Threat Management Platform in USABest Open Threat Management Platform in USA
Best Open Threat Management Platform in USA
 
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...Prevention Is Better Than Prosecution:  Deepening the defence against cyber c...
Prevention Is Better Than Prosecution: Deepening the defence against cyber c...
 
Vskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample MaterialVskills Certified Network Security Professional Sample Material
Vskills Certified Network Security Professional Sample Material
 
Protection and defense against sensitive data leakage problem within organiza...
Protection and defense against sensitive data leakage problem within organiza...Protection and defense against sensitive data leakage problem within organiza...
Protection and defense against sensitive data leakage problem within organiza...
 
Protection and defense against sensitive data leakage problem within organiza...
Protection and defense against sensitive data leakage problem within organiza...Protection and defense against sensitive data leakage problem within organiza...
Protection and defense against sensitive data leakage problem within organiza...
 
Cyber Threat Intelligence
Cyber Threat IntelligenceCyber Threat Intelligence
Cyber Threat Intelligence
 
Information Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and ProspectInformation Security Management System: Emerging Issues and Prospect
Information Security Management System: Emerging Issues and Prospect
 
Bis Chapter15
Bis Chapter15Bis Chapter15
Bis Chapter15
 
An information security governance framework
An information security governance frameworkAn information security governance framework
An information security governance framework
 
System Security Threats and Risks)
System Security Threats and Risks)System Security Threats and Risks)
System Security Threats and Risks)
 
I0516064
I0516064I0516064
I0516064
 
Information Systems Security & Strategy
Information Systems Security & StrategyInformation Systems Security & Strategy
Information Systems Security & Strategy
 
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
NON-PROFIT ORGANIZATIONS’ NEED TO ADDRESS SECURITY FOR EFFECTIVE GOVERNMENT C...
 
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdfInsider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
Insider Threats_ Top Four Ways to Protect Enterprises - ITSecurityWire.pdf
 
Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10Gp2 Public Policy Assign8 644 Sp10
Gp2 Public Policy Assign8 644 Sp10
 
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docx
Running Head STATEMENT OF WORKSTATEMENT OF WORK                .docxRunning Head STATEMENT OF WORKSTATEMENT OF WORK                .docx
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docx
 

More from eugeniadean34240

I need a 7 pg research essay on the following   Select a real o.docx
I need a 7 pg research essay on the following   Select a real o.docxI need a 7 pg research essay on the following   Select a real o.docx
I need a 7 pg research essay on the following   Select a real o.docxeugeniadean34240
 
I need a 4-5 APA formatted paper with references that is clearly wri.docx
I need a 4-5 APA formatted paper with references that is clearly wri.docxI need a 4-5 APA formatted paper with references that is clearly wri.docx
I need a 4-5 APA formatted paper with references that is clearly wri.docxeugeniadean34240
 
I need a 3 page research paper on Title  Addictive being youn.docx
I need a 3 page research paper on Title  Addictive being youn.docxI need a 3 page research paper on Title  Addictive being youn.docx
I need a 3 page research paper on Title  Addictive being youn.docxeugeniadean34240
 
I need a 3 page double-spaced 12-point paper on Immunotherapy. the i.docx
I need a 3 page double-spaced 12-point paper on Immunotherapy. the i.docxI need a 3 page double-spaced 12-point paper on Immunotherapy. the i.docx
I need a 3 page double-spaced 12-point paper on Immunotherapy. the i.docxeugeniadean34240
 
I need a 2500 word essay on the 1st Battalion 7th Cavalry Regiment. .docx
I need a 2500 word essay on the 1st Battalion 7th Cavalry Regiment. .docxI need a 2500 word essay on the 1st Battalion 7th Cavalry Regiment. .docx
I need a 2500 word essay on the 1st Battalion 7th Cavalry Regiment. .docxeugeniadean34240
 
I need a 200-word paper that answers the following questions:D.docx
I need a 200-word paper that answers the following questions:D.docxI need a 200-word paper that answers the following questions:D.docx
I need a 200-word paper that answers the following questions:D.docxeugeniadean34240
 
i need a 2 page essay on LA crimes as it pertains to Rape you will h.docx
i need a 2 page essay on LA crimes as it pertains to Rape you will h.docxi need a 2 page essay on LA crimes as it pertains to Rape you will h.docx
i need a 2 page essay on LA crimes as it pertains to Rape you will h.docxeugeniadean34240
 
I need a 1 page professional bio. My cover letter and resume i.docx
I need a 1 page professional bio. My cover letter and resume i.docxI need a 1 page professional bio. My cover letter and resume i.docx
I need a 1 page professional bio. My cover letter and resume i.docxeugeniadean34240
 
I need 100 words response for this two discussion forum1 discu.docx
I need 100 words response for this two discussion forum1 discu.docxI need 100 words response for this two discussion forum1 discu.docx
I need 100 words response for this two discussion forum1 discu.docxeugeniadean34240
 
I need 200 words response for each discussion post.Guided Respon.docx
I need 200 words response for each discussion post.Guided Respon.docxI need 200 words response for each discussion post.Guided Respon.docx
I need 200 words response for each discussion post.Guided Respon.docxeugeniadean34240
 
I need 3 pages discussion for an intersection (Attached image).docx
I need 3 pages discussion for an intersection (Attached image).docxI need 3 pages discussion for an intersection (Attached image).docx
I need 3 pages discussion for an intersection (Attached image).docxeugeniadean34240
 
I need 1page write up on Hypothesis & Methods Proposal,Due on .docx
I need 1page write up on Hypothesis & Methods Proposal,Due on .docxI need 1page write up on Hypothesis & Methods Proposal,Due on .docx
I need 1page write up on Hypothesis & Methods Proposal,Due on .docxeugeniadean34240
 
I need 2-3 pages written about the sieve of Eratosthenes. Starti.docx
I need 2-3 pages written about the sieve of Eratosthenes. Starti.docxI need 2-3 pages written about the sieve of Eratosthenes. Starti.docx
I need 2-3 pages written about the sieve of Eratosthenes. Starti.docxeugeniadean34240
 
I need 120 words for each question. Please ensure to post individual.docx
I need 120 words for each question. Please ensure to post individual.docxI need 120 words for each question. Please ensure to post individual.docx
I need 120 words for each question. Please ensure to post individual.docxeugeniadean34240
 
I need 10-12 slides Presentation with detailed speaker notes. Instru.docx
I need 10-12 slides Presentation with detailed speaker notes. Instru.docxI need 10-12 slides Presentation with detailed speaker notes. Instru.docx
I need 10-12 slides Presentation with detailed speaker notes. Instru.docxeugeniadean34240
 
I N N O V A T I O N N E T W O R K , I N C . www.innone.docx
I N N O V A T I O N  N E T W O R K ,  I N C .   www.innone.docxI N N O V A T I O N  N E T W O R K ,  I N C .   www.innone.docx
I N N O V A T I O N N E T W O R K , I N C . www.innone.docxeugeniadean34240
 
I like to tie my learning to Biblical Principles. On Virtuous Le.docx
I like to tie my learning to Biblical Principles. On Virtuous Le.docxI like to tie my learning to Biblical Principles. On Virtuous Le.docx
I like to tie my learning to Biblical Principles. On Virtuous Le.docxeugeniadean34240
 
I just want one paragraph.!!C.W.Mills described ‘sociological im.docx
I just want one paragraph.!!C.W.Mills described ‘sociological im.docxI just want one paragraph.!!C.W.Mills described ‘sociological im.docx
I just want one paragraph.!!C.W.Mills described ‘sociological im.docxeugeniadean34240
 
i just need serious help answering the question. I have answered mos.docx
i just need serious help answering the question. I have answered mos.docxi just need serious help answering the question. I have answered mos.docx
i just need serious help answering the question. I have answered mos.docxeugeniadean34240
 
I Headnotes and indexes are copyrighted and may not be duplica.docx
I Headnotes and indexes are copyrighted and may not be duplica.docxI Headnotes and indexes are copyrighted and may not be duplica.docx
I Headnotes and indexes are copyrighted and may not be duplica.docxeugeniadean34240
 

More from eugeniadean34240 (20)

I need a 7 pg research essay on the following   Select a real o.docx
I need a 7 pg research essay on the following   Select a real o.docxI need a 7 pg research essay on the following   Select a real o.docx
I need a 7 pg research essay on the following   Select a real o.docx
 
I need a 4-5 APA formatted paper with references that is clearly wri.docx
I need a 4-5 APA formatted paper with references that is clearly wri.docxI need a 4-5 APA formatted paper with references that is clearly wri.docx
I need a 4-5 APA formatted paper with references that is clearly wri.docx
 
I need a 3 page research paper on Title  Addictive being youn.docx
I need a 3 page research paper on Title  Addictive being youn.docxI need a 3 page research paper on Title  Addictive being youn.docx
I need a 3 page research paper on Title  Addictive being youn.docx
 
I need a 3 page double-spaced 12-point paper on Immunotherapy. the i.docx
I need a 3 page double-spaced 12-point paper on Immunotherapy. the i.docxI need a 3 page double-spaced 12-point paper on Immunotherapy. the i.docx
I need a 3 page double-spaced 12-point paper on Immunotherapy. the i.docx
 
I need a 2500 word essay on the 1st Battalion 7th Cavalry Regiment. .docx
I need a 2500 word essay on the 1st Battalion 7th Cavalry Regiment. .docxI need a 2500 word essay on the 1st Battalion 7th Cavalry Regiment. .docx
I need a 2500 word essay on the 1st Battalion 7th Cavalry Regiment. .docx
 
I need a 200-word paper that answers the following questions:D.docx
I need a 200-word paper that answers the following questions:D.docxI need a 200-word paper that answers the following questions:D.docx
I need a 200-word paper that answers the following questions:D.docx
 
i need a 2 page essay on LA crimes as it pertains to Rape you will h.docx
i need a 2 page essay on LA crimes as it pertains to Rape you will h.docxi need a 2 page essay on LA crimes as it pertains to Rape you will h.docx
i need a 2 page essay on LA crimes as it pertains to Rape you will h.docx
 
I need a 1 page professional bio. My cover letter and resume i.docx
I need a 1 page professional bio. My cover letter and resume i.docxI need a 1 page professional bio. My cover letter and resume i.docx
I need a 1 page professional bio. My cover letter and resume i.docx
 
I need 100 words response for this two discussion forum1 discu.docx
I need 100 words response for this two discussion forum1 discu.docxI need 100 words response for this two discussion forum1 discu.docx
I need 100 words response for this two discussion forum1 discu.docx
 
I need 200 words response for each discussion post.Guided Respon.docx
I need 200 words response for each discussion post.Guided Respon.docxI need 200 words response for each discussion post.Guided Respon.docx
I need 200 words response for each discussion post.Guided Respon.docx
 
I need 3 pages discussion for an intersection (Attached image).docx
I need 3 pages discussion for an intersection (Attached image).docxI need 3 pages discussion for an intersection (Attached image).docx
I need 3 pages discussion for an intersection (Attached image).docx
 
I need 1page write up on Hypothesis & Methods Proposal,Due on .docx
I need 1page write up on Hypothesis & Methods Proposal,Due on .docxI need 1page write up on Hypothesis & Methods Proposal,Due on .docx
I need 1page write up on Hypothesis & Methods Proposal,Due on .docx
 
I need 2-3 pages written about the sieve of Eratosthenes. Starti.docx
I need 2-3 pages written about the sieve of Eratosthenes. Starti.docxI need 2-3 pages written about the sieve of Eratosthenes. Starti.docx
I need 2-3 pages written about the sieve of Eratosthenes. Starti.docx
 
I need 120 words for each question. Please ensure to post individual.docx
I need 120 words for each question. Please ensure to post individual.docxI need 120 words for each question. Please ensure to post individual.docx
I need 120 words for each question. Please ensure to post individual.docx
 
I need 10-12 slides Presentation with detailed speaker notes. Instru.docx
I need 10-12 slides Presentation with detailed speaker notes. Instru.docxI need 10-12 slides Presentation with detailed speaker notes. Instru.docx
I need 10-12 slides Presentation with detailed speaker notes. Instru.docx
 
I N N O V A T I O N N E T W O R K , I N C . www.innone.docx
I N N O V A T I O N  N E T W O R K ,  I N C .   www.innone.docxI N N O V A T I O N  N E T W O R K ,  I N C .   www.innone.docx
I N N O V A T I O N N E T W O R K , I N C . www.innone.docx
 
I like to tie my learning to Biblical Principles. On Virtuous Le.docx
I like to tie my learning to Biblical Principles. On Virtuous Le.docxI like to tie my learning to Biblical Principles. On Virtuous Le.docx
I like to tie my learning to Biblical Principles. On Virtuous Le.docx
 
I just want one paragraph.!!C.W.Mills described ‘sociological im.docx
I just want one paragraph.!!C.W.Mills described ‘sociological im.docxI just want one paragraph.!!C.W.Mills described ‘sociological im.docx
I just want one paragraph.!!C.W.Mills described ‘sociological im.docx
 
i just need serious help answering the question. I have answered mos.docx
i just need serious help answering the question. I have answered mos.docxi just need serious help answering the question. I have answered mos.docx
i just need serious help answering the question. I have answered mos.docx
 
I Headnotes and indexes are copyrighted and may not be duplica.docx
I Headnotes and indexes are copyrighted and may not be duplica.docxI Headnotes and indexes are copyrighted and may not be duplica.docx
I Headnotes and indexes are copyrighted and may not be duplica.docx
 

Recently uploaded

Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...jaredbarbolino94
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxthorishapillay1
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxmanuelaromero2013
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfMahmoud M. Sallam
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,Virag Sontakke
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 

Recently uploaded (20)

Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...Historical philosophical, theoretical, and legal foundations of special and i...
Historical philosophical, theoretical, and legal foundations of special and i...
 
Proudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptxProudly South Africa powerpoint Thorisha.pptx
Proudly South Africa powerpoint Thorisha.pptx
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
How to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptxHow to Make a Pirate ship Primary Education.pptx
How to Make a Pirate ship Primary Education.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Pharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdfPharmacognosy Flower 3. Compositae 2023.pdf
Pharmacognosy Flower 3. Compositae 2023.pdf
 
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Bikash Puri  Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Bikash Puri Delhi reach out to us at 🔝9953056974🔝
 
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
Model Call Girl in Tilak Nagar Delhi reach out to us at 🔝9953056974🔝
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,भारत-रोम व्यापार.pptx, Indo-Roman Trade,
भारत-रोम व्यापार.pptx, Indo-Roman Trade,
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 

1Running head IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAI.docx

  • 1. 1 Running head: IDENTITY MANAGEMENT AND SECURITY AWARENESS TRAINING PLAN STRATEGY Identity management and security awareness training plan strategy 4 Identity management and security awareness training plan strategy Student’s name Institutional affiliation Security Plan for the Organization A good security awareness training in IT puts focus on problems that are broader, that do not give themselves to only technology solutions (Long, 2010). The training can be split into two main groups; one, the general security training is suitable for the entire employees despite their work role. Two, the group specific training in security centers on specific skills which are significant to only a section of the organization. General Security Training: 1. Procedures and policies education. 2. Information on the person to be contacted when an employee thinks that she or he has recognized a security risk or threat. 3. Rules for handling information that is confidential. Group specific training: 1. Regarding the IT operations employees: There should be
  • 2. training in business continuity and disaster recovery planning (Willemssen, 2000). 2. Concerning development organization: Training for design, architecture or coding should be performed. 3. For the staff of finance in the organization, training in fraud detection should be offered. In conclusion, a security awareness training program that is properly implemented does not only give the Human Resource department with documentation that is necessary for following actions against the staff who disrespect security practices, but also minimizes the amount of penalizing actions (Webel, 2004). References Long, J. (2010). Global information security factors. International Journal of Information Security and Privacy (IJISP), 4(2), 49-60. Webel, B. (2004). The Economic Impact of Cyber-Attacks. Congressional Research Service, Government and Finance Division. Washington DC: The Library of Congress. Willemssen, J. (2000). "FAA Computer Security". GAO/T- AIMD-00-330. Presented at Committee on Science, House of Representatives. Running head: FORENSICS AND CSIRT 1 SECURITY PLAN 5
  • 3. Forensics and CSIRT Name Institution SECURITY PLAN Abstract. CSIRT, commonly known as a Computer Security Incident Response Team, refers to an organization mandated with the responsibility of reviewing, receiving and correction of security incidence related to computers for governments, Corporate and religious institutions or even paid clients(Stein, 2009). This paper shows the forensics and CSIRT plan strategy for the organization. Introduction. Network administrators are given the responsibility to maintain computer networks. Security is an important requirement in the organizations systems, as these have an impact on day to day activities. Unauthorized access to organizations critical information is detrimental to its operations and could be used to cause the failure of the organization as a whole. Basic risk assessment The main risk facing the organization is the risk of access to organizations records and sensitive data by unauthorized persons. Confidentiality in information systems enables the limited access to documents and information. This is always ensured by the use of identification cards or passwords. The main methods of attack used are hacking and use of an insider in the organization. Main assets to be destroyed by unauthorized users are organizational data and destruction of organization copyrights and patents(Davis, 2011). Proactive Security planning.
  • 4. The organizations network administrator should therefor e ensures that known vulnerabilities are patched on hosts on a network that has no connection to any external network. This strategy enables detection of anything that may interfere with the smooth running of the network systems and control frequent system breakdowns. Policies to ensure that the organizations security system is effective include the use of passwords and strict administrative policies to ensure all the personnel are careful on information dissemination. The floor plan of the target environment Threats facing the organization, apart from unauthorized access into the organization system are such as cyber-attacks and the risk of losing funds to cyber criminals. These risks are both detrimental to the organization and should be looked into to ensure the continued profitability of the enterprise(Collen, G and Erika M, 2012). Current gaps include; untrustworthy employees and lack of skills to effect policies to protect the organizations security system. These vulnerability gaps should be looked into in order to affect necessary policies. Emergency plans shouldbe put in place for both bomb threats and fire risks. In the case of bomb threats, organization personnel should be trained on the required response under such circumstances. In the case of a fire, extinguishers should be place in all strategic areas in the organization for higher safety levels. Files should be consistently backed up to ensure their ease in retrieval in case they are lost due to misplacements of theft in the organization. Monitoring the implementation of the security plan is critical to ensure all activities are well implemented and put into practice to achieve desired results. Conclusion Organization security is the most important element to ensure that the data, assets and critical areas in the organization are well protected and monitored. Finances should be set aside to ensure this area is not neglected and that the correct implementation of laid out plans is facilitated effectively and efficiently.
  • 5. References Colleen Garton & Erika McCulloch. (2012). Fundamentals of Technology Project Management. Chicago: MC Press. Davis, G. (2011). IPad & iPhone administrator's guide: enterprise deployment strategies and security solutions. New York: McGraw-Hill. Stein, R. J. (2009). Internet safety. New York: H.W. Wilson Co. Running Head: ENTERPRISE RISK ASSESSMENT, AUDIT AND CYBER LAW 1 ENTERPRISE RISK ASSESMENT, AUDIT AND CYBER LAW 3
  • 6. Enterprise Risk Assessment, Audit Student’s Name Institutional Affiliation ENTERPRISE RISK ASSESMENT, AUDIT AND CYBER LAW Introduction The main aim of any security plan is to eliminate the threats of external malfeasance which always comes in the form of information theft, hacking and other nefarious activities which are custom made to hinder an organization’s continuous growth. Any organization that involves itself in business, whether local or international must find a way of preserving its wide-ranging digital records so that they can achieve 100% data protection (Colleen Garton & Erika McCulloch 2012). The proactive security plan involves the development of security policies and controls, types of security policies and password policies and administrative responsibilities. Also there is a provision for emergency plan in case disasters like terrorism attacks or fire strike. These emergency plan will prevent data loss in case these events take place. Technologies to keep the security plan working in the event of failure include the monitor implementation, performing off-site data back-up and storage and back-up laptops and desktops (Davis, 2011). The field of modern information security lay emphasis on a multilayered approach to maintaining system integrity, comprising the use of firewalls, cryptographic algorithms, access regulations and other protection procedures, but giving rise to effective blockages to deliver physical security which is always the main priority of the enterprise risk assessment plan (Stein, 2009).
  • 7. References Colleen Garton & Erika McCulloch. (2012). Fundamentals of Technology Project Management. Chicago: MC Press. Davis, G. (2011). IPad & iPhone administrator's guide: enterprise deployment strategies and security solutions. New York: McGraw-Hill. Stein, R. J. (2009). Internet safety. New York: H.W. Wilson Co. Running Head: BUSINESS CONTINUITY AND DISASTER RECOVERY PLAN 1 BUSINESS CONTINUITY AND DISASTER RECOVERY PLAN 3 Business Continuity and Disaster Recovery Plan Strategy Student’s Name Institutional Affiliation BUSINESS CONTINUITY AND DISASTER RECOVERY PLAN STRATEGY Introduction A disaster recovery plan is a documented procedure to recover and protect IT infrastructure in the event of disaster. There are different types of disasters which can be categorized into two,
  • 8. that is, natural and man-made disasters. The organization heavily relies on information technology to run its operations and therefore, this disaster recovery plan will increasingly be connected with the recovery of IT systems data, assets and facilities (Stein, 2009). Emergency plan and disaster response The plan should involve the following procedures, preventive measures, detective measures and corrective measures. The preventive measures are a set of documented procedures to circumvent any man-made threat to the IT systems through the internet. Issues like hacking and threat of destruction through natural disasters. This is done by cloud back-up where information will be stored and nothing will be able to destroy it there (Davis, 2011). The corrective measure in case data is lost and it was backed up in the cloud will be restoring it. This involves a series of procedures that IT technicians can perform and authentication from various organization stakeholders to authorize such an operation. Back up will prevent the organization from not operating in case disasters strike. Detective measures are suitable to detect any threat that’s impending to destroy the data. A detective measure could be fire alarms and smoke detectors which will detect fire. The corrective measure here will be the installation of fire sprinklers and the triggering of the fire alarm to alert the fire fighter (Colleen Garton & Erika McCulloch, 2012). References Colleen Garton & Erika McCulloch. (2012). Fundamentals of Technology Project Management. Chicago: MC Press. Davis, G. (2011). IPad & iPhone administrator's guide: enterprise deployment strategies and security solutions. New York: McGraw-Hill. Stein, R. J. (2009). Internet safety. New York: H.W. Wilson Co.
  • 9. Running Head: SECURITY PLAN 1 SECURITY PLAN 4 Enterprise Technical Infrastructure Security Plan for the Organization Name Institution Enterprise Technical Infrastructure Security Plan for the Organization Computer security focuses on the protection and privatization of their systems and this can be found in two types: Logical security that focuses on the protection of content and information and physical security as applied to computers such as the attack is not strictly the software and hardware and IT infrastructure is fundamental to the preservation of the most valuable asset share is information, also seeks to maintain the confidentiality, integrity, authenticity, and availability are the remembering data symbols representing events, situations, conditions or information is the result of processing or transforming data information is meaningful to the user. Therefore, we must consider, from a formal point of view, those factors that can ensure the continuity of a company in adverse circumstances. This process involves the following steps: · Scoping Phase 0: If your company has a certain organizational or process complexity, addressing a process of continuous improvement may involve a number of resources and an excessive period. It is therefore advisable to start by those departments or areas with greater importance and gradually increase progressively continuity throughout the organization. To do this always with the commitment and involvement of management.
  • 10. · Phase 1. Analysis of the organization: During this phase we collect all the information needed to establish critical business processes, assets that support them and what are the temporal needs and resources. · Phase 2. Determination of continuity strategy: Known assets that support critical processes, we must determine whether disaster, we will be able to recover such assets in the required time. In cases where it does not, we must determine the various recovery strategies. · Phase 3. Development of a contingency response: From chosen recovery strategies, selection and implementation of the necessary steps is performed, and Crisis Plan and the relevant documents for retrieval environments is documented. · Phase 4. Testing, maintenance and review: From the technological infrastructure of our company, develop test plans and maintenance. · Phase 5. Awareness: In addition to analysis and implementation, it is necessary that both the technical staff responsible for our company know what is and assumes the Business Continuity Plan and what is expected of them. References Colleen Garton & Erika McCulloch. (2012). Fundamentals of Technology Project Management. Chicago: MC Press. Davis, G. (2011). IPad & iPhone administrator's guide: enterprise deployment strategies and security solutions. New York: McGraw-Hill. Stein, R. J. (2009). Internet safety. New York: H.W. Wilson Co. Running head: IMPLEMENTING IT SECURITY MANAGEMENT 1
  • 11. IMPLEMENTING IT SECURITY MANAGEMENT 2 Implementing IT security management Student’s Name University Affiliation Proposal for implementing IT security management In the past years, nearly all organizations have increased their dependency on suitable secure information systems. Security being one of the most issues that are argued about, Standards for managing the information security and collection of the best practice measures should be developed and established (Wood, 1999). Security concerns in information systems typically arise from authentication and access control which include issues of physical access as well as credential and identity management. Virtualization is also another issue of concern as it comes with a number of risks. The shared use of computing resources is also another security concern. The IT security management will come in to solve all these problems as it will offer security controls for the users. The system will manage the diverse data. The security management will also offer privacy for all the data by ensuring that the right data is viewed by the appropriate personnel. By the system being used by many users, the risks of security will also be high. By the fact that the network is shared, various access controls and authentication methods will be required and this is where the security management will come in to offer the access controls and authentication methods for the users. In order for organizations to function efficiently and effectively, they need to identify and manage many activities one of them being the issue of security. Any activity that is using resources will require to be managed properly in order to enable a safe transformation of inputs into outputs using
  • 12. interrelated activities (Wilson, Mark, & Joan, 2004). The security management is designed to offer information security and risk assessment which is the overall process of risk evaluation and risk analysis. It will also provide information security risk treatment which involves the selection and implementation of measures in order to modify risks. Controls will now be determined in this stage. References Wilson, Mark, &Joan, H. (2004). “National Institute of Standards and technology special publication: building information technology security awareness and training program. Wood, C. (1999). Information security policies made easy. Sausalito, CA: Baseline software, Inc. Running Head: SECURITY PLAN 1 SECURITY PLAN 3 SECURITY PLAN I. Abstract II. Introduction III. Basic risk assessment · Overview · Identification of assets · Identifying the types of threats and method of attack
  • 13. IV. Proactive Security planning · Overview and planning · Development of security policies and controls · Types of security policies · Password policies and administrative responsibilities. v. The floor plan of the target environment · · A list of threats · · A risk assessment for each threat · · Current vulnerability gaps Vi Emergency plan and disaster response for the following: o Bomb threat o Fire vi. Backup and restore policies vii. Technologies to keep the security plan working in the event of failure · Monitor implementation · Perform off-site data back-up and storage · Back-up laptops and desktops viii. Conclusion References Colleen Garton & Erika McCulloch. (2012). Fundamentals of Technology Project Management. Chicago: MC Press. Davis, G. (2011). IPad & iPhone administrator's guide: enterprise deployment strategies and security solutions. New York: McGraw-Hill. Stein, R. J. (2009). Internet safety. New York: H.W. Wilson Co.