SlideShare a Scribd company logo
Project 7 - Organization Security Plan
Choose an organization from the choices provided and prepare a
security plan that provides security awareness policy using a
security policy framework outline and according the Critical
Infrastructure document which concentrates on the following
integral keywords to cover the necessary elements of an
organization security plan. These are:
Identify, Protect, Detect, Respond, and Recover
. The plan is a capstone of the work that you have accomplished
in this course. You will use your outline to guide the outcome
of the plan in addition to the keywords. The plan is an
enterprise policy that includes the following considerations,
analysis approach, and protections for the enterprise:
·
Identify
threats and vulnerabilities.
·
Assign appropriate security controls to
protect
the infrastructure of the organization.
·
Prepare vulnerability scans and effective risk management
protocols to ensure protections remain current and effective
and
detect
any issues.
·
Initiate an incident response plan for
respond
ing to problems.
·
Develop a business continuity and disaster recovery plan to
recover
from interruptions in business whether manmade or
geographical.
This plan must be completed and submitted in MS Word format.
Choose from one of the organizations below or request approval
from your instructor via email for an alternate organization:
·
Department of Defense
·
Department of Homeland Security
·
General Dynamics Information Technology
·
JC Penney’s Corporate Office
·
University of Maryland
·
ITT Technical Institute
·
United States Marine Corp
From the Critical Infrastructure document
, align your organizational plan to reflect the intent of the
document as follows from an excerpt taken from the document
and ensure you read the document in its entirety:
“The Framework complements, and does not replace, an
organization’s risk management and cybersecurity program. The
organization can use its current processes and leverage the
Framework to identify opportunities to strengthen and
communicate its management of cybersecurity risk while
aligning with industry practices. Alternatively, an organization
without an existing cybersecurity program can use the
Framework as a reference to establish one.
Just as the Framework is not industry-specific, the common
taxonomy of standards, guidelines, and practices that it provides
also is not country-specific. Organizations outside the United
States may also use the Framework to strengthen their own
cybersecurity efforts, and the Framework can contribute to
developing a common language for international cooperation on
critical infrastructure cybersecurity.”
1.1 Overview of the Framework
The Framework is a risk-based approach to managing
cybersecurity risk, and is composed of three parts: the
Framework Core, the Framework Implementation Tiers, and the
Framework Profiles. Each Framework component reinforces the
connection between business drivers and cybersecurity
activities. These components are explained below.
The
Framework Core
is a set of cybersecurity activities, desired outcomes, and
applicable references that are common across critical
infrastructure sectors. The Core presents industry standards,
guidelines, and practices in a manner that allows for
communication of cybersecurity activities and outcomes across
the organization from the executive level to the
implementation/operations level. The Framework Core consists
of five concurrent and continuous Functions—
Identify, Protect, Detect, Respond, Recover
. When considered together, these Functions provide a high-
level, strategic view of the lifecycle of an organization’s
management of cybersecurity risk. The Framework Core then
identifies underlying key Categories and Subcategories for each
Function, and matches them with example Informative
References such as existing standards, guidelines, and practices
for each Subcategory.
Framework Implementation Tiers
(“Tiers”) provide context on how an organization views
cybersecurity risk and the processes in place to manage that
risk. Tiers describe the degree to which an organization’s
cybersecurity risk management practices exhibit the
characteristics defined in the Framework (e.g., risk and threat
aware, repeatable, and adaptive). The Tiers characterize an
organization’s practices over a range, from Partial (Tier 1) to
Adaptive (Tier 4). These Tiers reflect a progression from
informal, reactive responses to approaches that are agile and
risk-informed. During the Tier selection process, an
organization should consider its current risk management
practices, threat environment, legal and regulatory
requirements, business/mission objectives, and organizational
constraints.
A
Framework Profile
(“Profile”) represents the outcomes based on business needs
that an organization has selected from the Framework
Categories and Subcategories. The Profile can be characterized
as the alignment of standards, guidelines, and practices to the
Framework Core in a particular implementation scenario.
Profiles can be used to identify opportunities for improving
cybersecurity posture by comparing a “Current” Profile (the “as
is” state) with a “Target” Profile (the “to be” state). To develop
a Profile, an organization can review all of the Categories and
Subcategories and, based on business drivers and a risk
assessment, determine which are most important; they can add
Categories and Subcategories as needed to address the
organization’s risks. The Current Profile can then be used to
support prioritization and measurement of progress toward the
Target Profile, while factoring in other business needs including
cost-effectiveness and innovation. Profiles can be used to
conduct self-assessments and communicate within an
organization or between organizations.
1.2 Risk Management and the Cybersecurity Framework
Risk management is the ongoing process of identifying,
assessing, and responding to risk. To manage risk, organizations
should understand the likelihood that an event will occur and
the resulting impact. With this information, organizations can
determine the acceptable level of risk for delivery of services
and can express this as their risk tolerance.
With an understanding of risk tolerance, organizations can
prioritize cybersecurity activities, enabling organizations to
make informed decisions about cybersecurity expenditures.
Implementation of risk management programs offers
organizations the ability to quantify and communicate
adjustments to their cybersecurity programs. Organizations may
choose to handle risk in different ways, including mitigating the
risk, transferring the risk, avoiding the risk, or accepting the
risk, depending on the potential impact to the delivery of
critical services.
The Framework uses risk management processes to enable
organizations to inform and prioritize decisions regarding
cybersecurity. It supports recurring risk assessments and
validation of business drivers to help organizations select target
states for cybersecurity activities that reflect desired outcomes.
Thus, the Framework gives organizations the ability to
dynamically select and direct improvement in cybersecurity risk
management for the IT and ICS environments.”
Your organization plan must be a comprehensive approach
identifying the framework for enabling organizations to
establish cybersecurity policy in the enterprise. Submit to your
assignment folder by the due date assigned in your syllabus
schedule.

More Related Content

Similar to Project 7 - Organization Security PlanChoose an organization fro.docx

Happiest Minds NIST CSF compliance Brochure
Happiest Minds NIST  CSF compliance BrochureHappiest Minds NIST  CSF compliance Brochure
Happiest Minds NIST CSF compliance Brochure
Suresh Kanniappan
 
STRATEGIC RISK ADVISORY SOLUTIONS_Risk Management_Newsletter
STRATEGIC RISK ADVISORY SOLUTIONS_Risk Management_NewsletterSTRATEGIC RISK ADVISORY SOLUTIONS_Risk Management_Newsletter
STRATEGIC RISK ADVISORY SOLUTIONS_Risk Management_NewsletterDion K Hamilton
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
harsh arora
 
Information Security Maturity Model
Information Security Maturity ModelInformation Security Maturity Model
Information Security Maturity Model
CSCJournals
 
NIST to CSF to ISO or EC 27002 2022 with NIST
NIST to CSF to ISO or EC 27002 2022 with NISTNIST to CSF to ISO or EC 27002 2022 with NIST
NIST to CSF to ISO or EC 27002 2022 with NIST
ebonyman0007
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdf
alokkesh
 
Cyber Security Program Realization in the Mid Market - Executive Summary
Cyber Security Program Realization in the Mid Market - Executive SummaryCyber Security Program Realization in the Mid Market - Executive Summary
Cyber Security Program Realization in the Mid Market - Executive Summary
Steve Leventhal
 
Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!
Heather Salmons Newswanger
 
Department of Homeland Security Guidance
Department of Homeland Security GuidanceDepartment of Homeland Security Guidance
Department of Homeland Security Guidance
Meg Weber
 
DHS Guidelines
DHS GuidelinesDHS Guidelines
DHS Guidelines
Meg Weber
 
1chapter42BaseTech Principles of Computer Securit.docx
1chapter42BaseTech  Principles of  Computer Securit.docx1chapter42BaseTech  Principles of  Computer Securit.docx
1chapter42BaseTech Principles of Computer Securit.docx
durantheseldine
 
Facilitated Risk Analysis Process - Tareq Hanaysha
Facilitated Risk Analysis Process - Tareq HanayshaFacilitated Risk Analysis Process - Tareq Hanaysha
Facilitated Risk Analysis Process - Tareq Hanaysha
Hanaysha
 
A Guide for Businesses.pdf
A Guide for Businesses.pdfA Guide for Businesses.pdf
A Guide for Businesses.pdf
DaviesParker
 
Toward a Trusted Supply Chain White Paper from Microsoft
Toward a Trusted Supply Chain White Paper from MicrosoftToward a Trusted Supply Chain White Paper from Microsoft
Toward a Trusted Supply Chain White Paper from MicrosoftDavid J Rosenthal
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptx
Infosectrain3
 
A to Z of Risk Management
A to Z of Risk ManagementA to Z of Risk Management
A to Z of Risk Management
Mark Conway
 
Management of risk introduction
Management of risk introductionManagement of risk introduction
Management of risk introduction
Spyros Ktenas
 
CHAPTER 5Risk Response and MitigationIn this chapter, you will
CHAPTER 5Risk Response and MitigationIn this chapter, you willCHAPTER 5Risk Response and MitigationIn this chapter, you will
CHAPTER 5Risk Response and MitigationIn this chapter, you will
JinElias52
 

Similar to Project 7 - Organization Security PlanChoose an organization fro.docx (20)

Happiest Minds NIST CSF compliance Brochure
Happiest Minds NIST  CSF compliance BrochureHappiest Minds NIST  CSF compliance Brochure
Happiest Minds NIST CSF compliance Brochure
 
STRATEGIC RISK ADVISORY SOLUTIONS_Risk Management_Newsletter
STRATEGIC RISK ADVISORY SOLUTIONS_Risk Management_NewsletterSTRATEGIC RISK ADVISORY SOLUTIONS_Risk Management_Newsletter
STRATEGIC RISK ADVISORY SOLUTIONS_Risk Management_Newsletter
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 
Security-Brochure
Security-BrochureSecurity-Brochure
Security-Brochure
 
CYBER SECURITY
CYBER SECURITYCYBER SECURITY
CYBER SECURITY
 
Information Security Maturity Model
Information Security Maturity ModelInformation Security Maturity Model
Information Security Maturity Model
 
NIST to CSF to ISO or EC 27002 2022 with NIST
NIST to CSF to ISO or EC 27002 2022 with NISTNIST to CSF to ISO or EC 27002 2022 with NIST
NIST to CSF to ISO or EC 27002 2022 with NIST
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdf
 
Cyber Security Program Realization in the Mid Market - Executive Summary
Cyber Security Program Realization in the Mid Market - Executive SummaryCyber Security Program Realization in the Mid Market - Executive Summary
Cyber Security Program Realization in the Mid Market - Executive Summary
 
Connection can help keep your business secure!
Connection can help keep your business secure!Connection can help keep your business secure!
Connection can help keep your business secure!
 
Department of Homeland Security Guidance
Department of Homeland Security GuidanceDepartment of Homeland Security Guidance
Department of Homeland Security Guidance
 
DHS Guidelines
DHS GuidelinesDHS Guidelines
DHS Guidelines
 
1chapter42BaseTech Principles of Computer Securit.docx
1chapter42BaseTech  Principles of  Computer Securit.docx1chapter42BaseTech  Principles of  Computer Securit.docx
1chapter42BaseTech Principles of Computer Securit.docx
 
Facilitated Risk Analysis Process - Tareq Hanaysha
Facilitated Risk Analysis Process - Tareq HanayshaFacilitated Risk Analysis Process - Tareq Hanaysha
Facilitated Risk Analysis Process - Tareq Hanaysha
 
A Guide for Businesses.pdf
A Guide for Businesses.pdfA Guide for Businesses.pdf
A Guide for Businesses.pdf
 
Toward a Trusted Supply Chain White Paper from Microsoft
Toward a Trusted Supply Chain White Paper from MicrosoftToward a Trusted Supply Chain White Paper from Microsoft
Toward a Trusted Supply Chain White Paper from Microsoft
 
CompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptxCompTIA CySA Domain 5 Compliance and Assessment.pptx
CompTIA CySA Domain 5 Compliance and Assessment.pptx
 
A to Z of Risk Management
A to Z of Risk ManagementA to Z of Risk Management
A to Z of Risk Management
 
Management of risk introduction
Management of risk introductionManagement of risk introduction
Management of risk introduction
 
CHAPTER 5Risk Response and MitigationIn this chapter, you will
CHAPTER 5Risk Response and MitigationIn this chapter, you willCHAPTER 5Risk Response and MitigationIn this chapter, you will
CHAPTER 5Risk Response and MitigationIn this chapter, you will
 

More from anitramcroberts

Propose recommendations to create an age diverse workforce.W.docx
Propose recommendations to create an age diverse workforce.W.docxPropose recommendations to create an age diverse workforce.W.docx
Propose recommendations to create an age diverse workforce.W.docx
anitramcroberts
 
Prosecuting Cybercrime  The Jurisdictional ProblemIn this discuss.docx
Prosecuting Cybercrime  The Jurisdictional ProblemIn this discuss.docxProsecuting Cybercrime  The Jurisdictional ProblemIn this discuss.docx
Prosecuting Cybercrime  The Jurisdictional ProblemIn this discuss.docx
anitramcroberts
 
PromptTopic Joseph is scheduled to have hip replacement surgery .docx
PromptTopic Joseph is scheduled to have hip replacement surgery .docxPromptTopic Joseph is scheduled to have hip replacement surgery .docx
PromptTopic Joseph is scheduled to have hip replacement surgery .docx
anitramcroberts
 
Property TaxThe property tax has been criticized as an unfair ba.docx
Property TaxThe property tax has been criticized as an unfair ba.docxProperty TaxThe property tax has been criticized as an unfair ba.docx
Property TaxThe property tax has been criticized as an unfair ba.docx
anitramcroberts
 
Prosecutors and VictimsWrite a 2 page paper.  Address the follow.docx
Prosecutors and VictimsWrite a 2 page paper.  Address the follow.docxProsecutors and VictimsWrite a 2 page paper.  Address the follow.docx
Prosecutors and VictimsWrite a 2 page paper.  Address the follow.docx
anitramcroberts
 
Prompt Discuss the recent public policy decisions made in Texas wit.docx
Prompt Discuss the recent public policy decisions made in Texas wit.docxPrompt Discuss the recent public policy decisions made in Texas wit.docx
Prompt Discuss the recent public policy decisions made in Texas wit.docx
anitramcroberts
 
Properties of LifeChapter 1 of the text highlights the nine proper.docx
Properties of LifeChapter 1 of the text highlights the nine proper.docxProperties of LifeChapter 1 of the text highlights the nine proper.docx
Properties of LifeChapter 1 of the text highlights the nine proper.docx
anitramcroberts
 
Proofread and complete your manual that includes the following ite.docx
Proofread and complete your manual that includes the following ite.docxProofread and complete your manual that includes the following ite.docx
Proofread and complete your manual that includes the following ite.docx
anitramcroberts
 
Proof Reading and adding 5 pages to chapter 2The pre-thesis .docx
Proof Reading and adding 5 pages to chapter 2The pre-thesis .docxProof Reading and adding 5 pages to chapter 2The pre-thesis .docx
Proof Reading and adding 5 pages to chapter 2The pre-thesis .docx
anitramcroberts
 
prompt:Leadership Culture - Describe the leadership culture in ope.docx
prompt:Leadership Culture - Describe the leadership culture in ope.docxprompt:Leadership Culture - Describe the leadership culture in ope.docx
prompt:Leadership Culture - Describe the leadership culture in ope.docx
anitramcroberts
 
Prompt  These two poems are companion pieces from a collection by.docx
Prompt  These two poems are companion pieces from a collection by.docxPrompt  These two poems are companion pieces from a collection by.docx
Prompt  These two poems are companion pieces from a collection by.docx
anitramcroberts
 
PromptTopic Robert was quite active when he first started colleg.docx
PromptTopic Robert was quite active when he first started colleg.docxPromptTopic Robert was quite active when he first started colleg.docx
PromptTopic Robert was quite active when he first started colleg.docx
anitramcroberts
 
PromptTopic Outline the flow of blood through the heart.  Explai.docx
PromptTopic Outline the flow of blood through the heart.  Explai.docxPromptTopic Outline the flow of blood through the heart.  Explai.docx
PromptTopic Outline the flow of blood through the heart.  Explai.docx
anitramcroberts
 
PromptTopic Deborah has 2 preschool-age children and one school-.docx
PromptTopic Deborah has 2 preschool-age children and one school-.docxPromptTopic Deborah has 2 preschool-age children and one school-.docx
PromptTopic Deborah has 2 preschool-age children and one school-.docx
anitramcroberts
 
PROMPTAnalyze from Amreeka the scene you found most powerfu.docx
PROMPTAnalyze from Amreeka the scene you found most powerfu.docxPROMPTAnalyze from Amreeka the scene you found most powerfu.docx
PROMPTAnalyze from Amreeka the scene you found most powerfu.docx
anitramcroberts
 
Prompt What makes a poem good or bad  Use Chapter 17 to identi.docx
Prompt What makes a poem good or bad  Use Chapter 17 to identi.docxPrompt What makes a poem good or bad  Use Chapter 17 to identi.docx
Prompt What makes a poem good or bad  Use Chapter 17 to identi.docx
anitramcroberts
 
PromptTopic Anton grew up in France and has come to America for .docx
PromptTopic Anton grew up in France and has come to America for .docxPromptTopic Anton grew up in France and has come to America for .docx
PromptTopic Anton grew up in France and has come to America for .docx
anitramcroberts
 
Prompt #1 Examples of Inductive InferencePrepare To prepare to.docx
Prompt #1 Examples of Inductive InferencePrepare To prepare to.docxPrompt #1 Examples of Inductive InferencePrepare To prepare to.docx
Prompt #1 Examples of Inductive InferencePrepare To prepare to.docx
anitramcroberts
 
Project This project requires you to identify and analyze le.docx
Project This project requires you to identify and analyze le.docxProject This project requires you to identify and analyze le.docx
Project This project requires you to identify and analyze le.docx
anitramcroberts
 
ProjectUsing the information you learned from your assessments and.docx
ProjectUsing the information you learned from your assessments and.docxProjectUsing the information you learned from your assessments and.docx
ProjectUsing the information you learned from your assessments and.docx
anitramcroberts
 

More from anitramcroberts (20)

Propose recommendations to create an age diverse workforce.W.docx
Propose recommendations to create an age diverse workforce.W.docxPropose recommendations to create an age diverse workforce.W.docx
Propose recommendations to create an age diverse workforce.W.docx
 
Prosecuting Cybercrime  The Jurisdictional ProblemIn this discuss.docx
Prosecuting Cybercrime  The Jurisdictional ProblemIn this discuss.docxProsecuting Cybercrime  The Jurisdictional ProblemIn this discuss.docx
Prosecuting Cybercrime  The Jurisdictional ProblemIn this discuss.docx
 
PromptTopic Joseph is scheduled to have hip replacement surgery .docx
PromptTopic Joseph is scheduled to have hip replacement surgery .docxPromptTopic Joseph is scheduled to have hip replacement surgery .docx
PromptTopic Joseph is scheduled to have hip replacement surgery .docx
 
Property TaxThe property tax has been criticized as an unfair ba.docx
Property TaxThe property tax has been criticized as an unfair ba.docxProperty TaxThe property tax has been criticized as an unfair ba.docx
Property TaxThe property tax has been criticized as an unfair ba.docx
 
Prosecutors and VictimsWrite a 2 page paper.  Address the follow.docx
Prosecutors and VictimsWrite a 2 page paper.  Address the follow.docxProsecutors and VictimsWrite a 2 page paper.  Address the follow.docx
Prosecutors and VictimsWrite a 2 page paper.  Address the follow.docx
 
Prompt Discuss the recent public policy decisions made in Texas wit.docx
Prompt Discuss the recent public policy decisions made in Texas wit.docxPrompt Discuss the recent public policy decisions made in Texas wit.docx
Prompt Discuss the recent public policy decisions made in Texas wit.docx
 
Properties of LifeChapter 1 of the text highlights the nine proper.docx
Properties of LifeChapter 1 of the text highlights the nine proper.docxProperties of LifeChapter 1 of the text highlights the nine proper.docx
Properties of LifeChapter 1 of the text highlights the nine proper.docx
 
Proofread and complete your manual that includes the following ite.docx
Proofread and complete your manual that includes the following ite.docxProofread and complete your manual that includes the following ite.docx
Proofread and complete your manual that includes the following ite.docx
 
Proof Reading and adding 5 pages to chapter 2The pre-thesis .docx
Proof Reading and adding 5 pages to chapter 2The pre-thesis .docxProof Reading and adding 5 pages to chapter 2The pre-thesis .docx
Proof Reading and adding 5 pages to chapter 2The pre-thesis .docx
 
prompt:Leadership Culture - Describe the leadership culture in ope.docx
prompt:Leadership Culture - Describe the leadership culture in ope.docxprompt:Leadership Culture - Describe the leadership culture in ope.docx
prompt:Leadership Culture - Describe the leadership culture in ope.docx
 
Prompt  These two poems are companion pieces from a collection by.docx
Prompt  These two poems are companion pieces from a collection by.docxPrompt  These two poems are companion pieces from a collection by.docx
Prompt  These two poems are companion pieces from a collection by.docx
 
PromptTopic Robert was quite active when he first started colleg.docx
PromptTopic Robert was quite active when he first started colleg.docxPromptTopic Robert was quite active when he first started colleg.docx
PromptTopic Robert was quite active when he first started colleg.docx
 
PromptTopic Outline the flow of blood through the heart.  Explai.docx
PromptTopic Outline the flow of blood through the heart.  Explai.docxPromptTopic Outline the flow of blood through the heart.  Explai.docx
PromptTopic Outline the flow of blood through the heart.  Explai.docx
 
PromptTopic Deborah has 2 preschool-age children and one school-.docx
PromptTopic Deborah has 2 preschool-age children and one school-.docxPromptTopic Deborah has 2 preschool-age children and one school-.docx
PromptTopic Deborah has 2 preschool-age children and one school-.docx
 
PROMPTAnalyze from Amreeka the scene you found most powerfu.docx
PROMPTAnalyze from Amreeka the scene you found most powerfu.docxPROMPTAnalyze from Amreeka the scene you found most powerfu.docx
PROMPTAnalyze from Amreeka the scene you found most powerfu.docx
 
Prompt What makes a poem good or bad  Use Chapter 17 to identi.docx
Prompt What makes a poem good or bad  Use Chapter 17 to identi.docxPrompt What makes a poem good or bad  Use Chapter 17 to identi.docx
Prompt What makes a poem good or bad  Use Chapter 17 to identi.docx
 
PromptTopic Anton grew up in France and has come to America for .docx
PromptTopic Anton grew up in France and has come to America for .docxPromptTopic Anton grew up in France and has come to America for .docx
PromptTopic Anton grew up in France and has come to America for .docx
 
Prompt #1 Examples of Inductive InferencePrepare To prepare to.docx
Prompt #1 Examples of Inductive InferencePrepare To prepare to.docxPrompt #1 Examples of Inductive InferencePrepare To prepare to.docx
Prompt #1 Examples of Inductive InferencePrepare To prepare to.docx
 
Project This project requires you to identify and analyze le.docx
Project This project requires you to identify and analyze le.docxProject This project requires you to identify and analyze le.docx
Project This project requires you to identify and analyze le.docx
 
ProjectUsing the information you learned from your assessments and.docx
ProjectUsing the information you learned from your assessments and.docxProjectUsing the information you learned from your assessments and.docx
ProjectUsing the information you learned from your assessments and.docx
 

Recently uploaded

2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
Sandy Millin
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
Delapenabediema
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
Vivekanand Anglo Vedic Academy
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
Jisc
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
Thiyagu K
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
MysoreMuleSoftMeetup
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
heathfieldcps1
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
RaedMohamed3
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 

Recently uploaded (20)

2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...2024.06.01 Introducing a competency framework for languag learning materials ...
2024.06.01 Introducing a competency framework for languag learning materials ...
 
The Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official PublicationThe Challenger.pdf DNHS Official Publication
The Challenger.pdf DNHS Official Publication
 
The French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free downloadThe French Revolution Class 9 Study Material pdf free download
The French Revolution Class 9 Study Material pdf free download
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
The approach at University of Liverpool.pptx
The approach at University of Liverpool.pptxThe approach at University of Liverpool.pptx
The approach at University of Liverpool.pptx
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Unit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdfUnit 8 - Information and Communication Technology (Paper I).pdf
Unit 8 - Information and Communication Technology (Paper I).pdf
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
Mule 4.6 & Java 17 Upgrade | MuleSoft Mysore Meetup #46
 
Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
The basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptxThe basics of sentences session 5pptx.pptx
The basics of sentences session 5pptx.pptx
 
Palestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptxPalestine last event orientationfvgnh .pptx
Palestine last event orientationfvgnh .pptx
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 

Project 7 - Organization Security PlanChoose an organization fro.docx

  • 1. Project 7 - Organization Security Plan Choose an organization from the choices provided and prepare a security plan that provides security awareness policy using a security policy framework outline and according the Critical Infrastructure document which concentrates on the following integral keywords to cover the necessary elements of an organization security plan. These are: Identify, Protect, Detect, Respond, and Recover . The plan is a capstone of the work that you have accomplished in this course. You will use your outline to guide the outcome of the plan in addition to the keywords. The plan is an enterprise policy that includes the following considerations, analysis approach, and protections for the enterprise: · Identify threats and vulnerabilities. · Assign appropriate security controls to protect the infrastructure of the organization. · Prepare vulnerability scans and effective risk management protocols to ensure protections remain current and effective and detect any issues. · Initiate an incident response plan for respond
  • 2. ing to problems. · Develop a business continuity and disaster recovery plan to recover from interruptions in business whether manmade or geographical. This plan must be completed and submitted in MS Word format. Choose from one of the organizations below or request approval from your instructor via email for an alternate organization: · Department of Defense · Department of Homeland Security · General Dynamics Information Technology · JC Penney’s Corporate Office · University of Maryland · ITT Technical Institute · United States Marine Corp From the Critical Infrastructure document , align your organizational plan to reflect the intent of the document as follows from an excerpt taken from the document
  • 3. and ensure you read the document in its entirety: “The Framework complements, and does not replace, an organization’s risk management and cybersecurity program. The organization can use its current processes and leverage the Framework to identify opportunities to strengthen and communicate its management of cybersecurity risk while aligning with industry practices. Alternatively, an organization without an existing cybersecurity program can use the Framework as a reference to establish one. Just as the Framework is not industry-specific, the common taxonomy of standards, guidelines, and practices that it provides also is not country-specific. Organizations outside the United States may also use the Framework to strengthen their own cybersecurity efforts, and the Framework can contribute to developing a common language for international cooperation on critical infrastructure cybersecurity.” 1.1 Overview of the Framework The Framework is a risk-based approach to managing cybersecurity risk, and is composed of three parts: the Framework Core, the Framework Implementation Tiers, and the Framework Profiles. Each Framework component reinforces the connection between business drivers and cybersecurity activities. These components are explained below. The Framework Core is a set of cybersecurity activities, desired outcomes, and applicable references that are common across critical infrastructure sectors. The Core presents industry standards, guidelines, and practices in a manner that allows for communication of cybersecurity activities and outcomes across the organization from the executive level to the implementation/operations level. The Framework Core consists
  • 4. of five concurrent and continuous Functions— Identify, Protect, Detect, Respond, Recover . When considered together, these Functions provide a high- level, strategic view of the lifecycle of an organization’s management of cybersecurity risk. The Framework Core then identifies underlying key Categories and Subcategories for each Function, and matches them with example Informative References such as existing standards, guidelines, and practices for each Subcategory. Framework Implementation Tiers (“Tiers”) provide context on how an organization views cybersecurity risk and the processes in place to manage that risk. Tiers describe the degree to which an organization’s cybersecurity risk management practices exhibit the characteristics defined in the Framework (e.g., risk and threat aware, repeatable, and adaptive). The Tiers characterize an organization’s practices over a range, from Partial (Tier 1) to Adaptive (Tier 4). These Tiers reflect a progression from informal, reactive responses to approaches that are agile and risk-informed. During the Tier selection process, an organization should consider its current risk management practices, threat environment, legal and regulatory requirements, business/mission objectives, and organizational constraints. A Framework Profile (“Profile”) represents the outcomes based on business needs that an organization has selected from the Framework Categories and Subcategories. The Profile can be characterized as the alignment of standards, guidelines, and practices to the Framework Core in a particular implementation scenario. Profiles can be used to identify opportunities for improving cybersecurity posture by comparing a “Current” Profile (the “as is” state) with a “Target” Profile (the “to be” state). To develop
  • 5. a Profile, an organization can review all of the Categories and Subcategories and, based on business drivers and a risk assessment, determine which are most important; they can add Categories and Subcategories as needed to address the organization’s risks. The Current Profile can then be used to support prioritization and measurement of progress toward the Target Profile, while factoring in other business needs including cost-effectiveness and innovation. Profiles can be used to conduct self-assessments and communicate within an organization or between organizations. 1.2 Risk Management and the Cybersecurity Framework Risk management is the ongoing process of identifying, assessing, and responding to risk. To manage risk, organizations should understand the likelihood that an event will occur and the resulting impact. With this information, organizations can determine the acceptable level of risk for delivery of services and can express this as their risk tolerance. With an understanding of risk tolerance, organizations can prioritize cybersecurity activities, enabling organizations to make informed decisions about cybersecurity expenditures. Implementation of risk management programs offers organizations the ability to quantify and communicate adjustments to their cybersecurity programs. Organizations may choose to handle risk in different ways, including mitigating the risk, transferring the risk, avoiding the risk, or accepting the risk, depending on the potential impact to the delivery of critical services. The Framework uses risk management processes to enable organizations to inform and prioritize decisions regarding cybersecurity. It supports recurring risk assessments and validation of business drivers to help organizations select target states for cybersecurity activities that reflect desired outcomes. Thus, the Framework gives organizations the ability to
  • 6. dynamically select and direct improvement in cybersecurity risk management for the IT and ICS environments.” Your organization plan must be a comprehensive approach identifying the framework for enabling organizations to establish cybersecurity policy in the enterprise. Submit to your assignment folder by the due date assigned in your syllabus schedule.