SlideShare a Scribd company logo
System Security Plan For: {System Name}
Version:
Date:
Prepared By:
System Identification
System Name/Title
Responsible Organization
Information Contact(S)
Assignment of Security Responsibility
System Operational Status
General Description/Purpose
System Environment
System Interconnection/Information Sharing
Laws, Regulations, and Policies Affecting the System
Sensitivity of Information Handled
General Description of Sensitivity
Management Controls
Risk Assessment and Management
Review of Security Controls
Rules of Behavior
Planning for Security in the Life Cycle
Initiation Phase
Development/Acquisition Phase
Implementation Phase
Operation/Maintenance Phase
Disposal Phase
Authorized Processing
Operational Controls
Personnel Security
Physical and Environmental Protection
Production, Input/Output Controls
Contingency Planning
Maintenance Controls
Data Integrity/Validation Controls
Documentation
Security Awareness and Training
Incident Response Capability
Technical Controls
Identification and Authentication
Authorization/Access Controls
Public Access Controls
Audit Trails
System Security Plan
https://www.sans.org/projects/systemsecurity.php
In this assignment, students will learn to integrate course topics
into an actionable security plan.
Use your organization's current system security (if this is not
available find one on the Internet), and create a system security
plan that is appropriate for the environment under
consideration.
Note: If you work in a large company, create the system
security plan for a single division or department.
Use the "System Security Plan Template," to complete this
assignment. Make sure to include screenshots (as applicable).
Refer to the "System Security Plan," located within the Topic
Materials, when working on this assignment. This resource
provides detailed explanations of each section that should be
included within the plan.
APA style is not required, but solid technical writing is
expected.
This assignment uses a rubric. Please review the rubric prior to
beginning the assignment to become familiar with the
expectations for successful completion.
System Security Plan
https://www.sans.org/projects/systemsecurity.php
In this assignment, students will learn to integrate course topics
into an actionable security plan.
Use your organization's current system security (if this is not
available find one on the Internet), and
create a system security
plan that is appropriate for the environment under
consideration.
Note: If you work in a large company, create the system
security plan for a single division or
department.
Use the "System Security Plan Template," to complete this
assignment. Make sure to
include
screenshots (as applicable).
Refer to the "System Security Plan," located within the Topic
Materials, when working on this
assignment. This resource provides detailed explanations of
each section that should be included within
the plan.
APA style i
s not required, but solid technical writing is expected.
This assignment uses a rubric. Please review the rubric prior to
beginning the assignment to become
familiar with the expectations for successful completion.
System Security Plan
https://www.sans.org/projects/systemsecurity.php
In this assignment, students will learn to integrate course topics
into an actionable security plan.
Use your organization's current system security (if this is not
available find one on the Internet), and
create a system security plan that is appropriate for the
environment under consideration.
Note: If you work in a large company, create the system
security plan for a single division or
department.
Use the "System Security Plan Template," to complete this
assignment. Make sure to include
screenshots (as applicable).
Refer to the "System Security Plan," located within the Topic
Materials, when working on this
assignment. This resource provides detailed explanations of
each section that should be included within
the plan.
APA style is not required, but solid technical writing is
expected.
This assignment uses a rubric. Please review the rubric prior to
beginning the assignment to become
familiar with the expectations for successful completion.
System Security Plan
1
Unsatisfactory
0.00%
2
Less than Satisfactory
65.00%
3
Satisfactory
75.00%
4
Good
85.00%
5
Excellent
100.00%
100.0 %Content
20.0 %System Identification
The student does not complete this section of the plan
adequately. Subject knowledge is not evident.
The student only outlines some of the identifying information
about the system with few supporting details and examples.
Little subject knowledge is evident.
The student provides basic identifying information about the
system with some supporting details and examples. Subject
knowledge appears to be good.
The student provides detailed identifying information about the
system with supporting details and examples. Subject
knowledge appears to be good.
The student provides comprehensive identifying information
(who is responsible for it, its purpose, and the sensitivity) about
the system with supporting details and examples; information
and justifications are accurate and appropriate. All sub sections
are complete. Subject knowledge is excellent.
20.0 %Management Controls
The student does not complete this section of the plan
adequately. Subject knowledge is not evident.
The student only outlines some of the management control
measures to meet the protection requirements of the major
application or general support system with few supporting
details and examples. Little subject knowledge is evident.
The student provides basic management control measures to
meet the protection requirements of the major application or
general support system with some supporting details and
examples. Subject knowledge appears to be good.
The student provides detailed management control measures to
meet the protection requirements of the major application or
general support system with supporting details and examples.
Subject knowledge appears to be good.
The student comprehensively describes the management control
measures to meet the protection requirements of the major
application or general support system with supporting details;
information and justifications are accurate and appropriate. All
sub sections are complete. Subject knowledge is excellent.
20.0 %Operational Controls
The student does not complete this section of the plan
adequately. Subject knowledge is not evident.
The student only outlines some of the operational control
measures to meet the protection requirements of the target
systems with few supporting details and examples. Little subject
knowledge is evident.
The student provides basic operational control measures to meet
the protection requirements of the target systems with some
supporting details and examples. Subject knowledge appears to
be good.
The student provides detailed operational control measures to
meet the protection requirements of the target systems with
supporting details and examples. Subject knowledge appears to
be good.
The student comprehensively describes the operational control
measures to meet the protection requirements of the target
systems with supporting details; information and justifications
are accurate and appropriate. All sub sections are complete.
Subject knowledge is excellent.
20.0 %Technical Controls
The student does not complete this section of the plan
adequately. Subject knowledge is not evident.
The student only outlines some of the technical control
measures to meet the protection requirements of the major
application or general support system with few supporting
details and examples. Little subject knowledge is evident.
The student provides basic technical control measures to meet
the protection requirements of the major application or general
support system with some supporting details and examples.
Subject knowledge appears to be good.
The student provides detailed technical control measures to
meet the protection requirements of the major application or
general support system with supporting details and examples.
Subject knowledge appears to be good.
The student comprehensively describes the technical control
measures to meet the protection requirements of the major
application or general support system with supporting details;
information and justifications are accurate and appropriate. All
sub sections are complete. Subject knowledge is excellent.
10.0 %Screenshots
The student does not include the necessary screenshots for
submission.
NA
NA
The student includes most of the necessary screenshots as a
proof of the completion of system security plan.
The student includes all the necessary screenshots as a proof of
the completion of system security plan.
10.0 %Language Use, Audience Awareness and Mechanics of
Writing
Surface errors are pervasive enough that they impede
communication of meaning. Inappropriate word choice and/or
sentence construction are employed.
Frequent and repetitive mechanical errors distract the reader.
Inconsistencies in language choice (register) and/or word choice
are present.
Some mechanical errors or typos are present, but are not overly
distracting to the reader. Audience-appropriate language is
employed.
Prose is largely free of mechanical errors, although a few may
be present. The writer uses a variety of sentence structures and
effective figures of speech.
Prose is largely free of mechanical errors. The writer uses a
variety of effective sentence structures, figures of speech, and
industry terminology. The writer is clearly in command of
standard, written academic English.
100 %Total Weightage
System Security Plan
1
Unsatisfactory
0.00%
2
Less than Satisfactory
65.00%
3
Satisfactory
75.00%
4
Good
85.00%
5
Excellent
100.00%
100.0 %Content
20.0 %
System
Identification
The student does not
complete this section
of the plan adequately.
Subject knowledge is
not evident.
The student only outlines
some of the identifying
information about the
system with few supporting
details and examples. Little
subject knowledge is
eviden
t.
The student provides basic
identifying information
about the system with
some supporting details
and examples. Subject
knowledge appears to be
good.
The student provides
detailed identifying
information about the
system with supporting
details and exam
ples.
Subject knowledge
appears to be good.
The student provides
comprehensive identifying
information (who is responsible for
it, its purpose, and the sensitivity)
about the system with supporting
details and examples; information
and justifications are a
ccurate and
appropriate. All sub sections are
complete. Subject knowledge is
excellent.
20.0 %
Management
Controls
The student does not
complete this section
of the plan adequately.
Subject knowledge is
not evident.
The student only outlines
some of the
management
control measures to meet
the protection requirements
of the major application or
general support system with
few supporting details and
examples. Little subject
knowledge is evident.
The student provides basic
management control
measures to me
et the
protection requirements
of the major application
or general support system
with some supporting
details and examples.
Subject knowledge
appears to be good.
The student provides
detailed management
control measures to meet
the protection
requirement
s of the major
application or general
support system with
supporting details and
examples. Subject
knowledge appears to be
good.
The student comprehensively
describes the management control
measures to meet the protection
requirements of the major
applicat
ion or general support
system with supporting details;
information and justifications are
accurate and appropriate. All sub
sections are complete. Subject
knowledge is excellent.
20.0 %
Operational
Controls
The student does not
complete this section
of t
he plan adequately.
Subject knowledge is
not evident.
The student only outlines
some of the operational
control measures to meet
the protection requirements
of the target systems with
few supporting details and
examples. Little subject
knowledge is evident
.
The student provides basic
operational control
measures to meet the
protection requirements
of the target systems with
some supporting details
and examples. Subject
knowledge appears to be
good.
The student provides
detailed operational
control measure
s to meet
the protection
requirements of the
target systems with
supporting details and
examples. Subject
knowledge appears to be
good.
The student comprehensively
describes the operational control
measures to meet the protection
requirements of the target
systems with supporting details;
information and justifications are
accurate and appropriate. All sub
sections are complete. Subject
knowledge is excellent.
20.0 %
Technical
Controls
The student does not
complete this section
of the plan adequately.
Sub
ject knowledge is
not evident.
The student only outlines
some of the technical
control measures to meet
the protection requirements
of the major application or
general support system with
few supporting details and
The student provides bas
ic
technical control
measures to meet the
protection requirements
of the major application
or general support system
with some supporting
The student provides
detailed technical control
measures
to meet the
protection requirements
of the major application
or general support system
with supporting details
The student comprehensively
describes the technical control
measures to meet the protection
r
equirements of the major
application or general support
system with supporting details;
information and justifications are
System Security Plan
1
Unsatisfactory
0.00%
2
Less than Satisfactory
65.00%
3
Satisfactory
75.00%
4
Good
85.00%
5
Excellent
100.00%
100.0 %Content
20.0 % System
Identification
The student does not
complete this section
of the plan adequately.
Subject knowledge is
not evident.
The student only outlines
some of the identifying
information about the
system with few supporting
details and examples. Little
subject knowledge is
evident.
The student provides basic
identifying information
about the system with
some supporting details
and examples. Subject
knowledge appears to be
good.
The student provides
detailed identifying
information about the
system with supporting
details and examples.
Subject knowledge
appears to be good.
The student provides
comprehensive identifying
information (who is responsible for
it, its purpose, and the sensitivity)
about the system with supporting
details and examples; information
and justifications are accurate and
appropriate. All sub sections are
complete. Subject knowledge is
excellent.
20.0 %
Management
Controls
The student does not
complete this section
of the plan adequately.
Subject knowledge is
not evident.
The student only outlines
some of the management
control measures to meet
the protection requirements
of the major application or
general support system with
few supporting details and
examples. Little subject
knowledge is evident.
The student provides basic
management control
measures to meet the
protection requirements
of the major application
or general support system
with some supporting
details and examples.
Subject knowledge
appears to be good.
The student provides
detailed management
control measures to meet
the protection
requirements of the major
application or general
support system with
supporting details and
examples. Subject
knowledge appears to be
good.
The student comprehensively
describes the management control
measures to meet the protection
requirements of the major
application or general support
system with supporting details;
information and justifications are
accurate and appropriate. All sub
sections are complete. Subject
knowledge is excellent.
20.0 %
Operational
Controls
The student does not
complete this section
of the plan adequately.
Subject knowledge is
not evident.
The student only outlines
some of the operational
control measures to meet
the protection requirements
of the target systems with
few supporting details and
examples. Little subject
knowledge is evident.
The student provides basic
operational control
measures to meet the
protection requirements
of the target systems with
some supporting details
and examples. Subject
knowledge appears to be
good.
The student provides
detailed operational
control measures to meet
the protection
requirements of the
target systems with
supporting details and
examples. Subject
knowledge appears to be
good.
The student comprehensively
describes the operational control
measures to meet the protection
requirements of the target
systems with supporting details;
information and justifications are
accurate and appropriate. All sub
sections are complete. Subject
knowledge is excellent.
20.0 %
Technical
Controls
The student does not
complete this section
of the plan adequately.
Subject knowledge is
not evident.
The student only outlines
some of the technical
control measures to meet
the protection requirements
of the major application or
general support system with
few supporting details and
The student provides basic
technical control
measures to meet the
protection requirements
of the major application
or general support system
with some supporting
The student provides
detailed technical control
measures to meet the
protection requirements
of the major application
or general support system
with supporting details
The student comprehensively
describes the technical control
measures to meet the protection
requirements of the major
application or general support
system with supporting details;
information and justifications are

More Related Content

Similar to System Security Plan For {System Name}Version Date.docx

Install and Secure an Operating System Scoring GuideDue Date En.docx
Install and Secure an Operating System Scoring GuideDue Date En.docxInstall and Secure an Operating System Scoring GuideDue Date En.docx
Install and Secure an Operating System Scoring GuideDue Date En.docx
jaggernaoma
 
Cmgt 582 Effective Communication / snaptutorial.com
Cmgt 582  Effective Communication / snaptutorial.comCmgt 582  Effective Communication / snaptutorial.com
Cmgt 582 Effective Communication / snaptutorial.com
HarrisGeorg12
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management Program
Sasha Nunke
 
Cyber security technologist occupational brief
Cyber security technologist occupational briefCyber security technologist occupational brief
Cyber security technologist occupational brief
Enda Crossan
 
Stage 1 Preliminary Investigation ReportBefore you begin th.docx
Stage 1   Preliminary Investigation ReportBefore you begin th.docxStage 1   Preliminary Investigation ReportBefore you begin th.docx
Stage 1 Preliminary Investigation ReportBefore you begin th.docx
whitneyleman54422
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
primeteacher32
 
MODULE 7 UNIT 3Ongoing projectHAR CYB Module 7 Unit 3 Ongoin.docx
MODULE 7 UNIT 3Ongoing projectHAR CYB Module 7 Unit 3 Ongoin.docxMODULE 7 UNIT 3Ongoing projectHAR CYB Module 7 Unit 3 Ongoin.docx
MODULE 7 UNIT 3Ongoing projectHAR CYB Module 7 Unit 3 Ongoin.docx
audeleypearl
 
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 CMGT 582 STUDY Inspiring Innovation--cmgt582study.com CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
KeatonJennings98
 
Rubric Name Project 7 Organization Enterprise Plan and Security P.docx
Rubric Name Project 7 Organization Enterprise Plan and Security P.docxRubric Name Project 7 Organization Enterprise Plan and Security P.docx
Rubric Name Project 7 Organization Enterprise Plan and Security P.docx
SUBHI7
 
Page 1 of 6 [377] COM7005D Info.docx
Page 1 of 6 [377] COM7005D    Info.docxPage 1 of 6 [377] COM7005D    Info.docx
Page 1 of 6 [377] COM7005D Info.docx
honey690131
 
IT 600 Final Project Milestone Two Template Analytical Organi.docx
IT 600 Final Project Milestone Two Template Analytical Organi.docxIT 600 Final Project Milestone Two Template Analytical Organi.docx
IT 600 Final Project Milestone Two Template Analytical Organi.docx
priestmanmable
 
Chapter 14 certificationsIT Framework standards
Chapter 14 certificationsIT Framework standardsChapter 14 certificationsIT Framework standards
Chapter 14 certificationsIT Framework standards
EstelaJeffery653
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdf
alokkesh
 
Cyber Security Improvement Plan
Cyber Security Improvement PlanCyber Security Improvement Plan
Cyber Security Improvement Plan
Nicole Valerio
 
IHP 525 Private Discussion Rubric Overview Your act
IHP 525 Private Discussion Rubric  Overview Your actIHP 525 Private Discussion Rubric  Overview Your act
IHP 525 Private Discussion Rubric Overview Your act
MalikPinckney86
 
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
CompTIA
 
Cmgt 582 Education Specialist -snaptutorial.com
Cmgt 582  Education Specialist -snaptutorial.comCmgt 582  Education Specialist -snaptutorial.com
Cmgt 582 Education Specialist -snaptutorial.com
DavisMurphyC37
 
May/June 2010 Scenario 4
May/June 2010 Scenario 4May/June 2010 Scenario 4
May/June 2010 Scenario 4
ianwbhs
 
This assignment requires you to complete a cyber risk mitigation s.docx
This assignment requires you to complete a cyber risk mitigation s.docxThis assignment requires you to complete a cyber risk mitigation s.docx
This assignment requires you to complete a cyber risk mitigation s.docx
michelle1011
 
member is a security software architect in a cloud service provider .docx
member is a security software architect in a cloud service provider .docxmember is a security software architect in a cloud service provider .docx
member is a security software architect in a cloud service provider .docx
wkyra78
 

Similar to System Security Plan For {System Name}Version Date.docx (20)

Install and Secure an Operating System Scoring GuideDue Date En.docx
Install and Secure an Operating System Scoring GuideDue Date En.docxInstall and Secure an Operating System Scoring GuideDue Date En.docx
Install and Secure an Operating System Scoring GuideDue Date En.docx
 
Cmgt 582 Effective Communication / snaptutorial.com
Cmgt 582  Effective Communication / snaptutorial.comCmgt 582  Effective Communication / snaptutorial.com
Cmgt 582 Effective Communication / snaptutorial.com
 
Planning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management ProgramPlanning and Deploying an Effective Vulnerability Management Program
Planning and Deploying an Effective Vulnerability Management Program
 
Cyber security technologist occupational brief
Cyber security technologist occupational briefCyber security technologist occupational brief
Cyber security technologist occupational brief
 
Stage 1 Preliminary Investigation ReportBefore you begin th.docx
Stage 1   Preliminary Investigation ReportBefore you begin th.docxStage 1   Preliminary Investigation ReportBefore you begin th.docx
Stage 1 Preliminary Investigation ReportBefore you begin th.docx
 
Security Policies and Standards
Security Policies and StandardsSecurity Policies and Standards
Security Policies and Standards
 
MODULE 7 UNIT 3Ongoing projectHAR CYB Module 7 Unit 3 Ongoin.docx
MODULE 7 UNIT 3Ongoing projectHAR CYB Module 7 Unit 3 Ongoin.docxMODULE 7 UNIT 3Ongoing projectHAR CYB Module 7 Unit 3 Ongoin.docx
MODULE 7 UNIT 3Ongoing projectHAR CYB Module 7 Unit 3 Ongoin.docx
 
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 CMGT 582 STUDY Inspiring Innovation--cmgt582study.com CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
CMGT 582 STUDY Inspiring Innovation--cmgt582study.com
 
Rubric Name Project 7 Organization Enterprise Plan and Security P.docx
Rubric Name Project 7 Organization Enterprise Plan and Security P.docxRubric Name Project 7 Organization Enterprise Plan and Security P.docx
Rubric Name Project 7 Organization Enterprise Plan and Security P.docx
 
Page 1 of 6 [377] COM7005D Info.docx
Page 1 of 6 [377] COM7005D    Info.docxPage 1 of 6 [377] COM7005D    Info.docx
Page 1 of 6 [377] COM7005D Info.docx
 
IT 600 Final Project Milestone Two Template Analytical Organi.docx
IT 600 Final Project Milestone Two Template Analytical Organi.docxIT 600 Final Project Milestone Two Template Analytical Organi.docx
IT 600 Final Project Milestone Two Template Analytical Organi.docx
 
Chapter 14 certificationsIT Framework standards
Chapter 14 certificationsIT Framework standardsChapter 14 certificationsIT Framework standards
Chapter 14 certificationsIT Framework standards
 
For our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdfFor our discussion question, we focus on recent trends in security t.pdf
For our discussion question, we focus on recent trends in security t.pdf
 
Cyber Security Improvement Plan
Cyber Security Improvement PlanCyber Security Improvement Plan
Cyber Security Improvement Plan
 
IHP 525 Private Discussion Rubric Overview Your act
IHP 525 Private Discussion Rubric  Overview Your actIHP 525 Private Discussion Rubric  Overview Your act
IHP 525 Private Discussion Rubric Overview Your act
 
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
Closing the Gap for Advanced Enterprise Cybersecurity Skills with CompTIA Adv...
 
Cmgt 582 Education Specialist -snaptutorial.com
Cmgt 582  Education Specialist -snaptutorial.comCmgt 582  Education Specialist -snaptutorial.com
Cmgt 582 Education Specialist -snaptutorial.com
 
May/June 2010 Scenario 4
May/June 2010 Scenario 4May/June 2010 Scenario 4
May/June 2010 Scenario 4
 
This assignment requires you to complete a cyber risk mitigation s.docx
This assignment requires you to complete a cyber risk mitigation s.docxThis assignment requires you to complete a cyber risk mitigation s.docx
This assignment requires you to complete a cyber risk mitigation s.docx
 
member is a security software architect in a cloud service provider .docx
member is a security software architect in a cloud service provider .docxmember is a security software architect in a cloud service provider .docx
member is a security software architect in a cloud service provider .docx
 

More from mabelf3

SW 619Infancy and Early Childhood Development of Drug Addicted.docx
SW 619Infancy and Early Childhood Development of Drug Addicted.docxSW 619Infancy and Early Childhood Development of Drug Addicted.docx
SW 619Infancy and Early Childhood Development of Drug Addicted.docx
mabelf3
 
SWK311 Assessment 2 Final EssayWhat is t.docx
SWK311 Assessment 2 Final EssayWhat is t.docxSWK311 Assessment 2 Final EssayWhat is t.docx
SWK311 Assessment 2 Final EssayWhat is t.docx
mabelf3
 
Surname 1Students NameProfessors NameCourseDate Kano.docx
Surname 1Students NameProfessors NameCourseDate Kano.docxSurname 1Students NameProfessors NameCourseDate Kano.docx
Surname 1Students NameProfessors NameCourseDate Kano.docx
mabelf3
 
SWK 527 -Signature Assignment Social Work Theory and Practice Ass.docx
SWK 527 -Signature Assignment Social Work Theory and Practice Ass.docxSWK 527 -Signature Assignment Social Work Theory and Practice Ass.docx
SWK 527 -Signature Assignment Social Work Theory and Practice Ass.docx
mabelf3
 
SURNMAE3Self-assessment Student nameProfessor nameInstit.docx
SURNMAE3Self-assessment Student nameProfessor nameInstit.docxSURNMAE3Self-assessment Student nameProfessor nameInstit.docx
SURNMAE3Self-assessment Student nameProfessor nameInstit.docx
mabelf3
 
Surname 2Student’s NameProfessor’s NameCourse CodeDate.docx
Surname 2Student’s NameProfessor’s NameCourse CodeDate.docxSurname 2Student’s NameProfessor’s NameCourse CodeDate.docx
Surname 2Student’s NameProfessor’s NameCourse CodeDate.docx
mabelf3
 
Switching costs ____________________________.Question 1 options.docx
Switching costs ____________________________.Question 1 options.docxSwitching costs ____________________________.Question 1 options.docx
Switching costs ____________________________.Question 1 options.docx
mabelf3
 
swer the following questionsWhy would it be important for you.docx
swer the following questionsWhy would it be important for you.docxswer the following questionsWhy would it be important for you.docx
swer the following questionsWhy would it be important for you.docx
mabelf3
 
Swifts A Modest Proposal is one of the most famous examples of sa.docx
Swifts A Modest Proposal is one of the most famous examples of sa.docxSwifts A Modest Proposal is one of the most famous examples of sa.docx
Swifts A Modest Proposal is one of the most famous examples of sa.docx
mabelf3
 
Sweep up a small area of your floor. Take a look at the trace evide.docx
Sweep up a small area of your floor. Take a look at the trace evide.docxSweep up a small area of your floor. Take a look at the trace evide.docx
Sweep up a small area of your floor. Take a look at the trace evide.docx
mabelf3
 
Sweat” by Zora Neale Hurston from Carol Oates, Joyce,.docx
Sweat” by Zora Neale Hurston   from Carol Oates, Joyce,.docxSweat” by Zora Neale Hurston   from Carol Oates, Joyce,.docx
Sweat” by Zora Neale Hurston from Carol Oates, Joyce,.docx
mabelf3
 
sweep things under the rug or pre-tend it never happened. in.docx
sweep things under the rug or pre-tend it never happened. in.docxsweep things under the rug or pre-tend it never happened. in.docx
sweep things under the rug or pre-tend it never happened. in.docx
mabelf3
 
Susan serves on the city building commission.The city is plannin.docx
Susan serves on the city building commission.The city is plannin.docxSusan serves on the city building commission.The city is plannin.docx
Susan serves on the city building commission.The city is plannin.docx
mabelf3
 
Susan serves on the city building commission.The city is plann.docx
Susan serves on the city building commission.The city is plann.docxSusan serves on the city building commission.The city is plann.docx
Susan serves on the city building commission.The city is plann.docx
mabelf3
 
SUSAN GLASPELL TRIFLES      SCENE The kitchen in the now aba.docx
SUSAN GLASPELL TRIFLES      SCENE The kitchen in the now aba.docxSUSAN GLASPELL TRIFLES      SCENE The kitchen in the now aba.docx
SUSAN GLASPELL TRIFLES      SCENE The kitchen in the now aba.docx
mabelf3
 
SUSTAINABLE URBAN DEVELOPMENT, GOVERNANCE, AND POLICY A COMPARATIVE.docx
SUSTAINABLE URBAN DEVELOPMENT, GOVERNANCE, AND POLICY A COMPARATIVE.docxSUSTAINABLE URBAN DEVELOPMENT, GOVERNANCE, AND POLICY A COMPARATIVE.docx
SUSTAINABLE URBAN DEVELOPMENT, GOVERNANCE, AND POLICY A COMPARATIVE.docx
mabelf3
 
Susan Wolf thinks that that meaning has both a subjective and an.docx
Susan Wolf thinks that that meaning has both a subjective and an.docxSusan Wolf thinks that that meaning has both a subjective and an.docx
Susan Wolf thinks that that meaning has both a subjective and an.docx
mabelf3
 
Sustainable Urban Development, Governance and Policy A Comparative .docx
Sustainable Urban Development, Governance and Policy A Comparative .docxSustainable Urban Development, Governance and Policy A Comparative .docx
Sustainable Urban Development, Governance and Policy A Comparative .docx
mabelf3
 
SU_NSG6001_W4A2_PANDEY_R.doc.docxby Ram PandeySubmis.docx
SU_NSG6001_W4A2_PANDEY_R.doc.docxby Ram PandeySubmis.docxSU_NSG6001_W4A2_PANDEY_R.doc.docxby Ram PandeySubmis.docx
SU_NSG6001_W4A2_PANDEY_R.doc.docxby Ram PandeySubmis.docx
mabelf3
 
SUSTAINABLE ENERGY SYSTEMS 1 P a g e .docx
SUSTAINABLE ENERGY SYSTEMS  1  P a g e .docxSUSTAINABLE ENERGY SYSTEMS  1  P a g e .docx
SUSTAINABLE ENERGY SYSTEMS 1 P a g e .docx
mabelf3
 

More from mabelf3 (20)

SW 619Infancy and Early Childhood Development of Drug Addicted.docx
SW 619Infancy and Early Childhood Development of Drug Addicted.docxSW 619Infancy and Early Childhood Development of Drug Addicted.docx
SW 619Infancy and Early Childhood Development of Drug Addicted.docx
 
SWK311 Assessment 2 Final EssayWhat is t.docx
SWK311 Assessment 2 Final EssayWhat is t.docxSWK311 Assessment 2 Final EssayWhat is t.docx
SWK311 Assessment 2 Final EssayWhat is t.docx
 
Surname 1Students NameProfessors NameCourseDate Kano.docx
Surname 1Students NameProfessors NameCourseDate Kano.docxSurname 1Students NameProfessors NameCourseDate Kano.docx
Surname 1Students NameProfessors NameCourseDate Kano.docx
 
SWK 527 -Signature Assignment Social Work Theory and Practice Ass.docx
SWK 527 -Signature Assignment Social Work Theory and Practice Ass.docxSWK 527 -Signature Assignment Social Work Theory and Practice Ass.docx
SWK 527 -Signature Assignment Social Work Theory and Practice Ass.docx
 
SURNMAE3Self-assessment Student nameProfessor nameInstit.docx
SURNMAE3Self-assessment Student nameProfessor nameInstit.docxSURNMAE3Self-assessment Student nameProfessor nameInstit.docx
SURNMAE3Self-assessment Student nameProfessor nameInstit.docx
 
Surname 2Student’s NameProfessor’s NameCourse CodeDate.docx
Surname 2Student’s NameProfessor’s NameCourse CodeDate.docxSurname 2Student’s NameProfessor’s NameCourse CodeDate.docx
Surname 2Student’s NameProfessor’s NameCourse CodeDate.docx
 
Switching costs ____________________________.Question 1 options.docx
Switching costs ____________________________.Question 1 options.docxSwitching costs ____________________________.Question 1 options.docx
Switching costs ____________________________.Question 1 options.docx
 
swer the following questionsWhy would it be important for you.docx
swer the following questionsWhy would it be important for you.docxswer the following questionsWhy would it be important for you.docx
swer the following questionsWhy would it be important for you.docx
 
Swifts A Modest Proposal is one of the most famous examples of sa.docx
Swifts A Modest Proposal is one of the most famous examples of sa.docxSwifts A Modest Proposal is one of the most famous examples of sa.docx
Swifts A Modest Proposal is one of the most famous examples of sa.docx
 
Sweep up a small area of your floor. Take a look at the trace evide.docx
Sweep up a small area of your floor. Take a look at the trace evide.docxSweep up a small area of your floor. Take a look at the trace evide.docx
Sweep up a small area of your floor. Take a look at the trace evide.docx
 
Sweat” by Zora Neale Hurston from Carol Oates, Joyce,.docx
Sweat” by Zora Neale Hurston   from Carol Oates, Joyce,.docxSweat” by Zora Neale Hurston   from Carol Oates, Joyce,.docx
Sweat” by Zora Neale Hurston from Carol Oates, Joyce,.docx
 
sweep things under the rug or pre-tend it never happened. in.docx
sweep things under the rug or pre-tend it never happened. in.docxsweep things under the rug or pre-tend it never happened. in.docx
sweep things under the rug or pre-tend it never happened. in.docx
 
Susan serves on the city building commission.The city is plannin.docx
Susan serves on the city building commission.The city is plannin.docxSusan serves on the city building commission.The city is plannin.docx
Susan serves on the city building commission.The city is plannin.docx
 
Susan serves on the city building commission.The city is plann.docx
Susan serves on the city building commission.The city is plann.docxSusan serves on the city building commission.The city is plann.docx
Susan serves on the city building commission.The city is plann.docx
 
SUSAN GLASPELL TRIFLES      SCENE The kitchen in the now aba.docx
SUSAN GLASPELL TRIFLES      SCENE The kitchen in the now aba.docxSUSAN GLASPELL TRIFLES      SCENE The kitchen in the now aba.docx
SUSAN GLASPELL TRIFLES      SCENE The kitchen in the now aba.docx
 
SUSTAINABLE URBAN DEVELOPMENT, GOVERNANCE, AND POLICY A COMPARATIVE.docx
SUSTAINABLE URBAN DEVELOPMENT, GOVERNANCE, AND POLICY A COMPARATIVE.docxSUSTAINABLE URBAN DEVELOPMENT, GOVERNANCE, AND POLICY A COMPARATIVE.docx
SUSTAINABLE URBAN DEVELOPMENT, GOVERNANCE, AND POLICY A COMPARATIVE.docx
 
Susan Wolf thinks that that meaning has both a subjective and an.docx
Susan Wolf thinks that that meaning has both a subjective and an.docxSusan Wolf thinks that that meaning has both a subjective and an.docx
Susan Wolf thinks that that meaning has both a subjective and an.docx
 
Sustainable Urban Development, Governance and Policy A Comparative .docx
Sustainable Urban Development, Governance and Policy A Comparative .docxSustainable Urban Development, Governance and Policy A Comparative .docx
Sustainable Urban Development, Governance and Policy A Comparative .docx
 
SU_NSG6001_W4A2_PANDEY_R.doc.docxby Ram PandeySubmis.docx
SU_NSG6001_W4A2_PANDEY_R.doc.docxby Ram PandeySubmis.docxSU_NSG6001_W4A2_PANDEY_R.doc.docxby Ram PandeySubmis.docx
SU_NSG6001_W4A2_PANDEY_R.doc.docxby Ram PandeySubmis.docx
 
SUSTAINABLE ENERGY SYSTEMS 1 P a g e .docx
SUSTAINABLE ENERGY SYSTEMS  1  P a g e .docxSUSTAINABLE ENERGY SYSTEMS  1  P a g e .docx
SUSTAINABLE ENERGY SYSTEMS 1 P a g e .docx
 

Recently uploaded

BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
Nguyen Thanh Tu Collection
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
sayalidalavi006
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
RitikBhardwaj56
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
Celine George
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
Celine George
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
RAHUL
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
National Information Standards Organization (NISO)
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
Colégio Santa Teresinha
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
mulvey2
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
Celine George
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
WaniBasim
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
Priyankaranawat4
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
TechSoup
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
BÀI TẬP BỔ TRỢ TIẾNG ANH 8 CẢ NĂM - GLOBAL SUCCESS - NĂM HỌC 2023-2024 (CÓ FI...
 
Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5Community pharmacy- Social and preventive pharmacy UNIT 5
Community pharmacy- Social and preventive pharmacy UNIT 5
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...The simplified electron and muon model, Oscillating Spacetime: The Foundation...
The simplified electron and muon model, Oscillating Spacetime: The Foundation...
 
How to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 InventoryHow to Setup Warehouse & Location in Odoo 17 Inventory
How to Setup Warehouse & Location in Odoo 17 Inventory
 
How to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRMHow to Manage Your Lost Opportunities in Odoo 17 CRM
How to Manage Your Lost Opportunities in Odoo 17 CRM
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UPLAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
LAND USE LAND COVER AND NDVI OF MIRZAPUR DISTRICT, UP
 
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
Pollock and Snow "DEIA in the Scholarly Landscape, Session One: Setting Expec...
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
MARY JANE WILSON, A “BOA MÃE” .
MARY JANE WILSON, A “BOA MÃE”           .MARY JANE WILSON, A “BOA MÃE”           .
MARY JANE WILSON, A “BOA MÃE” .
 
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptxC1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
C1 Rubenstein AP HuG xxxxxxxxxxxxxx.pptx
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17How to Make a Field Mandatory in Odoo 17
How to Make a Field Mandatory in Odoo 17
 
Liberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdfLiberal Approach to the Study of Indian Politics.pdf
Liberal Approach to the Study of Indian Politics.pdf
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
clinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdfclinical examination of hip joint (1).pdf
clinical examination of hip joint (1).pdf
 
Walmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdfWalmart Business+ and Spark Good for Nonprofits.pdf
Walmart Business+ and Spark Good for Nonprofits.pdf
 
The basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptxThe basics of sentences session 6pptx.pptx
The basics of sentences session 6pptx.pptx
 

System Security Plan For {System Name}Version Date.docx

  • 1. System Security Plan For: {System Name} Version: Date: Prepared By: System Identification System Name/Title Responsible Organization Information Contact(S) Assignment of Security Responsibility System Operational Status General Description/Purpose System Environment System Interconnection/Information Sharing Laws, Regulations, and Policies Affecting the System Sensitivity of Information Handled General Description of Sensitivity Management Controls
  • 2. Risk Assessment and Management Review of Security Controls Rules of Behavior Planning for Security in the Life Cycle Initiation Phase Development/Acquisition Phase Implementation Phase Operation/Maintenance Phase Disposal Phase Authorized Processing Operational Controls Personnel Security Physical and Environmental Protection Production, Input/Output Controls Contingency Planning Maintenance Controls Data Integrity/Validation Controls Documentation Security Awareness and Training
  • 3. Incident Response Capability Technical Controls Identification and Authentication Authorization/Access Controls Public Access Controls Audit Trails System Security Plan https://www.sans.org/projects/systemsecurity.php In this assignment, students will learn to integrate course topics into an actionable security plan. Use your organization's current system security (if this is not available find one on the Internet), and create a system security plan that is appropriate for the environment under consideration. Note: If you work in a large company, create the system security plan for a single division or department. Use the "System Security Plan Template," to complete this assignment. Make sure to include screenshots (as applicable). Refer to the "System Security Plan," located within the Topic Materials, when working on this assignment. This resource provides detailed explanations of each section that should be included within the plan. APA style is not required, but solid technical writing is expected. This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
  • 4. System Security Plan https://www.sans.org/projects/systemsecurity.php In this assignment, students will learn to integrate course topics into an actionable security plan. Use your organization's current system security (if this is not available find one on the Internet), and create a system security plan that is appropriate for the environment under consideration. Note: If you work in a large company, create the system security plan for a single division or department. Use the "System Security Plan Template," to complete this assignment. Make sure to include screenshots (as applicable). Refer to the "System Security Plan," located within the Topic Materials, when working on this assignment. This resource provides detailed explanations of each section that should be included within the plan. APA style i s not required, but solid technical writing is expected. This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion.
  • 5. System Security Plan https://www.sans.org/projects/systemsecurity.php In this assignment, students will learn to integrate course topics into an actionable security plan. Use your organization's current system security (if this is not available find one on the Internet), and create a system security plan that is appropriate for the environment under consideration. Note: If you work in a large company, create the system security plan for a single division or department. Use the "System Security Plan Template," to complete this assignment. Make sure to include screenshots (as applicable). Refer to the "System Security Plan," located within the Topic Materials, when working on this assignment. This resource provides detailed explanations of each section that should be included within the plan. APA style is not required, but solid technical writing is expected. This assignment uses a rubric. Please review the rubric prior to beginning the assignment to become familiar with the expectations for successful completion. System Security Plan 1 Unsatisfactory 0.00% 2 Less than Satisfactory 65.00%
  • 6. 3 Satisfactory 75.00% 4 Good 85.00% 5 Excellent 100.00% 100.0 %Content 20.0 %System Identification The student does not complete this section of the plan adequately. Subject knowledge is not evident. The student only outlines some of the identifying information about the system with few supporting details and examples. Little subject knowledge is evident. The student provides basic identifying information about the system with some supporting details and examples. Subject knowledge appears to be good. The student provides detailed identifying information about the system with supporting details and examples. Subject knowledge appears to be good. The student provides comprehensive identifying information (who is responsible for it, its purpose, and the sensitivity) about the system with supporting details and examples; information and justifications are accurate and appropriate. All sub sections are complete. Subject knowledge is excellent. 20.0 %Management Controls The student does not complete this section of the plan adequately. Subject knowledge is not evident. The student only outlines some of the management control measures to meet the protection requirements of the major application or general support system with few supporting details and examples. Little subject knowledge is evident.
  • 7. The student provides basic management control measures to meet the protection requirements of the major application or general support system with some supporting details and examples. Subject knowledge appears to be good. The student provides detailed management control measures to meet the protection requirements of the major application or general support system with supporting details and examples. Subject knowledge appears to be good. The student comprehensively describes the management control measures to meet the protection requirements of the major application or general support system with supporting details; information and justifications are accurate and appropriate. All sub sections are complete. Subject knowledge is excellent. 20.0 %Operational Controls The student does not complete this section of the plan adequately. Subject knowledge is not evident. The student only outlines some of the operational control measures to meet the protection requirements of the target systems with few supporting details and examples. Little subject knowledge is evident. The student provides basic operational control measures to meet the protection requirements of the target systems with some supporting details and examples. Subject knowledge appears to be good. The student provides detailed operational control measures to meet the protection requirements of the target systems with supporting details and examples. Subject knowledge appears to be good. The student comprehensively describes the operational control measures to meet the protection requirements of the target systems with supporting details; information and justifications are accurate and appropriate. All sub sections are complete. Subject knowledge is excellent. 20.0 %Technical Controls
  • 8. The student does not complete this section of the plan adequately. Subject knowledge is not evident. The student only outlines some of the technical control measures to meet the protection requirements of the major application or general support system with few supporting details and examples. Little subject knowledge is evident. The student provides basic technical control measures to meet the protection requirements of the major application or general support system with some supporting details and examples. Subject knowledge appears to be good. The student provides detailed technical control measures to meet the protection requirements of the major application or general support system with supporting details and examples. Subject knowledge appears to be good. The student comprehensively describes the technical control measures to meet the protection requirements of the major application or general support system with supporting details; information and justifications are accurate and appropriate. All sub sections are complete. Subject knowledge is excellent. 10.0 %Screenshots The student does not include the necessary screenshots for submission. NA NA The student includes most of the necessary screenshots as a proof of the completion of system security plan. The student includes all the necessary screenshots as a proof of the completion of system security plan. 10.0 %Language Use, Audience Awareness and Mechanics of Writing Surface errors are pervasive enough that they impede communication of meaning. Inappropriate word choice and/or sentence construction are employed. Frequent and repetitive mechanical errors distract the reader.
  • 9. Inconsistencies in language choice (register) and/or word choice are present. Some mechanical errors or typos are present, but are not overly distracting to the reader. Audience-appropriate language is employed. Prose is largely free of mechanical errors, although a few may be present. The writer uses a variety of sentence structures and effective figures of speech. Prose is largely free of mechanical errors. The writer uses a variety of effective sentence structures, figures of speech, and industry terminology. The writer is clearly in command of standard, written academic English. 100 %Total Weightage System Security Plan 1 Unsatisfactory 0.00% 2 Less than Satisfactory 65.00% 3
  • 10. Satisfactory 75.00% 4 Good 85.00% 5 Excellent 100.00% 100.0 %Content 20.0 % System Identification The student does not complete this section of the plan adequately. Subject knowledge is not evident. The student only outlines some of the identifying information about the system with few supporting details and examples. Little
  • 11. subject knowledge is eviden t. The student provides basic identifying information about the system with some supporting details and examples. Subject knowledge appears to be good. The student provides detailed identifying information about the system with supporting details and exam ples. Subject knowledge appears to be good. The student provides comprehensive identifying information (who is responsible for it, its purpose, and the sensitivity) about the system with supporting details and examples; information and justifications are a ccurate and appropriate. All sub sections are complete. Subject knowledge is excellent. 20.0 %
  • 12. Management Controls The student does not complete this section of the plan adequately. Subject knowledge is not evident. The student only outlines some of the management control measures to meet the protection requirements of the major application or general support system with few supporting details and examples. Little subject knowledge is evident. The student provides basic management control measures to me et the protection requirements of the major application or general support system with some supporting details and examples. Subject knowledge appears to be good. The student provides detailed management control measures to meet
  • 13. the protection requirement s of the major application or general support system with supporting details and examples. Subject knowledge appears to be good. The student comprehensively describes the management control measures to meet the protection requirements of the major applicat ion or general support system with supporting details; information and justifications are accurate and appropriate. All sub sections are complete. Subject knowledge is excellent. 20.0 % Operational Controls The student does not complete this section of t he plan adequately. Subject knowledge is not evident. The student only outlines
  • 14. some of the operational control measures to meet the protection requirements of the target systems with few supporting details and examples. Little subject knowledge is evident . The student provides basic operational control measures to meet the protection requirements of the target systems with some supporting details and examples. Subject knowledge appears to be good. The student provides detailed operational control measure s to meet the protection requirements of the target systems with supporting details and examples. Subject knowledge appears to be good. The student comprehensively describes the operational control measures to meet the protection requirements of the target
  • 15. systems with supporting details; information and justifications are accurate and appropriate. All sub sections are complete. Subject knowledge is excellent. 20.0 % Technical Controls The student does not complete this section of the plan adequately. Sub ject knowledge is not evident. The student only outlines some of the technical control measures to meet the protection requirements of the major application or general support system with few supporting details and The student provides bas ic technical control measures to meet the protection requirements of the major application or general support system with some supporting The student provides detailed technical control
  • 16. measures to meet the protection requirements of the major application or general support system with supporting details The student comprehensively describes the technical control measures to meet the protection r equirements of the major application or general support system with supporting details; information and justifications are System Security Plan 1 Unsatisfactory 0.00% 2 Less than Satisfactory 65.00% 3 Satisfactory 75.00% 4 Good 85.00% 5 Excellent 100.00% 100.0 %Content 20.0 % System Identification The student does not
  • 17. complete this section of the plan adequately. Subject knowledge is not evident. The student only outlines some of the identifying information about the system with few supporting details and examples. Little subject knowledge is evident. The student provides basic identifying information about the system with some supporting details and examples. Subject knowledge appears to be good. The student provides detailed identifying information about the system with supporting details and examples. Subject knowledge appears to be good. The student provides comprehensive identifying information (who is responsible for it, its purpose, and the sensitivity) about the system with supporting details and examples; information and justifications are accurate and appropriate. All sub sections are complete. Subject knowledge is excellent.
  • 18. 20.0 % Management Controls The student does not complete this section of the plan adequately. Subject knowledge is not evident. The student only outlines some of the management control measures to meet the protection requirements of the major application or general support system with few supporting details and examples. Little subject knowledge is evident. The student provides basic management control measures to meet the protection requirements of the major application or general support system with some supporting details and examples. Subject knowledge appears to be good. The student provides detailed management control measures to meet the protection requirements of the major application or general support system with supporting details and examples. Subject
  • 19. knowledge appears to be good. The student comprehensively describes the management control measures to meet the protection requirements of the major application or general support system with supporting details; information and justifications are accurate and appropriate. All sub sections are complete. Subject knowledge is excellent. 20.0 % Operational Controls The student does not complete this section of the plan adequately. Subject knowledge is not evident. The student only outlines some of the operational control measures to meet the protection requirements of the target systems with few supporting details and examples. Little subject knowledge is evident. The student provides basic operational control measures to meet the protection requirements of the target systems with some supporting details and examples. Subject
  • 20. knowledge appears to be good. The student provides detailed operational control measures to meet the protection requirements of the target systems with supporting details and examples. Subject knowledge appears to be good. The student comprehensively describes the operational control measures to meet the protection requirements of the target systems with supporting details; information and justifications are accurate and appropriate. All sub sections are complete. Subject knowledge is excellent. 20.0 % Technical Controls The student does not complete this section of the plan adequately. Subject knowledge is not evident. The student only outlines some of the technical control measures to meet the protection requirements of the major application or general support system with
  • 21. few supporting details and The student provides basic technical control measures to meet the protection requirements of the major application or general support system with some supporting The student provides detailed technical control measures to meet the protection requirements of the major application or general support system with supporting details The student comprehensively describes the technical control measures to meet the protection requirements of the major application or general support system with supporting details; information and justifications are