Skip to main content

Develop Security Management Plan and Risk Management Plan

15 page

Assignment Description: Final Project – Develop Security Management Plan and Risk Management Plan
Develop a 15-20 page Security Management and Risk Management Plan about an organization of your choosing. Your report should be double-spaced and the page length requirement is exclusive of the title page, table of contents, and references. For your research and analysis, you should identify seven (7) to ten (10) significant articles/sources relevant to your subject organization and identify and assess security management elements and risks for that type of organization. Be sure to carefully cite (using correct APA 6th edition) all sources of information in your report. The analysis will be conducted using only publicly available information (e.g., information obtainable on the Internet (using a browser), company reports, news reports, journal articles, etc.). Your security management elements and risk analysis should consider legitimate, known security issues and threats that pertain to the subject organization.
NIST provides relevant information on security management and risk management. For example, refer to NIST Special Publication 800-30, Risk Management Guide for Information Technology Systems.
Instructions:
Write a 15-20 page Security Management and Risk Management Plan in which you:
  1. Select a Subject Organization: Follow these guidelines:
    1. You may have no connection to the company or its employees (no insider information). All the information you collect must be readily available for anyone to access.
    2. You should pick a company or organization that has sufficient publicly available information to support a reasonable security management plan and risk management plan, particularly including security issue, threat, and vulnerability identification.
  1. Develop Subject Organization Information: Examples of relevant information includes:
    1. Company/Organization name and location
    2. Company/Organization industry and purpose (i.e., the nature of its business)
    3. Company/Organization profile (financial information, standing in its industry, reputation)
    4. Identification of relevant aspects of the company/organization’s computing and network infrastructure, as determined by publicly available information.
  1. Security Management Elements and Risk Analysis
    1. In conducting your analysis, focus on identifying the security management elements and the threats and vulnerabilities faced by your subject organization.
    2. Based on the security elements, threats, and vulnerabilities you identify, next determine both the appropriate security management elements for your organization and the risk analysis and risk mitigation methods for the organization.
  1. Prepare a Security Management and Risk Management Plan
    1. Develop a 15-20 page Security Management and Risk Management Plan about an organization of your choosing.
    2. Incorporate into your plan the information gathered during your research and in the previous steps.
    3. The report should be prepared using APA Style. All sources of information should be indicated via in-line citations and include a list of references.

CLICK HERE TO GET A PROFESSIONAL WRITER TO WORK ON THIS PAPER AND OTHER SIMILAR PAPERS, GET A NON PLAGIARIZED PAPER FROM OUR EXPERTS……

Comments

Popular posts from this blog

Identify and discuss a key milestone in the history of computers that interests you and why.

  Part 1Title: Lab ResponseDiscuss one feature of MS Word and one feature of MS Excel that you found challenging within the lab and why. Examples are WordArt, inserting shapes, adding borders, cell styles, etc. This response should be at least one paragraph in length. Part 2Title: History of Computers Identify and discuss a key milestone in the history of computers that interests you and why. This section should be at least one paragraph. Part 3Title: System Software vs. Application Software In your words, explain the difference between application software and system software as if to another coworker who has limited technical knowledge. Use examples to support your rationalization. This section should be at least two paragraphs. Part 4Title: Blockchain and Cryptocurrency In a minimum of one paragraph each: 1. Conduct some research on the internet and discuss one underlying technology of cryptocurrencies like blockchain, cryptography, distributed ledger technol...

Cybersecurity and Infrastructure Security (CISA)

 Develop a research paper that identifies a specific Department of Homeland Security (DHS) operating agency. Fully describe 1 DHS operating agency from the following list: Cybersecurity and Infrastructure Security (CISA) U.S. Customs and Border Protection (CBP) U.S. Citizenship and Immigration Services (USCIS) Federal Emergency Management Agency (FEMA) U.S. Coast Guard (USCG) U.S. Immigration and Customs Enforcement (ICE) U.S. Secret Service (USSS) Transportation Security Administration (TSA) The information must include a discussion of the selected DHS agency. Identify the agency’s mission, goals, objectives, and metrics. Conduct an analysis of how these mission areas address the threats or challenges. Recommend agency program priorities among the current set of goals, objectives, metrics, or budget items. Justification of all choices is an essential element of this assignment. Reference all source material and citations using APA format. WE OFF...

Discuss how the project

ord count : no idea 1. You are required to write a report on all project activities involved in all the 10 knowledge areas of project management for the entire project life cycle. You should also include a list of the respective PM documents, for example PM Plan, PM Quality Management Plan, Risk management, Procurement, etc. The report must include the activities that are considered before the project is closed out. 2. Discuss how the project quality management plan can provide adequate standards and controls in managing global teams in projects. Your discussion must provide adequate arguments for the need of cultural awareness and legal issues. Regards, The post Discuss how the project appeared first on My Assignment Tutor . Assignment status :  Resolved by our Writing Team Source@ PrimeWritersBay.com GET THIS PAPER COMPLETED FOR YOU FROM THE WRITING EXPERTS   CLICK HERE TO ORDER 100% ORIGINAL PAPERS AT PrimeWritersBay.com NO PLAGIARISM