Week 4 Project Deliverable 2 - Submit Here
Capstone Project Overview
The purpose of this Capstone Project is for students to examine and solve real world information assurance problems and apply associated techniques to create practical solutions. The course takes an integrative and senior security officer approach to address the policy, risk, and control opportunities within cyberspace and IT environments. Deliverables 1 through 5 focus on preparing students toward the final Capstone Project. Skills, experience, and knowledge gained through the completion of prerequisite courses will be used throughout each deliverable. The project contents to be addressed are as follows:
Project Deliverable 2: Security Needs and Objectives
For Project Deliverable 2, you are a newly appointed Security Officer (SO). The Chief Information Security Officer (CISO) has given you sixty days (60) days to deliver a security policy plan to address the organizational growth that the company is anticipating.
Note:
You may create and / or make all necessary assumptions needed for the completion of this assignment.
Use the Internet to research the process that leads to the identification of security needs in an organization. Also, research an organization with a security policy in place, and review how this organization laid down the foundation for its security policy. Review the business requirements for the security project plan. You will be asked to describe the detailed project including the scope of the project; possible security risks, constraints, and assumptions; integration with other systems and infrastructure; and relevant terms that were used throughout the security project.
Submission Requirements
Document (MS Word)
Write a three to four (3-4) page paper in which you:
Explain the process that leads to the identification of security needs and how those needs lay down a foundation for a policy.
Describe the details regarding the type of business in which the company you researched is engaged.
Provide a description about the current system requirements activities within the organization you researched.
Describe the types of data that the company you researched collects to support the business. The description should include the following:
Operational systems
Analytics and interfaces
Infrastructure and security
Use at least two (2) quality resources in this assignment.
Note:
Wikipedia and similar Websites do not qualify as quality resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specif.
1. Week 4 Project Deliverable 2 - Submit Here
Capstone Project Overview
The purpose of this Capstone Project is for students to examine
and solve real world information assurance problems and apply
associated techniques to create practical solutions. The course
takes an integrative and senior security officer approach to
address the policy, risk, and control opportunities within
cyberspace and IT environments. Deliverables 1 through 5 focus
on preparing students toward the final Capstone Project. Skills,
experience, and knowledge gained through the completion of
prerequisite courses will be used throughout each deliverable.
The project contents to be addressed are as follows:
Project Deliverable 2: Security Needs and Objectives
For Project Deliverable 2, you are a newly appointed Security
Officer (SO). The Chief Information Security Officer (CISO)
has given you sixty days (60) days to deliver a security policy
plan to address the organizational growth that the company is
anticipating.
Note:
You may create and / or make all necessary assumptions
needed for the completion of this assignment.
Use the Internet to research the process that leads to the
identification of security needs in an organization. Also,
research an organization with a security policy in place, and
review how this organization laid down the foundation for its
security policy. Review the business requirements for the
security project plan. You will be asked to describe the detailed
project including the scope of the project; possible security
risks, constraints, and assumptions; integration with other
systems and infrastructure; and relevant terms that were used
throughout the security project.
Submission Requirements
Document (MS Word)
Write a three to four (3-4) page paper in which you:
2. Explain the process that leads to the identification of security
needs and how those needs lay down a foundation for a policy.
Describe the details regarding the type of business in which the
company you researched is engaged.
Provide a description about the current system requirements
activities within the organization you researched.
Describe the types of data that the company you researched
collects to support the business. The description should include
the following:
Operational systems
Analytics and interfaces
Infrastructure and security
Use at least two (2) quality resources in this assignment.
Note:
Wikipedia and similar Websites do not qualify as quality
resources.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size
12), with one-inch margins on all sides; citations and references
must follow APA or school-specific format. Check with your
professor for any additional instructions.
Include a cover page containing the title of the assignment, the
student’s name, the professor’s name, the course title, and the
date. The cover page and the reference page are not included in
the required assignment page length.
The specific course learning outcomes associated with this
assignment are:
Discuss cybersecurity strategies and the various frameworks.
Analyze the information planning concepts of change control in
cybersecurity.
Analyze the process of security need identification and
determine its impact on a specific field of business.
Use technology and information resources to research issues in
information assurance.
Write clearly and concisely about information assurance topics
using proper writing mechanics and technical style conventions.