+1443 776-2705 panelessays@gmail.com

 

Assignment Content

  1. Cyber Security Engineers are responsible for safeguarding computer networks and systems in an organization in order to protect the sensitive data they store.

    Take on the role of Cyber Security Engineer for the organization (Sony Pictures).
    Develop a 5- to 6-page manual using the Security Standards, Policies, and Procedures Template with recommendations to management of security standards, polices, and procedures which should be implemented in your chosen organization. The page assignment length requirement applies to the content of the assignment. Start the assignment with an APA formatted title page and add a reference section with at least two professional references. Use the references in the text of the assignment. For assignments that require use of the template, insert the completed template into the APA document. 

    Research and include the following:

    • Explain the importance to your organization of implementing security policies, plans, and procedures. Discuss how security policies, plans, and procedures will improve the overall security of the organization. 
    • Recommend appropriate policies and procedures for: 
    • Data privacy 
    • Data isolation 
    • NDA 
    • IP Protection 
    • Passwords 
    • Acceptable use of organizational assets and data 
    • Employee policies (separation of duties/training) 
    • Risk response 
    • Avoidance 
    • Transference 
    • Mitigation 
    • Acceptance 
    • Compliance examples that might affect your organization or others [Regulatory, Advisory, Informative]
    • HIPPA 
    • FERPA 
    • ISO 
    • NIST 
    • SEC 
    • Sarbanes/Oxley 
    • Incident response 
    • Preparation 
    • Identification 
    • Containment 
    • Eradication 
    • Recovery 
    • Lessons learned 
    • Auditing 
    • Environmental/Physical 
    • Administrative
    • Configuration

3

CMGT 400 Grading Rubric Individual – Week 3 Security Standards, Policies, Procedures Manual

MEETS CRITERIA?

Security Standards, Policies, and Procedures Manual

PTs

Grade

COMMENTS

Content (97 points)

Take on the role of Cyber Security Engineer for the organization you chose in Week 1 .Develop a 5- to 6-page manual using the Security Standards, Policies, and Procedures Template with recommendations to management of security standards, polices, and procedures which should be implemented in your chosen organization.

9

Research and include the following:

· Explain the importance to your organization of implementing security policies, plans, and procedures. Discuss how security policies, plans, and procedures with improve the overall security of the organization. (35pts)

· Recommend appropriate policies and procedures for:  (17pts)

· Data privacy 

· Data isolation 

· NDA 

· IP Protection 

· Passwords 

· Acceptable use of organizational assets and data 

· Employee policies (separation of duties / training) 

· Environmental/Physical 

· Risk response (9)

· Avoidance 

· Transference 

· Mitigation 

· Acceptance 

· Compliance examples that might affect your organization or others [Regulatory, Advisory, Informative] (9)

· HIPPA 

· FERPA 

· ISO 

· NIST 

· SEC 

· Sarbanes/Oxley 

· Incident response (9)

· Preparation 

· Identification 

· Containment 

· Eradication 

· Recovery 

· Lessons learned 

· Miscellaneous (9)

· Auditing 

· Administrative

· Configuration

88

X out of 97

Research

Assignment has research depth including at least two outside relevant peer reviewed references from course material and/or the library.

10

Organization

Assignment is organized appropriately covering all required topics in a logical sequence and applies the Security Standards, Policies, and Procedures Template . Title, introduction, body, conclusion and references are included in required sequence.

4

Quality and APA:

Assignment projects professional, quality image, meets academic integrity requirements. Includes Power Point and MS Word document required by the assignment in APA format with label. Include title page and reference section. References in APA format. No spelling errors – the paper has obviously been proofread. Title and reference slides/pages do not count toward the length requirement.

4

TOTAL POINTS FOR RESEARCH, ORGANIZATION, QUALITY, AND APA REQUIREMENTS

X out of 18

TOTAL POINTS

(X out of 115 possible points) 04-29-19 rpg

,

CMGT/400 v7

Threats, Attacks, and Vulnerability Assessment Template

CMGT/400 v7

Page 2 of 2

C:UsersdjshireyOneDrive - University of PhoenixF_DriveStyle GuidesUPX LogosHorizontal formatUOPX_Sig_Hor_Black_Medium.pngSecurity Standards, Policies, and Procedures Manual Template

Instructions: Replace the information in brackets [ ] with information relevant to your project.

Cyber Security Engineers are responsible for safeguarding computer networks and systems in an organization in order to protect the sensitive data they store.  

Take on the role of Cyber Security Engineer for the organization you chose in Week 1. Research the following information for your chosen organization. Develop a Security Standards, Policies, and Procedures Manual using this template with recommendations to management of security standards, polices, and procedures which should be implemented in your organization.

[Organization Name]

Overview

Explain the importance to your organization of implementing security policies, plans, and procedures. Discuss how security policies, plans, and procedures will improve the overall security of the organization.

[Response]

Data Privacy Policies and Procedures

[Response]

Data Isolation Policies and Procedures

[Response]

Non-Disclosure Agreement (NDA) Policies and Procedures

[Response]

Intellectual Property (IP) Policies and Procedures

[Response]

Password Policies and Procedures

[Response]

Acceptable Use of Organizational Assets and Data Policies and Procedures

[Response]

Employee Policies and Procedures (Separation of Duties/Training)

[Response]

Risk Response Policies and Procedures

Define avoidance, transference, mitigation, and acceptance strategies and criteria.

[Response]

Compliance (Regulatory, Advisory, Informative)

Examples could include: HIPPA, FERPA, ISO, NIST, SEC, and Sarbanes/Oxley.

[Response]

Incident Response Policies and Procedures

Include: Preparation, Identification, Containment, Eradication, Recovery, and Lessons Learned

[Response]

Auditing Policies and Procedures

[Response]

Environmental/Physical Policies and Procedures

[Response]

Administrative Policies and Procedures

[Response]

Configuration Policies and Procedures

[Response]

Copyright© 2018 by University of Phoenix. All rights reserved.

Copyright© 2018 by University of Phoenix. All rights reserved.