theories-of-security-management-1

Assignment 1: Business Continuity Plan Report
Due Week 3 and worth 50 points

During your first week as a Senior Information Systems Security director, you met with the Chief Information Officer (CIO) and Chief Security Officer (CSO). During the meeting, they revealed their deep concerns with the organization’s business continuity plans (BCP). Since you were previously responsible for BCPs for a large enterprise they are requesting that you review the company’s BCP staffing plans and training plans.

They would like you to provide a report with your findings and recommendations for corrective action.

Additionally, include why it is important to include legal representatives on the business continuity planning team and provide an example of laws or regulation the company should include to remain compliant.

While there is not a specific page requirement for this assignment, students are required to fully develop ideas and answer questions to the point that no further questions are left in the mind of the reader. If the instructor can clearly find the answers to their questions, the ideas within the report are fully developed. If there are unanswered or under-answered questions, further development of the report is required. 
Keep the following in mind:

  • More words do not necessarily indicate more meaning.
  • When an employee is tasked with a project in the workplace that requires a report, the report should fully answer all the questions needing to be answered. In this school environment, students are learning how to prepare such documents.
  • Consider your audience. Although instructors are very knowledgeable on the subject matter, they need to verify that the student has absorbed the material through a written report. Students should therefore write to an audience of a co-worker or classmate who does not know the answers to the questions posed.
  • For students who are more comfortable with more specific guidelines, ideas can generally be developed in one to three paragraphs. The goal of writing in this class is to demonstrate what you have learned. 

Week 3 | Discussion

Cryptography Keys

Cryptography provides confidentiality, integrity authentication, and nonrepudiation for sensitive information while it is stored (at rest), traveling across a network (in transit), and existing in memory (in use). Cryptography keys play in the world of data security and are an extremely important security technology embedded in many of the security controls used to protect information from unauthorized visibility and use.
Let’s say you work for one of the following types of industry:

  • Manufacturing
  • Government
  • Research
  • Service
  • Consulting

After you choose one of the above, consider the three types of algorithms commonly used today. Which do you find to be the most secure? Which is the most complex? Which did you struggle to understand? What do you think you need to know as a manager in order to choose the right security systems for your company? Be sure to fully develop your responses and support your opinion with reasons from your study this week.

"Get 15% discount on your first 3 orders with us"
Use the following coupon
FIRST15

Order Now