Develop a risk management plan in which you: a. Describe at least three (3) possible risk management efforts that could be used to assess threats and unknown issues. b. Determine why defining priorities is an important part of the process when enumerating and having efficient risk control          measures.

  1. Part 3: Physical Security Plan3. Recommend a physical security plan that could be used to protect sensitive areas such as telecom rooms, employee only areas,     and manufacturing facilities in which you:
    a. Include at least three (3) specific methods.

    Part 4: Enterprise Information Security Compliance Program

    4. Establish an enterprise information security compliance program that addresses the concerns of the board of directors of the     organization in which you:
    a. Describe specific plans and control objectives that could be adopted to address the known issues.
    b. Suggest at least three (3) information security policies that could be developed and practiced within the organization for data         security assurance.
    c. Outline the steps you would take to define the security needs of the organization in terms of duties, staffing, training, and         processes.

    Part 5: Risk Management Plan

    5. Develop a risk management plan in which you:
    a. Describe at least three (3) possible risk management efforts that could be used to assess threats and unknown issues.
    b. Determine why defining priorities is an important part of the process when enumerating and having efficient risk control          measures.
    c. Suggest specific technical and management controls that could be enacted in order to monitor risks accurately.

    6. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality     resources.

    Your assignment must follow these formatting requirements:

    • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
    • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
    • Include charts or diagrams created in Visio or one of its equivalents such as Dia. The completed diagrams / charts must be imported into the Word document before the paper is submitted.
    • The specific course learning outcomes associated with this assignment are:
    • Describe and apply the 14 areas of common practice in the Department of Homeland Security (DHS) Essential Body of Knowledge.
    • Describe best practices in cybersecurity.
    • Describe physical security plans and processes.
    • Evaluate the ethical concerns inherent in cybersecurity and how these concerns affect organizational policies.
    • Explain legal and regulatory compliance practices.
    • Explain risk management plans and policies.
    • Describe physical security plans and processes.
    • Develop a cybersecurity plan that incorporates the Department of Homeland Security (DHS) Essential Body of Knowledge.
    • Identify the strategic management issues in cybersecurity planning and response.
    • Explain data security competencies to include turning policy into practice.
    • Compare and contrast the functional roles of an organization in the context of cybersecurity.
    • Identify and analyze the role of the Chief Information Officer, Information Security Officer, and IT Security Compliance Officer in the context of cybersecurity.
    • Use technology and information resources to research issues in cybersecurity.
    • Write clearly and concisely about topics associated with cybersecurity using proper writing mechanics and technical style conventions.
    • Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills. Click here to access the rubric for this assignment.
  2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

"Get 15% discount on your first 3 orders with us"
Use the following coupon
FIRST15

Order Now