W2 Assignment: “Security Management Models”
Describe the InfoSec management models, selection of InfoSec management models, the fundamental elements of key InfoSec management practices, emerging trends in the certification and accreditation of U.S. federal information technology (IT) systems, key components and implementation strategies of a security performance measurement programs.
Security Management Models
InfoSec models are standards that are used for reference or comparison and often serve as the stepping-off point for emulation and adoption. As the Chief Information Officer, you have been tasked to provide a report to senior management concerning the Access Control Models and how the implementation of this model secures the organizations information system from external and insider threats.
Prepare a 350- to 1,050-word paper that fully discusses the topic questions
Format your paper consistent with APA guidelines. Format your paper consistent with APA guidelines.
W2 Lab: “Authorized Uses”
You are the Information Security Officer of Mahtmarg Manufacturing a small manufacturing company worth approximately $5 Million who provides fiber cable to local businesses, individual customers and to government organizations. In the course of the next eight weeks you will be creating your Information Security Plan (Issue-Specific Security Policy in Table 4-3 of the textbook) step by step using this scenario..
Step 2: Develop the Authorized Uses section of your ISP
In this week’s Lab you will develop the Authorized Use section of your ISP to include:
Who can use the technology?
Define fair and responsible use.
Explain how the company will protect personal as well as proprietary information.
Include access to company systems from ‘outside connections’ (e.g. – public hotspot)