PART A-3 Pages
Establishing an effective Information Technology Security Policy Framework is critical in the development of a comprehensive security program. Additionally, there are many security frameworks that organizations commonly reference when developing their security programs. Review the security frameworks provided by NIST (SP 800-53), ISO / IEC 27000 series, and COBIT. Assume that you have been hired as a consultant by a medium-sized insurance organization and have been asked to draft an IT Security Policy Framework.
You may create and / or assume all necessary assumptions needed for the completion of this assignment.
Write a three to five (3-5) page paper in which you:
Select a security framework, describe the framework selected, and design an IT Security Policy Framework for the organization.
Describe the importance of and method of establishing compliance of IT security controls with U.S. laws and regulations, and how organizations can align their policies and controls with the applicable regulations.
Analyze the business challenges within each of the seven (7) domains in developing an effective IT Security Policy Framework.
Describe your IT Security Policy Framework implementation issues and challenges and provide recommendations for overcoming these implementation issues and challenges.
Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.
PART B Discussion Please number 75 words per question
1. Describe the main elements of an acceptable use policy. Determine the factors that organizations need to consider when developing their acceptable use policy.
Determine the special considerations that need to be taken into account when developing the acceptable use policy for different types of users (i.e., employees, system administrators, security personnel, contractors, guests, and auditors).
2. Imagine that your supervisor has asked you to draft a brief statement about best practices for user domain policies that will be presented to the executive board. Create five best practices for user domain policies.
Select the best practice that you would emphasize the most during this presentation to the executive board and explain why.
3. Determine the primary considerations that an organization would need to take into account when developing the security policies involving bring your own device (BYOD), portable and mobile devices.
List and examine the major challenges of enforcing policies concerning BYOD, portable and mobile devices.
4. Analyze the IT infrastructure assets that are commonly located in the DMZ. Determine how the types and size of the organization impact the structure of the DMZ.
Propose at least three policies that organizations need to implement for traffic flowing into the DMZ or out of the DMZ.
Professional homework help features
Our ExperienceHowever the complexity of your assignment, we have the right professionals to carry out your specific task. ACME homework is a company that does homework help writing services for students who need homework help. We only hire super-skilled academic experts to write your projects. Our years of experience allows us to provide students with homework writing, editing & proofreading services.
Free revision policy$10
Free bibliography & reference$8
Free title page$8
How our professional homework help writing services work
You first have to fill in an order form. In case you need any clarifications regarding the form, feel free to reach out for further guidance. To fill in the form, include basic informaion regarding your order that is topic, subject, number of pages required as well as any other relevant information that will be of help.Complete the order form
Once we have all the information and instructions that we need, we select the most suitable writer for your assignment. While everything seems to be clear, the writer, who has complete knowledge of the subject, may need clarification from you. It is at that point that you would receive a call or email from us.Writer’s assignment
As soon as the writer has finished, it will be delivered both to the website and to your email address so that you will not miss it. If your deadline is close at hand, we will place a call to you to make sure that you receive the paper on time.Completing the order and download