all the information is in picture.. Thank you

1 answer below »
all the information is in picture.. Thank you
Answered 6 days AfterJan 21, 2021

Answer To: all the information is in picture.. Thank you

Neha answered on Jan 28 2021
128 Votes
Contents
Executive summary    2
Introduction    3
Security Plan    4
Security Counter Measures    7
Security Policy    7
Training    8
Conclusion    8
References    9
Executive summary
The information security is the most important mission for the University, and it is the wide responsibility for the University. The University is now planning to have a security plan which can help them to define the standards and procedures for the information security which can help them to
make sure that they have availability, confidentiality and integrity for the information system resources and the data which comes under the control of University. The purpose of designing the security plan is to provide overview for the requirements of the security with respect to the information technology system and also describe the controls which can be used to meet the requirements. The University also recognises its responsibility for promoting the security awareness among the stakeholders or members of the community in University. The objective of designing the security plan is to improve protection for the resources of IT department. The University is responsible to protect the availability, integrity and confidentiality of the information assets in a University.
There should not be any unauthorized modification, disclosure or deletion of the IT assets as it can compromise with the integrity of the mission, which is followed by the University, it is a collective responsibility for all the users to make sure that they are familiar with the policies of the universities which includes privacy, facilities and properties policies and acceptable use of the IT resources.
This plan is applied to the University and it's computing on network resources which can be defined in the acceptable use of the IT resources and the other facilities and property policies. Few additional procedures and standards can be used for the specific data or network or the computer systems which are operated by any 3rd party service provider. This plan can be applied to all the members and entities of the universities and this needs to be shared with the Technical Support staff and the IT asset owners of the University.
Introduction
The University is planning to have a IT security plan which will have proper definition for the procedures and standards of the information security to make sure that there is availability, confidentiality and integrity of all the resources and information systems which comes under the control of The University and the information technology Department. This report includes the proper documentation for the security plan, rose and responsibilities related with the groups and individuals who are connected with the University, description about the proper standard procedure which need to be followed for the information system security plan and its documentation. It contains information about the security concerns which are related with the system management, technology, access, usage and security of the resources in the system, data integrity, data restrictions and classification (Walton, J.P).
This report also includes few points for the risk management, security incident response and the awareness and training which needs to be provided to the member of the University. The security plan in the University can be used as the supplement for the official security policies, procedures and standards which needs to be established in the University. This security plan can be used as the comply for the policies and regulations which is set down by the University, state, information security management act and the other regulations of the state and federal.
The University has already set down the procedures and standards in their security plan which can be applied to all the resources and systems which are related with information technology and connected with the store network of the University.
This information security plan can be used to describe the safeguards of the University which can help them to protect their information, resources and the data as required under the system protection act. These safeguards are designed for making some reasonable efforts to make sure that the confidentiality and security off the data, resources information are covered. They can be used to protect against the anticipated hazards and threats for the integrity and security of the information. They are used to protect against unauthorised access or usage of the data, resources and information which can result in substantial harm for the customer.
The security plan can be used to provide procedure which can help us to...
SOLUTION.PDF

Answer To This Question Is Available To Download

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here