Question: Develop an initial scope document and proposal for deploying an organizational security policy plan. Do this by gathering facts about an organization relevant to your
Develop an initial scope document and proposal for deploying an organizational security policy plan. Do this by gathering facts about an organization relevant to your professional goals and identifying its business problems and goals, stakeholders, and security policy needs.
Welcome to IT-FP3358!
In this course, you develop an enterprise security infrastructure solution for one of the companies listed below. Consult with faculty if you would like to use a different company. The solution will drive all assessments in this course. The recommendations made should enhance the existing security strategy, not just discuss what is already in place. You will need the background data of what is already in place as a starting point for adjusting the company's security strategy. Additionally, there is a requirement to consider international information security requirements and align them to your target company. The company may have clients or employees that are citizens of other countries.
SHOW LESS
- Company 1: Ford Motor Company.
- Company 2: Anthem Blue Cross Blue Shield.
- Company 3: Allegis Group.
- Company 4: Henry Ford Health System.
- Company 5: Target Corporation.
- Company 6: Capella University.
Consider if you were a cybersecurity analyst presenting the same scope and approach to senior leadership. Visit Cybersecurity Career Pathway to view job duties and certifications for the prior-mentioned entry-level role for reference.
---
Instructions
First, select a company from the list in this assessment's introduction. You may choose a different company, but discuss it with faculty first. This same organization is used for all of your assessments in this course.
Once you have selected your organization, you will evaluate the existing security infrastructure and suggest improvements appropriate to improving the cost and efficiency of managing the security. If assumptions need to be made, please list those assumptions in your assessment, so that faculty is aware.
For this assessment, use the suggested resources, the Capella library, and the Internet to research the subject matter.
- Describe the scope of your project by providing an overview of the selected organization. Include an overview of the organization, its size and location, and the reason for choosing it.
- Note: There should be at least one link in your references to the company website. The "about" section, annual report, and investor news are good sources of information for developing the scope and approach.
- Describe the main business problems and goals that are related to information technology. Include information about the organizational user, organizational systems, and the security requirements.
- Describe decision makers and stakeholders on whom you would rely to develop a requirements analysis and traverse through the information-gathering phases of a security infrastructure deployment project.
- Define a project timeline and outline that coincides with the system and/or infrastructure component life cycle stages. Additionally, identify the security components, requirements, and concerns that will need to be addressed.
- Explain the roles of availability, confidentiality, authentication, and integrity in identifying the project scope for the organization.
- Given the global nature of the organization, identify any unique challenges that you anticipate facing from regulatory, human resources, and/or cultural standpoints.
- You are encouraged to provide resources and citations.
Step by Step Solution
There are 3 Steps involved in it
Get step-by-step solutions from verified subject matter experts
