2 assigments- week 2 assignment and la
W2 Assignment: “Security Management Models”Describe the InfoSec management models, selection of InfoSec management models, the fundamental elements of key InfoSec management practices, emerging trends in the certification and accreditation of U.S. federal information technology (IT) systems, key components and implementation strategies of a security performance measurement programs.Security Management ModelsInfoSec models are standards that are used for reference or comparison and often serve as the stepping-off point for emulation and adoption. As the Chief Information Officer, you have been tasked to provide a report to senior management concerning the Access Control Models and how the implementation of this model secures the organizations information system from external and insider threats.Preparexc2xa0a 350- to 1,050-word paper that fully discusses the topic questionsFormatxc2xa0your paper consistent with APA guidelines. Format your paper consistent with APA guidelines.xc2xa0W2 Lab: “Authorized Uses”Overview:xe2x80xa8You are the Information Security Officer of Mahtmarg Manufacturing a small manufacturing company worth approximately $5 Million who provides fiber cable to local businesses, individual customers and to government organizations. In the course of the next eight weeks you will be creating your Information Security Plan (Issue-Specific Security Policy in Table 4-3 of the textbook) step by step using this scenario..Your Taskxe2x80xa8Step 2: Develop the Authorized Uses section of your ISPIn this weekxe2x80x99s Lab you will develop the Authorized Use section of your ISP to include:Who can use the technology?Define fair and responsible use.Explain how the company will protect personal as well as proprietary information. xc2xa0Include access to company systems from xe2x80x98outside connectionsxe2x80x99 (e.g. xe2x80x93 public hotspot) ‘


Leave a Reply
Want to join the discussion?Feel free to contribute!