CourseLover

(12)

$10/per page/Negotiable

About CourseLover

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Algebra,Applied Sciences See all
Algebra,Applied Sciences,Architecture and Design,Art & Design,Biology,Business & Finance,Calculus,Chemistry,Engineering,Health & Medical,HR Management,Law,Marketing,Math,Physics,Psychology,Programming,Science Hide all
Teaching Since: May 2017
Last Sign in: 293 Weeks Ago, 2 Days Ago
Questions Answered: 27237
Tutorials Posted: 27372

Education

  • MCS,MBA(IT), Pursuing PHD
    Devry University
    Sep-2004 - Aug-2010

Experience

  • Assistant Financial Analyst
    NatSteel Holdings Pte Ltd
    Aug-2007 - Jul-2017

Category > Management Posted 09 Aug 2017 My Price 10.00

Security Policy and Standards: Security Audits, assignment help

Please follow RUBRIC.

Introduction:

An Information Security Management System (ISMS) represents a systematic approach for designing, implementing, maintaining, and auditing an organization’s information system security objectives. As with any process, if an ISMS is not continually monitored, its effectiveness will tend to deteriorate.

For this task you will be using the attached “Healthy Body Wellness Center Risk Assessment” case study. In this task, you will be writing a white paper outlining the scope of an ISMS plan for the Healthy Body Wellness Center and an evaluation of the previously conducted risk assessment.

The first step in initiating an ISMS is to form a committee of upper level management that would set the tone for the ISMS. Assume you are part of that team. Initiating an ISMS involves developing a plan that includes the scope of the ISMS and identifying and assessing risk. The risk assessment for the Health Body Wellness Center has already been conducted. Your task is to define the ISMS scope for the Healthy Body Wellness Center and make recommendations for implementing the resulting ISMS plan.

Requirements:

A. Outline the scope for the ISMS plan being developed in the case study by including the following:

1. information about the business objectives for the organization

2. a description of the guiding security principles of the organization

3. a justification of the processes that should be included in the scope, including the following points:

• what the process is

• a definition of the process

• how you would apply the process to the scenario

• why the process is needed or should be included in the scope of the ISMS

4. a justification of the information systems that should be included in the scope, including the following points:

• what the information system that should be included is

• what the purpose of the IS is

• what the duties of the IS according to the scenario are

• why this information system should be included in the ISMS plan

5. a description of the IT infrastructure that includes a description of information flow

B. Recommend additional steps that the organization would need to take to implement the ISMS plan.

1. Discuss what each recommended step entails.

2. Justify each recommended step.

C. When you use sources, include all in-text citations and references in APA format.

Attachments:

Answers

(12)
Status NEW Posted 09 Aug 2017 07:08 AM My Price 10.00

----------- He-----------llo----------- Si-----------r/M-----------ada-----------m -----------Tha-----------nk -----------You----------- fo-----------r u-----------sin-----------g o-----------ur -----------web-----------sit-----------e a-----------nd -----------acq-----------uis-----------iti-----------on -----------of -----------my -----------pos-----------ted----------- so-----------lut-----------ion-----------. P-----------lea-----------se -----------pin-----------g m-----------e o-----------n c-----------hat----------- I -----------am -----------onl-----------ine----------- or----------- in-----------box----------- me----------- a -----------mes-----------sag-----------e I----------- wi-----------ll

Not Rated(0)