Preview

Is4550 Week5 Assignment1

Satisfactory Essays
Open Document
Open Document
282 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Is4550 Week5 Assignment1
IS4550: Week 5 Assignment: Policy Monitoring and Enforcement
Strategy
Learning Objectives and Outcomes


You will explore policy creation and enforcement actions.



You will describe policy monitoring and enforcement strategies.



You will research automated information technology systems.



You will do research and align a selected automated IT system.

Assignment Requirements
For this assignment, imagine that you work for a Department of Defense (DoD) organization with direct ties to the U.S. Government, and you are a sole supplier to them for military products. Your organization has three different levels of management and of those levels two different unions exist.

The majority of your staff is in another non-supervisory union and you also have contractors. Your organization has approximately 7,000 workers who are located across the U.S. in 35 locations.

You have developed a modified Internet use policy along with a physical access policy. You must invoke these policies at the earliest as a recent security breach has been identified from flaws in these policies.
Identify and describe the legal implications of information systems security (ISS) policy enforcement after these new policies are adapted. Describe a policy monitoring and enforcement strategy for your organization. Also describe what an automated IT security policy compliance system would look like for your organization as management is thinking about this as a possible response to recent security compliance incidents.

Submission Requirements


Format: Microsoft Word



Font: Arial, Size 12, Double-Space



Citation Style: Chicago Manual of Style



Length: 1–2 pages

Self-Assessment Checklist


I have described policy enforcement and monitoring.



I have written an academic paper free from grammatical errors or typos.



I have provided a strategy for accomplishing the enforcement and monitoring.

© ITT Educational Services

Page 1

You May Also Find These Documents Helpful

  • Powerful Essays

    Assignment 008

    • 2794 Words
    • 10 Pages

    Schools must develop a range of policies which ensure the safety, security and well-being of their pupils. These will set out the responsibilities of staff and the procedures that they must follow. Policies may be separate or incorporated into one health and safety policy, but they must include sections which cover the following issues of:…

    • 2794 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    Is3110 Week2 Assignment

    • 348 Words
    • 2 Pages

    For this assignment, imagine that you work for U.S. Industries, Inc. as a network administrator. Your…

    • 348 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    A105 ASSIGNMENT 1

    • 1241 Words
    • 4 Pages

    References: cook, r., 2010. Review 2: The Hare with Amber eyes. unknown: the gardian newspaper.…

    • 1241 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    1. Active directory is controlled from an Active Directory server. The server is accessed by an administrator and then the changes that are made on the AD infrastructure is replicated to all workstations and users that login. AD exists in one location and replicated or issues out the permissions, rules, and roles out to the objects it is managing.…

    • 257 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    It255 Final Study Guide

    • 843 Words
    • 4 Pages

    17. Which of the following is not a part of an ordinary IT security policy framework?…

    • 843 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    The column specification that determines what kind of data can be stored in that column, character versus numeric or date, for example.…

    • 327 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT2580

    • 331 Words
    • 2 Pages

    Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities.…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Eco 550 Assignment 1

    • 932 Words
    • 4 Pages

    Figure 1: Total Cost (TC), Total Variable Cost (TVC) and Total Fixed Cost (TFC) functions…

    • 932 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Assignment 3 HRM 510

    • 917 Words
    • 10 Pages

    Assignment 3: Pay, Benefits, and Terms and Conditions of Employment Tammie Johnson Dr. Bobby Barrett HRM 510 Business Employment Law March 5, 2015 Wage and Hour standard  The median expected hourly pay for a typical Human Resources Generalist is $24 an hour.  The hourly wage depends on a few factors like industry, company size, location, years of experience, and level of education.  Because HR generalist/specialist are paid for the job they do, not the hours they keep, they are exempt under the Fair Labor Standards Act (FLSA). Wage and Hour standard  Because HR generalist/specialist are paid for the job they do, not the hours they keep, they are exempt under the Fair Labor Standards Act (FLSA).  They must also meet two requirements:  earn  hold a salary a position with duties the U.S. Labor Department designates as appropriate for exempt positions…

    • 917 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    An explanation of the processes used by own work setting or service that must comply with legislation that covers data protection, information handling and sharing.…

    • 504 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    M5 Assignment 2

    • 692 Words
    • 3 Pages

    Choosing a career path can help you set professional goals and achieve desired results. In the area of Supply Chain, various career path are available. Visit some professional organizations' (related to Supply Chain) websites and review various career alternatives. Then select one which is best suited for you. Discuss why you selected that particular career, your strengths and weakness concerning the career, and your concerns about the career.…

    • 692 Words
    • 3 Pages
    Better Essays
  • Satisfactory Essays

    Aup Definition

    • 554 Words
    • 3 Pages

    Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities.…

    • 554 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    References: Johnson, Rob. with Merkow, Mike. Security Policies and Implementation Issues. First Edition. Copyright © 2011by Jones & Bartlett Learning, LLC, an Ascend Learning company…

    • 577 Words
    • 2 Pages
    Good Essays
  • Good Essays

    * Changes in security as companies and individuals are now more aware of the threat posed by hackers.…

    • 407 Words
    • 2 Pages
    Good Essays