Project Part 1 Task 1

Better Essays
Project Part 1 Task 1
Draft Risk Management Plan

Ernest Martinez Jr.
C. Flack
IS3110
October 22, 2012

Purpose The Senior Management of the Defense Logistics Information Services (DLIS) has decided to update the previous risk management plan with a developing, new risk management plan. This new risk management plan will not only minimize the amount of risk for future endeavors, but will also be in compliance with regulations such as the Federal Information Security Management Act (FISMA), Department of Defense (DOD), Department of Homeland Security (DHS), National Institute of Standards and Technology (NIST), Control Objects for Information and Technology (COBIT), and Information Assurance Certification and Accreditation Process (DAICAP).
Scope
The risk management plan is for the organization use only and its network, including remote access company owned building in United States. Outside sources from this scope and risk management plan may cause the network infrastructure to fail or will make it a high risk structure due to the fact that the outside source may not protected to interact with other outside sources allowing hackers to infiltrate your system and steal important files.
Compliances
Federal Information Security Management Act (FISMA) compliance is required for federal agencies to protect their important information. Department of Homeland Security (DHS) compliance is to be required for protection to the United States against terrorists. There are other organizations in which standards are given for risk management projects, including: National Institute of Standards and Technology (NIST), Department of Defense (DOD) Information Assurance Certification and Accreditation Process (DAICAP), and Control Objects for Information and related Technology (COBIT).
Roles and Responsibilities
Project Manager (PM): The overall coordinator of the Risk Management Program.
• Maintaining the Risk Management Plan
• Maintaining the Risk Management



References: Enterprise Project Management Office. State of North Dakota. Retrieved from: www.nd.gov/itd/files/services/pm/risk-management-plan-sample.pdf Gibson, D. (2011). Managing risk in information systems. Sudbury, Mass.: Jones & Bartlett Learning. Risk Management Plan. (2007, November 29). Northrop Grumman . Retrieved October 16, 2012, from interop.mt.gov/content/docs/IM_Risk_Management_Plan_v4_0.pdf Rouse, M. (n.d.). What is Federal Information Security Management Act (FISMA)? - Definition from WhatIs.com. Information Security information, news and tips - SearchSecurity.com. Retrieved October 15, 2012, from http://searchsecurity.techtarget.com/definition/Federal-Information-Security-Management-Act

You May Also Find These Documents Helpful

  • Satisfactory Essays

    This risk management plan was called into development by the DLIS or the Defense Logistics Information Agency, a sub organization of the Defense Logistics Agency. Senior management at the DLIS has determined that the previous risk management plan for the organization is out of date and that a new risk management plan must be developed. Due to the importance of risk management to our organization, senior management is committed to and supportive of this project to develop a new plan.…

    • 566 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    These system security policies, standards, and procedures that have been established for the Corporation Tech System, are intended to comply with the regulations and policies set down by the State of Florida, Corporation Tech, and the Federal Information Security Management Act (FISMA).…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Good Essays

    Project Part 1 Task 1

    • 295 Words
    • 2 Pages

    The LDAP server will be utilized as the central authentication server so that the involved users have a login that is unified and covers all console logins (LDAP NExt, 2010).…

    • 295 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Project Part 1

    • 487 Words
    • 2 Pages

    There are various factors that affect the communication process. Among many of the factors some are very important and play a very important role throughout society, cultural, ethical and individual ways of perspective and communication. Throughout life people have and/or will be faced with the challenge of playing out these roles in society. For example, there are different cultures around the world. In some culture women are to be covered up at all times and are married off to as trade for cattle or money to their father. Where in cultures women are free to dress and marry by there choice. These two women will experience culture shock while communicating with each other. Culture is the values, attitudes and morals, someone is thought that carry over into their social lives. By taken the time to make sure we as people can cultural communication it can keep down most of the confusing in workplace, school and just maybe the world.…

    • 487 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Project Part I

    • 289 Words
    • 2 Pages

    You are an information technology (IT) Web specialist working for Up-North Fishing Outfitters (UNFO), a…

    • 289 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Project Part 1

    • 382 Words
    • 2 Pages

    Up-North Fishing Outfitters (UNFO) is the premier source for those fishing in northern Michigan. They provide equipment, watercraft, safety gear, and other products for local and tourist anglers. UNFO wants to pursue an e-business model to realize additional revenue streams, reduce costs, and improve customer service. With the full support of senior management, the IT department has been tasked to identify e-business and e-commerce web applications to support the proposed transformation.…

    • 382 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Course Project - Part 1

    • 637 Words
    • 3 Pages

    Now, initial setup for one-pound bags of premium coffee are at equilibrium. As Starbucks introduces the world to premium blends, the demand curve shifts to the right increasing the price of premium blend coffee. One will have to purchase coffee at this new equilibrium price as other coffee vendors enter the market to…

    • 637 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    FOD Prevention Program

    • 1053 Words
    • 5 Pages

    Each unit operating aircraft, engines, or SE or directly supporting flight operations, shall designate a FOD Prevention Program Manager, and form a command FOD Prevention/Investigation Team. The FOD Prevention Program Manager, Safety Department, and QA Division shall be included members of the FOD Prevention/Investigation Team. The team is responsible to the CO to carry out the FOD Prevention Program on a day-to-day basis. COs of FRCs shall establish a FOD Prevention Program, FOD Prevention Committee, and appoint a FOD Committee Chairperson. The FOD Prevention Committee shall have sufficient authority and organizational freedom to identify and implement FOD prevention measures whenever and wherever required. The FOD prevention committee is to develop and implement plans and programs to prevent hardware damage during storage, transporting, flight line, and launch operations. The committee will be responsible for providing information to update the status of the local FOD Prevention Program and will ensure prevention efforts are in consonance with local policy, direction, and procedures. A successful program requires command support, personnel knowledge and awareness, and integration into the total maintenance effort.…

    • 1053 Words
    • 5 Pages
    Good Essays
  • Better Essays

    After evaluating the business needs of First World Bank Savings and Loan (FWBSL) and the use of secure open source software to enhance security and reduce business costs, I have concluded that the best option would be to introduce Centos to the network. The reason I chose this is because they offer free software and it also mirrors Red Hat Enterprise Linux (RHEL). Centos offer many online support options and can be updated regularly. Listed below are the server options that I suggest are the best option for FWBSL:…

    • 1335 Words
    • 6 Pages
    Better Essays
  • Best Essays

    Aps1001 Project Management

    • 4602 Words
    • 19 Pages

    9. Programmatic Risk Assessment at Rocky Flats: A Tool For Technology Deployment Decisions, M. David Maloney, PHD, Director, Technology Kaiser Hill Company, LLC, 35-7, February 27 - march 2, 2000, http://www.wmsym.org, Accessed November 27th, 2011 (http://www.wmsym.org/archives/2000/pdf/35/35-7.pdf)…

    • 4602 Words
    • 19 Pages
    Best Essays
  • Powerful Essays

    CMGT582 Wk2 IA

    • 1133 Words
    • 4 Pages

    The U.S. Department of Defense (DoD) Information Security policy is managed by the Defense Information Systems Agency. DISA, one of five Combat Support Agencies designated by the Secretary of Defensei, administers “command and control (C2)” functions, information sharing effectiveness, and global operational information infrastructure projects, while providing support to force warfighters, national-level leaders, and coalition friendly forces across a wide range of undertakings. DISA’s perception is to “provide information superiority in defense of the United States.”…

    • 1133 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Course Project Week 7

    • 611 Words
    • 3 Pages

    Draft of first three sections of final paper, including introduction, thesis statement, and problem section (60 pts.).…

    • 611 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Course Project Week 7

    • 1359 Words
    • 4 Pages

    2. What kind of patent costs can be capitalized and what kind of patent costs can be expensed?…

    • 1359 Words
    • 4 Pages
    Powerful Essays
  • Powerful Essays

    Security Clearance Info

    • 8089 Words
    • 33 Pages

    of Defense (DoD), the Department of Homeland Security, the Department of Energy (DoE), the Department…

    • 8089 Words
    • 33 Pages
    Powerful Essays
  • Satisfactory Essays

    508 Case 5

    • 802 Words
    • 4 Pages

    Many government agencies are in the mature section of the continuum because they tend to be more risk averse. However, there are government agencies, especially in the Department of Defense, that are very interested in being cutting edge in certain areas, and they have the funds and stakeholders to support this approach and its associated costs and risks. Many of DoD’s most risky IT-related undertakings are classified.…

    • 802 Words
    • 4 Pages
    Satisfactory Essays