Preview

Information Security Plan Survey Essay Example

Good Essays
Open Document
Open Document
1643 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Security Plan Survey Essay Example
Information Security Program Survey
As a new graduate of UMUC’s cybersecurity program, you have decided to apply in a competitive selection process to a joint federal-state government sponsored cybersecurity training program for new graduates (apprentices). As part of your application package, you must submit an essay (narrative) containing a written analysis of an information security program. You can use the worksheet to help organize your information. The application package provides you with the following information:
For your application to this program you are asked to prepare a high-level summary of an information security program. Your summary should demonstrate that you are able to read, understand, apply, and write about common information security concepts at the apprentice level. Your summary must include an analysis that addresses strategic fit (how well the information security program supports the organization’s goals and objectives), breadth and coverage of the information security program (people, processes, technologies), any known or previously uncovered program deficiencies or implementation issues, and any stated costs and benefits of the program.
Choose one of the organizations listed in Table 1, review the pertinent documents, and then prepare a three- to five-page narrative summarizing your analysis of the organization’s information security program. Uniform Resource Locators (URLs) are provided for the pertinent documents and web pages. Applicant narratives must be submitted in electronic form as Microsoft Word documents. Use standard size (8.5” x 11”) pages. Include your name and the date at the top of each page. Use 1” margins and Times New Roman 12-point font. Double-space your text. Use black text (no colors) on a plain white background. Do not include pictures, tables, or diagrams in your narrative.
Cite your sources in APA format and use only authoritative/scholarly sources such as journal articles, books, government documents,

You May Also Find These Documents Helpful

  • Better Essays

    Whitman, M., & Mattord, H. (2004). Information Security Policy. In Management of information security(Fourth ed., p. 154). Boston, Mass.: Thomson Course…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Itt 255 IT255 Instructor Lab Manual LABORATORY Instructor Lab Manual IT255 Fundamentals of Information Systems Security Copyright © 2012 Jones & Bartlett Learning, LLC www.jblearning.com All Rights Reserved. Current Version Date: 12/06/2010 -1- IT255 Instructor Lab Manual LABORATORY ISS Curriculum Overview............................................................................................................................. 5 Ethics and Code of Conduct.......................................................................................................................... 6 ISS Mock IT Infrastructure ...........................................................................................................................…

    • 33056 Words
    • 133 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Imagine that you are working for a startup technology organization that has had overnight success. The organization’s immediate growth requires for it to formulate a corporate strategy for information security. You have been recruited to serve as part of a team that will develop this strategy.…

    • 514 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    In a Denial-of-Service (DoS) attack, a malicious client (the attacker) performs operations designed to partially or completely prevent legitimate clients from gaining service from a server (the victim). (Brustoloni, N.D.) To defend your system from DoS attacks it typically involves the use of a combination of attack detection software, aiming to block traffic that is identified as illegitimate and allow all traffic that is identified as legitimate. Some traffic classification and response tools are Firewalls, Switches, Routers, Application front end hardware, IPS based prevention, DDS based…

    • 498 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    IS4799

    • 675 Words
    • 8 Pages

     Importance • Significant amount of supplemental information IS4799 Information Systems and Cybersecurity Capstone Project © ITT Educational Services, Inc. All rights reserved. Page 4 Key Concepts  Clarification • Additional information to clarify RFP contents…

    • 675 Words
    • 8 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This paperwork of IT 244 Week 1 Individual Introduction to the Information Security Policy Appendix C comprises:…

    • 396 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Format your paper consistent with APA guidelines. A minimum of two outside academic references are required in addition to using course texts and websites.…

    • 865 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Is4231 Week 5

    • 3436 Words
    • 14 Pages

    Evaluate the internal and external factors that influence the activities and organization of an information security program List and describe the typical job titles and functions performed…

    • 3436 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Format your paper consistent with APA guidelines. A minimum of two outside academic references are required in addition to using course texts and websites.…

    • 640 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Imagine University of Phoenix’s IT department has hired you. Your first task is to make sure the department is following the most important information security practices.…

    • 598 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    For each resource, provide an APA formatted reference. Do not cut and paste references directly from the internet or another resource.…

    • 455 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Uncle Bob

    • 277 Words
    • 2 Pages

    Summarize the results of your evaluation of what crimes Uncle Bob could be charged with and the ability of the police agency in Florida to obtain this information.…

    • 277 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    In order for ZXY Inc. to make sure that their entire organization is secure, some proposals have been put into place to protect the company. The company needs to make sure that the network, their employee’s, company devices, and communications are secure from the outside world. The proposals that have been put into place cover such areas as: access control methods, authentication, user’s accounts and passwords, cryptography, remote access, network attack mitigation, malware and device vulnerabilities, and web and e-mail attack mitigation. These proposals when combined together help form an entire security policy for ZXY Inc. to use in order to protect all company assets.…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    From a management perspective, analyze the overall industry requirements and major organizational challenges of forming a sound information security program, and ascertain the fundamental manner in which regulations and compliancy may factor into the challenges in question.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    A computer security career is a highly diverse and important position, where you could work anywhere from a College Campus to a Hospital Administration building, all the way up to the Government Agencies all over the world. With so many new businesses’ opening daily, worldwide, the job market will be forever expanding. Whenever a business’s computer system acts up it’s the job of their computer security specialist to carefully take all the required steps to identify and resolve the specific issue, combining many people into one, saving the company lots of money. These specialists have and exceptional and advanced overall knowledge of all things computer.…

    • 525 Words
    • 3 Pages
    Good Essays