2 Assignments

Assignment # 1

Week 4 IP: The Network Security Policy

For this assignment, you will create 2 additional sections for the Network Security Plan document.

First, you will create a 2–3-page section in the plan to list all of the policies that you would have for your organization and a brief description of what each policy will contain. After the risks, have been identified within an organization, you must devise a plan that will provide the best possible protection without significantly impacting daily operations. Then, you must write and implement written policies that will inform everyone within the organization what can and cannot be done while they are connected to the Internet.

Written polices need to adhere to the following guidelines:

    • No more than 2 pages

    • Clearly identified rules

    • Clearly identified punishments if rules are not followed.

    • A way to monitor the network for violations of the policy.

The following are the first task's deliverables:

    • Update previous sections based upon your peers' and instructor's feedback

    • Update the table of contents.

    • Update date on the cover page.

Security Policies Section

    • Identify what written polices need to be created for your organization.

    • For each policy, you will address how you plan to monitor the policy.

    • For each policy, you will provide what you feel the appropriate punishment should be for violators. These punishments must be able to be enforceable, not just a threat.

    • For each policy, you will identify a timetable for when each policy should be reviewed and updated and who will do the review.

The second task this week is to prepare for how you would handle an incident. It is best to have a thorough, rehearsed plan to be prepared for a potential incident. This will help to limit the damage and it will help recovery afterward.

You will create an Incident Response section of 2–3 pages that includes the actions that need to occur when an incident is in progress.

The following are the second task's deliverables: Incident Response Section

    • Identify the process of how your organization will identify an incident.

    • Identify the process for classifying the incident.

What are the criteria for each classification within the organization?

    • Identify what the response will be for each classification identified.

    • Identify a general plan to recover from the incident.

    • Identify a process for evaluating the incident response plan after each incident has been mitigated.

    • Discuss how the incident response plan will be tested and updated.

    • Name your document "Yourname_CS653_IP4.doc."

  • Objectives:

    • Develop a network security policy.

    • Recognize the fundamentals of privacy, confidentiality, and access required to establish and sustain network security.

Assign #2

Software Information Assurance: Week 4 IP

As part of the development of an information security plan, you need to develop a strategy for identifying and promptly remediating information security vulnerabilities to minimize information security breaches. For this assignment, you will continue the planning process by adding the Vulnerability Management section to the Information Security Assurance Implementation Plan. Based on the work from Weeks 2 and 3, you will select a solution strategy for the organization to implement information security quality assurance. As part of the solution strategy, you will make recommendations for prioritizing, budgeting, implementing, and maintaining risk-reducing countermeasures.

The project deliverables for Week 4 are as follows:

  • Update the Information Security Assurance Implementation Plan title page with the new date.

  • Update the previously completed sections based on the instructor's feedback.

  • Vulnerability Management

    • Select and describe a solution strategy for the organization to implement information security quality assurance based on your previous work from Weeks 2 and 3.

    • Recommend and justify your recommendations for prioritizing, budgeting, implementing, and maintaining risk-reducing countermeasures.

  • Name the document "yourname_CS661_IP4.doc."

  • Be sure to cite all references in APA format.