Functional information assurance plan

IT 549 Final Project Guidelines and Rubric Overview The final project for this course is the creation of a functional information assurance plan . The effective management of information and protection of pertinent data is essential for leveraging the re quired knowledge to serve customers and stakeholders on a continuous basis. Employing information assurance best practices will ensure a firm is able to eliminate hi erarchical structures, become more flat, and have greater customer touch points by leveragi ng the correct information at the right time. Successful firms will maintain an established information assurance plan and posture that are reviewed on a weekly basis. This assessment will consist of the creation of a functional information assuran ce plan . You will review a real -world business scenario in order to apply information assurance research and incorporate industry best practices to your recommendations for specific strategic and tac tical steps. These skills are crucial for you to become a desire d asset to organizations seeking industry professionals in the information assurance field. The project is divided in to four milestones , which will be submitted at various points throughout the course to scaffold learning and ensure quality final submissi ons. These milestones will be submitted in Modules Two, Four , Five, and Seven. The final product will be submitted in Module Nine. In this assignment , you will demonstrate your mastery of the following course outcomes:  Assess confidentiality, integrity, and availability of information in a given situation for their relation to an information assurance plan  Propose appropriate protocols for incident and disaster responses and managing security functions that adhere to best practic es fo r information assurance  Analyze threat environments using information assurance research and industry best practices to inform network governance  Recommend strategies based on information assurance best practices for maintaining an info rmation assurance plan  Evaluate the appropriateness of information assurance decisions about security, access controls, and legal issues  Assess applicable threats and vulnerabilities related to information assurance to determine potenti al impact on an organization and mitigate associated risks Prompt Your information assurance plan should answer the following prompt: Review the scenario and create an information assurance p lan for the organization presented in the scenario. Specifical ly, the following critical elements must be addressed in your plan: I. Information Assurance Plan Introduction a) Provide a brief overview of the goals and objectives of your information assurance plan, including the importance of ensuring the confidentiality, integrity, and availability of information. What are the benefits of creating and maintaining an information assurance plan a round those key concepts? b) Assess the confidentiality, integrity, and availability of information within the organizatio n. c) Evaluate the current protocols and policies the organization has in place. What deficiencies exist within the organization’s current information assurance policies? What are the potential barriers to implementation of a new information assur ance plan? II. Information Security Roles and Responsibilities a) Analyze the role of the key leaders within the organization specific to how their responsibilities are connected to the security of the organization’s information. What is the relation ship between these roles? b) Evaluate key ethical and legal considerations related to information assurance that must be taken into account by the key leaders within the organization. What are the ramifications of key leaders not properly accounti ng for ethical and legal considerations? c) What are the key components of information assurance as they relate to individual roles and responsibilities within the information assurance plan? For example, examine the current policies as they relat e to confidentiality, integrity, and availability of information. III. Risk Assessment a) Analyze the environment in which the organization operates, including the current protocols and policies in place related to information assurance. b) Evaluate the threat environment of the organization. c) Based on your analysis and evaluation, what are the best approaches for implementing information assurance principles? Where do you see the most areas for improvement to current protocols and policies? d) Assess the threats and vulnerabilities of the organization by creating a risk matrix to outline the threats and vulnerabilities found and determine possible methods to mitigate the identified dangers. IV. Statements of Poli cy a) Develop appropriate incident response protocols to respond to the various threats and vulnerabilities identified within the organization. b) Justify how the incident response protocols will mitigate the threats to and vulnerabilities of the org anization. Support your justification with information assurance research and best practices. c) Develop appropriate disaster response protocols to respond to the various threats and vulnerabilities identified within the organization. d) Justify how the disaster response protocols will mitigate the threats to and vulnerabilities of the organization. Support your justification with information assurance research and best practices. e) Develop appropriate access control protocols that provide an appropriate amount of protection while allowing users to continue to operate without denial of service. f) Justify your access control protocols . Support your justification with information assurance research and best practices. g) Recommend a method for maintaining the information assurance plan once it has been established. h) Justify how your maintenance plan will ensure the ongoing effectiveness of the information assurance plan. Support your justification with information assurance research and best practices. V. Conclusion a) Summarize the need for an information assurance plan for the selected organization, including the legal and ethical responsibilities of the organization to implement and maintain an appropriate information assurance plan. b) Defend the key elements of your information assurance plan , including which members of the organization would be responsible for each element. M ilestones Milestone One : Information Assurance Plan Introduction In Module Two , you will submit your introduction to the information assurance plan . This section of the plan will provide the overview of the current state of the organization. Provide a brief overview of the goals and objectives of you r information assurance plan, including the importance of ensuring the confidentiality, integrity, and availability of information. What are the benefits of creating and maintaining an information assurance plan around those key concepts? Are there current protocols and policies the organization has in place? Additionally, what deficiencies exist within the organization’s current information assurance policies? What are the potential barriers to implementation of a new information assurance plan? This miles tone is graded with the Milestone One Rubric . Milestone Two : Information Security Roles and Responsibilities In Module Four , you will submit your roles and responsibilities portion of the final project. Who are the key leaders of the organization speci fic to how their responsibilities are connected to the security of the organization’s information ? You must also identify key ethical considerations. What are the ramifications of key leaders not properly accounting for ethical and legal considerations? Wh at are the key components of information assurance as they relate to individual roles and responsibilities within the information assurance plan? For example, examine the current policies as they relate to confi dentiality, integrity, and availability of information. This milestone is graded with the Milestone Two Rubric . Milestone Three : Risk Assessment In Module Five , you will submit the risk assessment portion of the information assurance plan . You will provide the organization with an assessment of the threat environment and the risks within, as well as methods designed to mitigate these risks. Based on your analysis and evaluation, what are the best approaches for implementing information assurance principles? Where do you see the most areas for improve ment to current protocols and policies? This milestone is graded with the Milestone Three Rubric . Milestone Four : Statements of Policy In Module Seven , you will submit your plan pertaining to statements of policy . You will recommend protocols and mitigati ng factors to the organization. Justify how the disaster response protocols will mitigate the threats to and vulnerabilities of the organization. You will focus on disaster and incident response protocols as well as access control. Assess, your proposed me thod for maintaining the success of the plan going forward . Justify how your method will ensure the ongoing effectiveness of the information assurance plan. This milestone is graded with the Milestone Four Rubric . Final Submission : Information Assurance P lan In Module Nine , you will submit your information assurance plan . It should be a complete, polished artifact containing all of the critical elements of the final product. It should reflect the incorporation of feedback gained throughout the course. This submission will be graded with the Final Product Rubric. Deliverables Milestone Deliverable Module Due Grading 1 Information Assurance Plan Introduction Two Graded separately; Milestone One Rubric 2 Information Security Roles and Responsibilities Fou r Graded separately; Milestone Two Rubric 3 Risk Assessment Five Graded separately; Milestone Three Rubric 4 Statements of Policy Seven Graded separately; Milestone Four Rubric Final Submission: Information Assurance Plan Nine Graded separately; Fina l Product Rubric Final Product Rubric Guidelines for Submission: Your information assurance plan should adhere to the following formatting requirements: 10 –12 pages, double -spaced, using 12 - point T imes New Roman font and one -inch margins. Use disciplin e-appropriate citations. Instructor Feedback : This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more information, review these instructions . Critical Elements Exemplary (100% ) Proficient (90% ) Needs Improvement (70% ) Not Evident (0% ) Value Overview of Goals and Objectives Meets “Proficient” criteria a nd quality of overview establishes expertise in the discipline Provides a brief but comprehensive overview of the goals and objectives of the information assurance plan, including the importance of ensuring the confidentiality, integrity, and availability of information and the benefits of creating and maintaining an information assurance plan Provides a brief overview of the goals and objectives of the information assurance plan but does not include the importance of ensuring the confidentiality, integrity , and availability of information or the benefits of creating and maintaining an information assurance plan Does not provide a brief overview of the goals and objectives of the information assurance plan 4 Confidentiality, Integrity, and Availability of Information Meets “Proficient” criteria and demonstrates a nuanced understanding of key information assurance concepts Accurately assesses the confidentiality, integrity, and availability of information within the organization Assesses the confi dentiality, integrity, and availability of information within the organization but some elements of the assessment may be illogical or inaccurate Does not assess the confidentiality, integrity, and availability of information within the organization 5 Cur rent Protocols and Policies Meets “Proficient” criteria and demonstrates deep insight into complex deficiencies and barriers to implementation of a new information assurance plan Logically evaluates the current protocols and policies in place, including deficiencies that currently exist and potential barriers to implementation of a new information assurance plan Evaluates the current protocols and policies in place but does not address the deficiencies that currently exist or potential barriers to implementation of a new information assurance plan , or evaluation is illogical Does not evaluate the current protocols and policies in place 4 Responsibilities of Key Leaders Meets “Proficient” criteria and demonstrates a nuanced understand ing of the relationship between these roles and information security Analyzes the role of the key leaders within the organization specific to how their responsibilities are connected to the security of the organization’s information Analyzes the role of th e key leaders within the organization but misses key roles or aspects of responsibilities specific to the security of the organization’s information Does not analyze the role of the key leaders within the organization 5 Key Ethical and Legal Consideration s Meets “Proficient” criteria and provides complex or insightful reflection of the ramifications of key leaders not properly accounting for ethical and legal considerations Accurately evaluates key ethical and legal considerations related to in formation assurance that must be taken into account by the key leaders within the organization, including the ramifications of key leaders not properly accounting for ethical and legal considerations Evaluates ethical and legal considerations related to information assurance that must be taken into account by the key leaders within the organization but does not include the ramifications of key leaders not properly accounting for ethical and legal considerations , or evaluation is inaccurate Does not evaluate ethical and legal considerations related to information assurance that must be taken into account by the key leaders within the organization 5 Key Components of Information Assurance Meets “Proficient” criteria and demonstrates a nuanced unde rstanding of how each key component identified impacts each individual’s role and responsibility Comprehensively addresses components of information assurance as they relate to individual roles and responsibilities within the information assurance plan Add resses components of information assurance as they relate to individual roles and responsibilities within the information assurance plan but does not address confidentiality, integrity, and/or availability of information Does not address any components of information assurance as they relate to individual roles and responsibilities within the information assurance plan 5 Analysis of Environment Meets “Proficient” criteria and demonstrates unique or insightful reflection of current protocols and policies Logically analyzes the environment in which the organization operates, including the current protocols and policies in place related to information assurance Analyzes the environment in which the organization operates but does not include the cur rent protocols and policies in place related to information assurance Does not analyze the environment in which the organization operates 5 Threat Environment Meets “Proficient” criteria and demonstrates deep insight into hidden or complex thr eats or vulnerabilities Accurately analyzes the threat environment of the organization Evaluates the threat environment of the organization but misses crucial threats or vulnerabilities , or the evaluation is inaccurate Does not evaluate the threat environm ent of the organization 5 Best Approaches Meets “Proficient” criteria and demonstrates unique or insightful reflection regarding areas for improvement Comprehensively discusses best approaches for implementing information assurance principles, including areas of improvement to current protocols and policies Discusses best approaches for implementing information assurance principles, but does not fully develop ideas related to areas of improvement to current protocols and policies Does not discu ss best approaches for implementing information assurance principles 5 Risk Matrix Meets “Proficient” criteria and demonstrates deep insight into hidden or complex threats or vulnerabilities and possible methods to mitigate the identified dang ers Creates a risk matrix to comprehensively and accurately assess the threats to and vulnerabilities of the organization, including possible methods to mitigate the identified dangers Creates a risk matrix to assess the threats to and vulnerabilities of the organization but does not include possible methods to mitigate the identified dangers , or assessment is incomplete or inaccurate Does not create a risk matrix to assess the threats to and vulnerabilities of the organization 5 Incident Response Protoco ls Meets “Proficient” criteria and provides secondary incident response protocols in the event that primary protocols fail Develops appropriate incident response protocols to respond to the various threats and vulnerabilities identified Develop s incident response protocols to respond to the various threats and vulnerabilities identified, but they are not all appropriate or do not respond to all the threats and vulnerabilities Does not develop incident response protocols 5 Justification of Incid ent Response Protocols Meets “Proficient” criteria and provides unique or insightful reflection into the dangers of not providing for adequate incident response protocols Logically justifies how the incident response protocols will mitigate the threats to and vulnerabilities of the organization with support from information assurance research and best practices Justifies how the incident response protocols will mitigate the threats to and vulnerabilities of the organization with minimal support from information assurance research and best practices , or justification is illogical Does not justify how the incident response protocols will mitigate the threats and vulnerabilities to the organization 5 Disaster Response Protocols Meets “P roficient” criteria and demonstrates deep insight into responding to hidden or complex threats or vulnerabilities Develops appropriate disaster response protocols to respond to the various threats and vulnerabilities identified Develops disaster response protocols to respond to the various threats and vulnerabilities identified, but they are not all appropriate or do not respond to all the threats and vulnerabilities Does not develop disaster response protocols 4 Justification of Disaster Response Protocol s Meets “Proficient” criteria and provides unique or insightful reflection into the dangers of not providing for adequate disaster response protocols Logically justifies how the disaster response protocols will mitigate the threats to and vulne rabilities of the organization with support from information assurance research and best practices Justifies how the disaster response protocols will mitigate the threats to and vulnerabilities of the organization with minimal support from information assu rance research and best practices , or justification is illogical Does not justify how the disaster response protocols will mitigate the threats to and vulnerabilities of the organization 5 Access Control Protocols Meets “Proficient” criteria a nd demonstrates unique or insightful reflection into appropriate protocols Develops appropriate access control protocols that provide an appropriate amount of protection while allowing users to continue to operate without denial of service Develops access control protocols, but they do not provide an appropriate amount of protection while allowing users to continue to operate without denial of service Does not develop access control protocols 4 Justification of Access Control Protocols Meets “P roficient” criteria and provides unique or insightful reflection into the dangers of not providing for adequate access control protocols Logically justifies the access control protocols with support from information assurance research and best practices Justifies the access control protocols with minimal support from information assurance research and best practices , or justification is illogical Does not justify the access control protocols 5 Method for Maintaining the Information Assurance Plan Meets “Proficient” criteria and provides an established interval for the recommended maintenance actions Recommends a comprehensive method for maintaining the information assurance plan once it has been established Recommends a method for maintaining th e information assurance plan once it has been established but recommendations are not fully developed Does not recommend a method for maintaining the information assurance plan once it has been established 5 Justification of Maintenance Plan Meets “Proficient” criteria and provides insight into the dangers of not providing for an adequate maintenance plan Logically justifies how the maintenance plan will ensure the ongoing effectiveness of the information assurance plan with support from inform ation assurance research and best practices Justifies how the maintenance plan will ensure the ongoing effectiveness of the information assurance plan with minimal support from information assurance research and best practices or justification is illogical Does not justify how the maintenance plan will ensure the ongoing effectiveness of the information assurance plan 5 Summary of Need for Information Assurance Plan Meets “Proficient” criteria and demonstrates a nuanced understanding of the nee d for an information assurance plan Concisely summarizes the need for an information assurance plan, including the legal and ethical responsibilities of the organization to implement and maintain an appropriate information assurance plan Summarizes the nee d for an information assurance plan but does not include the legal and ethical responsibilities of the organization to implement and maintain an appropriate information assurance plan or is not concise Does not summarize the need for an information assuran ce plan 5 Defense of Key Elements of Information Assurance Plan Meets “Proficient” criteria and demonstrates a nuanced understanding of which members of the organization should be responsible for each element Strongly defends key elements of the information assurance plan, including which members of the organization would be responsible for each element and who should be contacted in the event of an incident Defends key elements of the information assurance plan but does not include which membe rs of the organization would be responsible for each element , or defense is weak Does not defend elements of the information assurance plan 5 Articulation of Response Submission is free of errors related to citations, grammar, spelling, syntax, and organ ization and is prese nted in a professional and easy -to-read format Submission has no major errors related to citations, grammar, spelling, syntax, or organization Submission has major errors related to citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of main ideas Submission has critical errors related to citations, grammar, spelling, syntax, or organization that prevent understanding of ideas 4 Earned Total 100%