Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

Issue Specific Security Policy (ISSP)

Q1. Develop an issue-specific security policy (ISSP) that can be used at home or small business.

Assignment - 1 Requirements : 

Consider your incident response plan (IRP) you created last week and discussed in the forum. 

  • Using a similar approach, draft a generic, sample ISSP that would be useful to any home computer user.
  • Assume this policy could be available to the general public.
  • Make sure you cover all of the critical aspects of a security policy.
  • Get a second opinion on the ISSP's usability. You might use a family member, classmate, or a work colleague. 
  • Use that feedback to improve your policy. Include their feedback as part of your submission.
  • NOTE: This means you'll need to complete your initial policy to provide enough time for feedback and improvement.

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial, 12-Point, Double- Space
  • Citation Style: APA
  • Length: 1–2 pages (plus a cover sheet)

Three Major Types of Information Security Policies

Learning Objective: Recognize the three major types of information security policy and know what goes into each type.

The NIST published Generally Accepted Principles and Practices for Securing Information Technology Systems (NIST 800-14) in 1996. 

For many years government agencies used NIST 800-14 as a source for developing information security policies (program, issue-specific, systems-specific, and etc.).  The guide was also to prepare for contingencies, incident handling, and training.

Assignment Requirements

Review 800-14 Generally Accepted Principles and Practices for Securing Information Technology Systems -> http://csrc.nist.gov/publications/nistpubs/800-14/800-14.pdf

After reviewing the NIST document and completing the reading assignment, write a 2-3 page paper that addresses the following:

  1. In the introduction, describe the importance of security policies.
  2. Use your text or other resources and provide an introduction to the three major types of information security policies. (Enterprise information security program policy, Issue-specific information security policies, Systems-specific information security policies)
  3. Identify types of information is contained in each of the three types of policies.
  4. Compare and contrast the three policies.
  5. Conclusion:
    1. How much have policies changed since the 1996 publication?  
    2. Are the same principles identified in 1996 applicable to today?  
    3. Your thoughts? 

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial, 12-Point, Double- Space
  • Citation Style: APA
  • Length: 2–3 pages (plus a cover sheet)
Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question