Waiting for answer This question has not been answered yet. You can hire a professional tutor to get the answer.

QUESTION

STATEMENTS OF POLICY

You will submit your plan pertaining to statements of policy. You will recommend protocols and mitigating factors to the organization. Justify how the disaster response protocols will mitigate the threats to and vulnerabilities of the organization. You will focus on disaster and incident response protocols as well as access control. Assess your proposed method for maintaining the success of the plan going forward. Justify how your method will ensure the ongoing effectiveness of the information assurance plan. 

One of the most important aspects of information assurance is ensuring that proper policies and procedures are established within an organization. Without proper policies and procedures, there would be no order. By implementing appropriate statements of policy and developing effective procedures, IT administrators ensure that incidents can be appropriately responded to, and that individuals within the organization understand their roles within the information assurance plan. Individuals in an organization would not be able to adequately understand their roles without the establishment of these statements of policy.

 Prompt: In Module Seven, you will submit your plan pertaining to statements of policy. You will recommend protocols and mitigating factors to the organization and justify how the disaster response protocols will mitigate the threats to and vulnerabilities of the organization. You will focus on disaster and incident response protocols as well as access control. Assess your proposed method for maintaining the success of the plan going forward and explain how your method will ensure the ongoing effectiveness of the information assurance plan.

Specifically, the following critical elements must be addressed:

IV. Statements of Policy

                a) Develop appropriate incident response protocols to respond to the various threats and vulnerabilities identified within the organization.

                b) Justify how the incident response protocols will mitigate the threats to and vulnerabilities of the organization. Support your justification with information assurance research and best practices.

                c) Develop appropriate disaster response protocols to respond to the various threats and vulnerabilities identified within the organization.

                 d) Justify how the disaster response protocols will mitigate the threats to and vulnerabilities of the organization. Support your justification with information assurance research and best practices.

                 e) Develop appropriate access control protocols that provide an appropriate amount of protection while allowing users to continue to operate without denial of service.

                  f) Justify your access control protocols. Support your justification with information assurance research and best practices.

                  g) Recommend a method for maintaining the information assurance plan once it has been established.

                  h) Justify how your maintenance plan will ensure the ongoing effectiveness of the information assurance plan. Support your justification with information assurance research and best practices.

use double spacing, 12-point Times New Roman font, and one-inch margins. Sources should be cited according to APA citation method. Page-length requirements:4–5pages excluding cover page and reference page. Make sure you cite if you take a piece of someone’s work, very important and also your reference should relate to your writing (don’t cite a reference because it relates to the course and not this very paper) at least 4 references.

www.citationmachine.net to format references into the APA style if necessary. Extremely important.

please communicate for any clarifications and please read instructions and follow them. Some tutors don't pay attention to instructions at all. Very important

I am not doing try and error here so please do not send a hand shake if you have no ideas or experience with research and literature review and protect confidentiality because I will have to provide you with some additional information.

Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question