IT Strategy 3 Pages work with 4 Days Deadline, computer science homework help
Q1. Pick one of the items below for your Original Post in this week's discussion forum:· Why do policies need to be clearly worded? What happens if they're not, they are confusing, or if they are too "legalese?" Provide at least one example supporting your points.· Why do policy documents need to address the six key questions: who, what, where, when, why, and how? What is the potential result if they do not? Provide at least one example supporting your points.· Describe the policy review and approval process. Who needs to be involved and why? Include how this process works for an organization.· Explain different methods for publishing policy documents. How and where should policies be stored? Why is it important to formally publish and publicize them? · Explain the purpose of a policy change control board. Include why it's important to have oversight of the policy development process.· Describe the business drivers for changing policy documents. When, why, and how would these prompt a change?· Explain different organizational challenges when implementing policies. How can they be overcome?· Why should a security policy implementation be flexible to allow for updates? What can happen if it's not?· Fully explain why an organization should have annual awareness training for organizational policies. Include costs and benefits.· Describe two methods for conducting policy awareness training.Requirement: One to One and Half PageDeadline: One day.Q2. Learning Objectives and Outcomes· Create a layered IT management policy defining separation of duties.AssignmentIn this assignment, you are to create a security management policy that addresses the management and the separation of duties throughout the seven domains of a typical IT infrastructure. You are to define what the information systems security responsibility is for each of the seven domains of a typical IT infrastructure. From this definition, you must incorporate a definition for the separation of duties into the Procedures section of the policy definition template that you will fill out later in this step. The company that’s the subject of this case study is Five Fourths Bank:· Five Fourths Bank is a regional Bank that has multiple branches and locations throughout the area.· Bank Management made the strategic decision to focus on online banking and use of the Internet.· The bank prides itself on its customer service department and their ability to quickly answer customer questions.· The organization needs to be in compliance with the Gramm-Leach-Bliley Act (GLBA), FS-ISAC, and IT best practices regarding its employees.· The organization wants to monitor and control use of the Internet by implementing web content filtering.· The organization wants to eliminate personal use of organization-owned IT assets and systems. However, they allow BYOD to attach to their guest wireless network.· The organization wants to monitor and control use of messaging systems by implementing e-mail security controls.· The bank wants to implement this policy for all its IT assets and to incorporate a policy review process into its annual awareness training.· The organization wants to define a policy framework, including a security management policy defining the separation of duties for information systems.Using the templates in your Security Policy text (pp.185-190), create the IT policy, standard, guideline, and procedure for Five Fourths Bank regarding the use of personal devices (cell phones, tablets, home computers, etc.). All of these may be contained in a single document, but each one should start on a new page. Deadline : 4 DaysNote: It’s Just Three paages work with 4 days deadline for the main question. I won’t pay more than $12. So don’t bid more that because I will not assign that work to you.
THIS QUESTION IS UNSOLVED!
Request a custom answer for this question