SlideShare a Scribd company logo
Key Assignment Draft
This is Part 1 of the Key Assignment. Your draft will cover all
of the objectives from Weeks 1–3 along with the new topics and
objectives for Week 4.
Great progress has been made on the information technology
(IT) Planning Strategy Design document in the previous
assignment. This week, you will add an analysis of the
Information Security Strategy of your chosen organization,
along with recommendations on improving it.
The project deliverables are as follows:
Update the IT Planning Strategy Design document title page
with a new date and project name.
Update your previously completed sections based on instructor
feedback.
Add a new section “Information Security Strategy for
Company”
Discuss your company’s business critical information
Discuss your company’s cyber, physical, cultural, and
procedural vulnerabilities.
Does your company have appropriate HR and IT security
policies and practices?
What sort of physical security policies and practices are in
place?
How is your security ecosystem?
Antivirus on all systems?
Network monitoring and intruder detection?
Network access security: logins, access control lists, firewalls,
DMZs, etc., in place?
How much is automated and how much manual?
Recommend what your company needs to do to address its
security strategy gaps.
Recommendations should be actionable and linked directly to
the Technology Road Map in Week 3.
Ensure that your recommendations are focused on root causes.
Provide at least 2 references to support your research paper
Be sure to update your table of contents before submission.
Key Assignment DraftThis is Part 1 of the Key Assignment. Yo.docx

More Related Content

DOCX
Part 1Strategic Management Case Study #6—IKEA (Case Study In.docx
PPTX
Build an Information Security Strategy
DOCX
CMGT 400 Entire Course NEW
DOCX
Cmgt 400 Entire Course NEW
DOCX
The Rookie Chief Information Security OfficerDue Week 10 and w.docx
PPTX
Technology Strategy for Early Stage Companies
DOCX
Term Paper The Rookie Chief Information Security Officer.docx
DOCX
Term Paper The Rookie Chief Information Security OfficerThis assi.docx
Part 1Strategic Management Case Study #6—IKEA (Case Study In.docx
Build an Information Security Strategy
CMGT 400 Entire Course NEW
Cmgt 400 Entire Course NEW
The Rookie Chief Information Security OfficerDue Week 10 and w.docx
Technology Strategy for Early Stage Companies
Term Paper The Rookie Chief Information Security Officer.docx
Term Paper The Rookie Chief Information Security OfficerThis assi.docx

Similar to Key Assignment DraftThis is Part 1 of the Key Assignment. Yo.docx (20)

DOCX
The Rookie Chief Information Security OfficerWorth 200 poi
DOCX
This assignment consists of five (5) parts     Part 1 Organi.docx
PPTX
We Bought Some Tools
DOCX
Term Paper The Rookie Chief Information Security OfficerD
PDF
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
DOCX
CSIA 413 Cybersecurity Policy, Plans, and ProgramsProject #4 IT .docx
PPTX
Build and Information Security Strategy
DOCX
Cmgt 400 week 1 it security report
DOCX
Cmgt 400 entire course
PPTX
Improve Information Security Practices in the Small Enterprise
DOCX
IT 549 Final Project Guidelines and Rubric Overview .docx
DOCX
ISE 510 Final Project Guidelines and Rubric Overview The fi.docx
DOCX
Cmgt 400 week 4 team assignment security policy and training
DOCX
The Rookie Chief Information Security OfficerThis assignment c.docx
DOCX
ISE 620 Final Project Guidelines and Rubric Overview .docx
PDF
Answers to Problems in Systems Analysis and Design, 5th Edition – Roberta Rot...
PDF
Nine HIPAA Compliance Questions to ask Yourself
DOCX
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docx
PPTX
Cobit 41 framework
PPTX
Fldn resource -_impact_of_the_use_of_it_on_business_systems_18
The Rookie Chief Information Security OfficerWorth 200 poi
This assignment consists of five (5) parts     Part 1 Organi.docx
We Bought Some Tools
Term Paper The Rookie Chief Information Security OfficerD
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
CSIA 413 Cybersecurity Policy, Plans, and ProgramsProject #4 IT .docx
Build and Information Security Strategy
Cmgt 400 week 1 it security report
Cmgt 400 entire course
Improve Information Security Practices in the Small Enterprise
IT 549 Final Project Guidelines and Rubric Overview .docx
ISE 510 Final Project Guidelines and Rubric Overview The fi.docx
Cmgt 400 week 4 team assignment security policy and training
The Rookie Chief Information Security OfficerThis assignment c.docx
ISE 620 Final Project Guidelines and Rubric Overview .docx
Answers to Problems in Systems Analysis and Design, 5th Edition – Roberta Rot...
Nine HIPAA Compliance Questions to ask Yourself
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docx
Cobit 41 framework
Fldn resource -_impact_of_the_use_of_it_on_business_systems_18
Ad

More from jesssueann (20)

DOCX
Major Benefits and Drivers of IoT.Background According to T.docx
DOCX
Major Assessment 2 The Educated Person” For educators to be ef.docx
DOCX
Major Assessment 4 Cultural Bias Investigation Most educators agree.docx
DOCX
Maintaining privacy and confidentiality always is also vital. Nurses.docx
DOCX
Main content15-2aHow Identity Theft OccursPerpetrators of iden.docx
DOCX
Macro Presentation – Australia Table of ContentOver.docx
DOCX
M.S Aviation Pty Ltd TA Australian School of Commerce RTO N.docx
DOCX
M4.3 Case StudyCase Study ExampleJennifer S. is an Army veter.docx
DOCX
make a histogram out of this information Earthquake Frequency .docx
DOCX
Love Language Project FINAL PAPERLove Language Project Part .docx
DOCX
Major Computer Science What are the core skills and knowledge y.docx
DOCX
Major Crime in Your CommunityUse the Internet to search for .docx
DOCX
Major Assignment - Learning NarrativeWrite a learning narr.docx
DOCX
Looking to have this work done AGAIN. It was submitted several times.docx
DOCX
Major Assessment 1 Develop a Platform of Beliefs The following .docx
DOCX
Macroeconomics PaperThere are currently three major political ap.docx
DOCX
M A T T D O N O V A NThings in the Form o f a Prayer in.docx
DOCX
M A R C H 2 0 1 5F O R W A R D ❚ E N G A G E D ❚ .docx
DOCX
Lymphedema following breast cancer The importance of surgic.docx
DOCX
Lukas Nelson and his wife Anne and their three daughters had been li.docx
Major Benefits and Drivers of IoT.Background According to T.docx
Major Assessment 2 The Educated Person” For educators to be ef.docx
Major Assessment 4 Cultural Bias Investigation Most educators agree.docx
Maintaining privacy and confidentiality always is also vital. Nurses.docx
Main content15-2aHow Identity Theft OccursPerpetrators of iden.docx
Macro Presentation – Australia Table of ContentOver.docx
M.S Aviation Pty Ltd TA Australian School of Commerce RTO N.docx
M4.3 Case StudyCase Study ExampleJennifer S. is an Army veter.docx
make a histogram out of this information Earthquake Frequency .docx
Love Language Project FINAL PAPERLove Language Project Part .docx
Major Computer Science What are the core skills and knowledge y.docx
Major Crime in Your CommunityUse the Internet to search for .docx
Major Assignment - Learning NarrativeWrite a learning narr.docx
Looking to have this work done AGAIN. It was submitted several times.docx
Major Assessment 1 Develop a Platform of Beliefs The following .docx
Macroeconomics PaperThere are currently three major political ap.docx
M A T T D O N O V A NThings in the Form o f a Prayer in.docx
M A R C H 2 0 1 5F O R W A R D ❚ E N G A G E D ❚ .docx
Lymphedema following breast cancer The importance of surgic.docx
Lukas Nelson and his wife Anne and their three daughters had been li.docx
Ad

Recently uploaded (20)

PPTX
A powerpoint presentation on the Revised K-10 Science Shaping Paper
PDF
Empowerment Technology for Senior High School Guide
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
PDF
What if we spent less time fighting change, and more time building what’s rig...
PDF
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PDF
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
PPTX
Introduction to pro and eukaryotes and differences.pptx
PPTX
Unit 4 Computer Architecture Multicore Processor.pptx
PPTX
Computer Architecture Input Output Memory.pptx
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PDF
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
PPTX
History, Philosophy and sociology of education (1).pptx
PPTX
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
PDF
Uderstanding digital marketing and marketing stratergie for engaging the digi...
PDF
AI-driven educational solutions for real-life interventions in the Philippine...
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
DOCX
Cambridge-Practice-Tests-for-IELTS-12.docx
PDF
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين
A powerpoint presentation on the Revised K-10 Science Shaping Paper
Empowerment Technology for Senior High School Guide
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 2).pdf
What if we spent less time fighting change, and more time building what’s rig...
A GUIDE TO GENETICS FOR UNDERGRADUATE MEDICAL STUDENTS
Practical Manual AGRO-233 Principles and Practices of Natural Farming
1.3 FINAL REVISED K-10 PE and Health CG 2023 Grades 4-10 (1).pdf
Introduction to pro and eukaryotes and differences.pptx
Unit 4 Computer Architecture Multicore Processor.pptx
Computer Architecture Input Output Memory.pptx
202450812 BayCHI UCSC-SV 20250812 v17.pptx
CISA (Certified Information Systems Auditor) Domain-Wise Summary.pdf
History, Philosophy and sociology of education (1).pptx
Onco Emergencies - Spinal cord compression Superior vena cava syndrome Febr...
Uderstanding digital marketing and marketing stratergie for engaging the digi...
AI-driven educational solutions for real-life interventions in the Philippine...
Weekly quiz Compilation Jan -July 25.pdf
BP 704 T. NOVEL DRUG DELIVERY SYSTEMS (UNIT 1)
Cambridge-Practice-Tests-for-IELTS-12.docx
احياء السادس العلمي - الفصل الثالث (التكاثر) منهج متميزين/كلية بغداد/موهوبين

Key Assignment DraftThis is Part 1 of the Key Assignment. Yo.docx

  • 1. Key Assignment Draft This is Part 1 of the Key Assignment. Your draft will cover all of the objectives from Weeks 1–3 along with the new topics and objectives for Week 4. Great progress has been made on the information technology (IT) Planning Strategy Design document in the previous assignment. This week, you will add an analysis of the Information Security Strategy of your chosen organization, along with recommendations on improving it. The project deliverables are as follows: Update the IT Planning Strategy Design document title page with a new date and project name. Update your previously completed sections based on instructor feedback. Add a new section “Information Security Strategy for Company” Discuss your company’s business critical information Discuss your company’s cyber, physical, cultural, and procedural vulnerabilities. Does your company have appropriate HR and IT security policies and practices?
  • 2. What sort of physical security policies and practices are in place? How is your security ecosystem? Antivirus on all systems? Network monitoring and intruder detection? Network access security: logins, access control lists, firewalls, DMZs, etc., in place? How much is automated and how much manual? Recommend what your company needs to do to address its security strategy gaps. Recommendations should be actionable and linked directly to the Technology Road Map in Week 3. Ensure that your recommendations are focused on root causes. Provide at least 2 references to support your research paper Be sure to update your table of contents before submission.