Data Security, Quality, and Integrity
Ricard20As you begin to craft a security policy for your organization to secure and protect the quality and integrity of the data, you will take this opportunity in the first assignment to create the security policy shell.
The assignments each week will build upon the work and knowledge of previous weeks. You will create 1 single document that contains all of the weekly assignments, in separate sections, culminating with the final submission of a single document that includes all of the weekly assignments.
You are responsible for adding each of these ongoing Individual Project assignments to your Key Assignment Data Security, Quality, and Integrity document that will contain a security plan for the organization that will be used to protect what is arguably an organization's most important asset: its data.
The template document should be in the following format:
- Data Security, Quality, and Integrity document shell
- Use Word
- Title Page
- Course number and name
- Project name
- Your name
- Date
- Table of Contents
- Use the autogenerated TOC.
- Create it on a separate page.
- Make it a maximum of 3 levels deep.
- Be sure to update the fields of the TOC so it is up-to-date before submitting your project.
- Section Headings (Create each heading on a new page with TBD as the content except for the section listed under New Content below.)
- Section 1: Application and System Identification
- This section will be used to describe the organization and establish the security model to be used by the organization.
- Section 2: Regulations and Information Classification
- This section will focus on the regulations that are applicable to the organization and establish a classification scheme for the data.
- Section 3: Management Controls
- This section looks at access control methods to be deployed in the organization.
- Section 4: Technical Controls
- This section will be used to look at access control and other technical controls that can be deployed.
- Section 5: Operational Controls
- This section combines all previous sections and gives the opportunity to look at disaster recovery and backup and restore controls.
- Section 1: Application and System Identification
New Content for Section 1: Application and System Identification
- Provide a description of the selected organization and touch points where data and databases exist to secure and guarantee integrity.
- Define and describe Bell-LaPadula and Clark-Wilson, and choose at least 1 other security model of your choice to describe.
- Indicate which security model will apply best to the organization, and make sure to include a justification as to why you picked the model.
You should provide at least 2–3 pages of discussion for this information.
- 9 years ago
- 30
Purchase the answer to view it
- data_security_table_of_contents.docx
- data_security_job_chapter_1.docx
- 3 pages
- http://denlearn.weebly.com/uploads/1/4/2/0/1420755/carbon_and_water_cycle_ws.pdf
- SERIOUS INQUIRY WITH "A" WORK
- Week 3 Discussion and payment link
- ACC349 Cost Accounting WEEK 1 Ethics Case Assignment
- Defend or refute: Personality assessment instruments are accurate ways of identifying potential leaders within organizations.
- LASA 2
- 1 only Essay Writer
- MKTG 522 Final Exam
- FIN 515 Midterm Exam