Running Head: SECURITY PLAN 1
SECURITY PLAN 3
SECURITY PLAN
I. Abstract
II. Introduction
III. Basic risk assessment
· Overview
· Identification of assets
· Identifying the types of threats and method of attack
IV. Proactive Security planning
· Overview and planning
· Development of security policies and controls
· Types of security policies
· Password policies and administrative responsibilities.
v. The floor plan of the target environment
· · A list of threats
· · A risk assessment for each threat
· · Current vulnerability gaps
Vi Emergency plan and disaster response for the following:
o Bomb threat
o Fire
vi. Backup and restore policies
vii. Technologies to keep the security plan working in the event of failure
· Monitor implementation
· Perform off-site data back-up and storage
· Back-up laptops and desktops
viii. Conclusion
References
Colleen Garton & Erika McCulloch. (2012). Fundamentals of Technology Project Management. Chicago: MC Press.
Davis, G. (2011). IPad & iPhone administrator's guide: enterprise deployment strategies and security solutions. New York: McGraw-Hill.
Stein, R. J. (2009). Internet safety. New York: H.W. Wilson Co.