Question

In: Computer Science

In terms of Cubersecurity, Develop your organizations (or organization of choice) Comprehensive Information and Security Program...

In terms of Cubersecurity, Develop your organizations (or organization of choice) Comprehensive Information and Security Program answering the following questions:

Organisation Name: Kisi
Company Type: Wireless Access Control Ststem
Employee number:30-50

(PLEASE TRY TO ANSWER ALL MY QUESTIONS. THANK YOU)

11. Physical Security
What are the basic fundamentals of your physical security program?
12. Policies
• Data Classification and Governance Policy
Write a short description
• Identify and Access Management Policy
Write a short description
• Data Retention and Destruction Policy
Write a short description
• Website Privacy Policy and Terms of Use
Write a short description
• Mobile Device Policy
Write a short description
• Acceptable Use Policy
Write a short description
13. Procedures
• Business Recovery Procedures
Write a short description
• Disaster Recovery Procedures
Write a short description
• Incident Response Procedures
Write a short description
• Identity and Access Management Procedures
Write a short description
• Third Party / Supply Chain Due Diligence Procedures
Write a short description
• Software Development Lifecycle Procedures
Write a short description (Include how your software team handles cybersecurity fundamentals)
14. Guidelines
• Data Loss Prevention Guidelines
Write a short description
• Physical Security Guidelines
Write a short description
• Inventory and Asset Management Guidelines
Write a short description
• Vulnerability Management
Write a short description
15. Testing
• Annual Risk Assessments
Write a short description
• Annual Penetration Testing
Write a short description
• Annual DR/BCP Testing
Write a short description
• Periodic Phishing Testing
Write a short description
16. Configuration Standards
• Mobile Device Configuration Standards (Mobile Device Management)
Write a short description
• Desktop / Laptop Configuration Standards
Write a short description
• Network Device Configuration Standards
Write a short description
• Network Security Standards
Write a short description
• Email Configuration Standards (incoming / outgoing / mail client)
Write a short description
17. Cyber Defense Program
Outline your Cyber defense strategy. What are the core tenets? What are the baseline fundamentals of cyber defense?
• Technical Cyber Program:
o Outside your borders
o Outer shell
o Inner Shell
o Bedrock / Underpinnings (items that apply to all layers, and all architectures … cloud e.g.)
• Team / Organization Structure:
How is your Cyber team structured? What are the key roles and responsibilities? What are the operations this group is responsible for (think about “event” and “incident” handling class we took e.g.)

Solutions

Expert Solution

Hopefully this will clear all your doubts.If you still face any query let me know in the comment section.Thank You.

Below are the snapshots of the answers.


Related Solutions

In terms of Cybersecurity, discuss about your Comprehensive Information Security and Privacy Program (500 Word)
In terms of Cybersecurity, discuss about your Comprehensive Information Security and Privacy Program (500 Word)
Imagine that you are the Information Security Officer (ISO) of your organization. Develop a plan to...
Imagine that you are the Information Security Officer (ISO) of your organization. Develop a plan to conduct a Web application penetration test on your network. Identify and explain all steps necessary to successfully complete the test.
Develop a comprehensive patient education plan for a health behavior or disease of your choice. The...
Develop a comprehensive patient education plan for a health behavior or disease of your choice. The plan should be in a format for your entire patient population. Examples of behaviors or diseases might include but are not limited to smoking, heart disease, high blood pressure. Examples of patient education tools might include but are not limited to brochures, Powerpoint presentation, etc. You will choose one topic (health behavior/disease) and use as many education types as you choose. The goal is...
Develop an onboarding program for an organization. This program can be general to the organization, or...
Develop an onboarding program for an organization. This program can be general to the organization, or can be for a specific area, and for brand new employees or those transferring/promoted who are new to an area of the organization Brief explanation, and identify the intended recipients of the program Identify the components of a socialization program that will be ideal for your onboarding program. Be sure to keep in mind the following items: Stage Models of Socialization The Information Newcomers...
, design the information security of an organization
, design the information security of an organization
E-procurement has become a best management practice in modern organizations. Use an organization of your choice...
E-procurement has become a best management practice in modern organizations. Use an organization of your choice to justify how e-procurement is being deployed to achieve massive cost savings and other related benefits.
Suppose your college or organization is considering a project to develop an information system that would...
Suppose your college or organization is considering a project to develop an information system that would allow all faculty, staff, and students to access and maintain their own human resources information such as address, marital status, and tax information. The main benefits of the system would be a reduction in human resources personnel and more accurate information. For example, if a faculty, staff, or student had a new telephone number or e-mail address, s/he would be responsible for entering the...
hi there, I need to develop a standard, yet comprehensive budget for company ABC in terms...
hi there, I need to develop a standard, yet comprehensive budget for company ABC in terms of their office supplies (e.g copy paper, toner cartridges, business forms, pens, pencils, stamp pads, letter envelopes etc) for 2 years. so between year 1 and year 2, the budget allocation should increase by 8%. keep in mind that you should use your own made-up values/costs for the office supplies.
Q1. Define information security Q2. Describe the information security roles of professionals within an organization
Q1. Define information securityQ2. Describe the information security roles of professionals within an organizationQ3. Explain these Necessary tools: policy, awareness, training, education, technologyQ4. Explain why a successful information security program is the responsibility of both an organization’s general management and IT managementQ5. Identify the threats posed to information security and differentiate threats to the information within systems from attacks against the information within systemsQ6. Differentiate between laws and ethicsQ7. Explain the role of culture as it applies to ethics in...
The purpose of this assignment is to develop a security program aligned with regulatory compliance and...
The purpose of this assignment is to develop a security program aligned with regulatory compliance and security control frameworks. Select a company for the focus of your assignment. Using the following, map the standard controls to the regulatory compliance that would be appropriate for the organization: The "Security Controls Mapping Template." Regulatory compliance information, such as HIPAA, PCI, SOX, GLBA, etc. Security control frameworks, such as NIST, CIS, COBIT, COSO, ITIL, etc. On the template, map the regulatory rules (one...
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT