(Unit 2 332 )Designing and Implementing a Secure Information…

Designing and Implementing a Secure Information System

Outcomes:

  • Discuss foundational information architecture fundamentals and their various applications.
  • Apply architecture design principles to the context of information systems.
  • Identify the role of security policy auditing in information systems.

IT332-1: Explain the fundamental concepts of information systems and architecture principles.

Assignment Scenario

After successfully leading Coastal Computing through the development of a new BIA, the CEO, CIO, and CISO next want to tackle a review of all information security policies. The introduction of AI services, the recent revision of the BIA, and the ever-changing nature of cybersecurity risks necessitate a review of these policies. Further, this review will facilitate the creation of a new SOC 2 audit report that Coastal can share with its paying clients under a nondisclosure agreement (NDA). All related documents, policies, standards, baselines, guidelines, and procedures will be in scope for this review.

Assignment Instructions

For this assignment, you will write an essay that answers the following questions based on the scenario:

  • What documents can the organization collect to form the basis for this policy review?
  • Are these documents confidential or proprietary? Explain your reasoning.
  • Who are the key stakeholders who must be included in the review?
  • Who has a stake in the review process, and how does their role impact the review?
  • Coastal is planning to conduct this review internally. What are the pros and cons of that approach? Explain your reasoning.
  • What are the pros and cons of hiring an external security company to perform that review? Explain your reasoning?
  • Provide specific examples.
  • How can Coastal ensure that the new policies are understandable and that employees can follow them?

Submission Directions and Requirements

You are to write an essay that answers the five bullet points listed above. Also, be sure to provide specific examples to add to your essay.

Name your assignment document according to this convention: IT332_Unit2_LastName_FirstName (use your own name, of course). Submit your completed assignment to the Unit 2 Dropbox by the deadline.

Get fast, custom help from our academic experts, any time of day.

Place your order now for a similar assignment and have exceptional work written by our team of experts.

✔Secure ✔ 100% Original ✔ On Time Delivery

How To Order?

How Does the Order Process Work?

Fill Out the Order Form

Complete the form, submitting as many details & instructions concerning the requested academic paper as possible. We will pick a suitable author after you pay for the services.

Make the Payment

Proceed with the payment safely, get an email notification of payment confirmation, and receive your Customer Area sign-in details.

Download the Final Paper

Once the Quality Department ensures the proper quality and congruence with all of the requirements, you will receive an email notification. Now, you can access and save the file from your Customer Area.

Our guarantees

What Else Can You 100% Get With a Professional Essay

 
Complete confidentiality

Be assured of comprehensive protection of all your data. From order placement to downloading final papers – professional essay assistance remains confidential & anonymous.

Direct chat with a writer

Keep in touch with your professional essay writer via direct chat to always be keep-up-to-date on your order progress, check paper drafts, or make additional revisions if needed.

Unlimited free revisions

After your order is completed, the best professional essay writers can revise papers as many times as you need to make them flawless. Your total satisfaction is our main priority.

Money-back guarantee

Professional essay writing service is legit & transparent, so you can entirely rely on the writer's responsibility & readiness to fix all the issues. If they cannot do it, you'll get a refund.

What We do.....

Writing

Editing

Rewriting

Proofreading

Research activities

Revision