Expert answer:tj-it strategy policy, computer science homework

Answer & Explanation:CIS 519 – Weeks 4 & 5 ProjectComplete the following assignments for weeks 4 & 5. Please include your name, class number, and assignment number on your paper.  Follow APA formatting standards, especially for citations and references.Assignment: Explaining the strategic planning processLearning Objectives and Outcomes§ You will understand the steps in the strategic planning process.§ You will how a sample organization could use the strategic planning process.Scenario§ The organization is a regional XYZ Credit Union/Bank that has multiple branches and locations throughout the region.§ Online banking and use of the Internet are the bank’s strengths, given limited its human resources.§ The customer service department is the organization’s most critical business function.§ The organization wants to be in compliance with Gramm-Leach-Bliley Act (GLBA) and IT security best practices regarding its employees.§ The organization wants to monitor and control use of the Internet by implementing content filtering.§ The organization wants to eliminate personal use of organization-owned IT assets and systems.§ The organization wants to monitor and control use of the e-mail system by implementing e-mail security controls.§ The organization wants to implement this policy for all the IT assets it owns and to incorporate this policy review into an annual security awareness training program.Assignment Requirements1. Page 75 of the book lists the 11 stages in the strategic planning process.  Even though they are listed in the Roles and Responsibilities section, it’s really an outline of the overall strategic planning process. 2. Provide a 1-2 paragraph explanation of each stage.  You need to explain the goal(s) of the stage and how it fits into the whole strategic planning process. Include the inputs and outputs of each stage.Using the scenario above:3. Summarize your recommendations for this organization as they create a new IT Strategy.  Include their potential benefits and costs4. Describe how this organization would use the strategic planning process to develop and maintain their strategic plan.Your writing must be professional with proper attention to formatting, spelling, grammar, and punctuation.Note : Please no plagarism and need original content please , Need good grammer , with APA formats and references and original content 1 day agodocslide.us_security_strategy_from_requirements_to_reality__1_.pdf
docslide.us_security_strategy_from_requirements_to_reality__1_.pdf

Unformatted Attachment Preview

Security
Strategy
From Requirements to Reality
TAF-K11348-10-0301-C000.indd i
8/18/10 2:44:55 PM
TAF-K11348-10-0301-C000.indd ii
8/18/10 2:44:57 PM
Security
Strategy
From Requirements to Reality
Bill Stackpole and Eric Oksendahl
TAF-K11348-10-0301-C000.indd iii
8/18/10 2:44:57 PM
Auerbach Publications
Taylor & Francis Group
6000 Broken Sound Parkway NW, Suite 300
Boca Raton, FL 33487-2742
© 2011 by Taylor and Francis Group, LLC
Auerbach Publications is an imprint of Taylor & Francis Group, an Informa business
No claim to original U.S. Government works
Printed in the United States of America on acid-free paper
10 9 8 7 6 5 4 3 2 1
International Standard Book Number: 978-1-4398-2733-8 (Paperback)
This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been
made to publish reliable data and information, but the author and publisher cannot assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright
holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this
form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may
rectify in any future reprint.
Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the
publishers.
For permission to photocopy or use material electronically from this work, please access www.copyright.com (http://
www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923,
978-750-8400. CCC is a not-for-profit organization that provides licenses and registration for a variety of users. For
organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged.
Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for
identification and explanation without intent to infringe.
Library of Congress Cataloging‑in‑Publication Data
Stackpole, Bill.
Security strategy : from requirements to reality / Bill Stackpole and Eric Oksendahl.
p. cm.
Includes bibliographical references and index.
ISBN 978â•‚1â•‚4398â•‚2733â•‚8 (alk. paper)
1. Computer security. 2. Information technologyâ•‚â•‚Security measures. 3. Data protection. 4.
Businessâ•‚â•‚Data processingâ•‚â•‚Security measures. I. Oksendahl, Eric. II. Title.
QA76.9.A25S684 2011
005.8â•‚â•‚dc22
Visit the Taylor & Francis Web site at
http://www.taylorandfrancis.com
and the Auerbach Web site at
http://www.auerbach-publications.com
2010025968
To my father who always pushed us to be the best we could be.
William “Bill” Stackpole
To my wife Elaine who has always stood beside me and encouraged
and supported my efforts. I am truly a blessed man.
Eric Oksendahl
TAF-K11348-10-0301-C000e.indd v
8/18/10 3:00:42 PM
TAF-K11348-10-0301-C000e.indd vi
8/18/10 3:00:42 PM
Contents
Acknowledgments ………………………………………………………………………………………………… xv
Introduction ……………………………………………………………………………………………………….xvii
Preface ………………………………………………………………………………………………………………..xxi
Authors ……………………………………………………………………………………………………………. xxiii
SECTION I
STRATEGY
1 Strategy: An Introduction ………………………………………………………………………………..3
Strategic Planning Essentials…………………………………………………………………………………. 3
Strategic Planning Process Evaluation…………………………………………………………………….. 5
Security Leadership Challenges……………………………………………………………………………… 6
Getting Started …………………………………………………………………………………………………… 7
Value Proposition………………………………………………………………………………………… 8
Other Challenges for Security and Strategic Planning ………………………………………………. 8
When Strategic Planning Should Be Conducted………………………………………………………10
Metaphor Analysis and Strategic Planning………………………………………………………………10
Strategic Planning as a Process………………………………………………………………………13
Requirements for Successful Strategic Plans…………………………………………………….14
Creating a Security Culture…………………………………………………………………………………..15
Security Continuum (Moving toward a Security Culture)…………………………………………15
Conclusion…………………………………………………………………………………………………………16
2 Getting to the Big Picture ………………………………………………………………………………17
Background (Why Should Security Bother with Strategic Planning?)………………………….17
Menu of Strategic Planning Methods and Models ……………………………………………………18
Which Strategic Planning Tools?………………………………………………………………………….. 20
What Are Security Plan Essentials? (Analysis, Planning, and Implementation) ……………. 20
Learn the Big Picture of the Extended Enterprise……………………………………………..21
Include a High-Level Risk Assessment as Input ……………………………………………….21
Link Your Strategic Plan to the Organization Strategic Plan…………………………….. 22
Develop Flexibility and Fluidity in Your Department……………………………………… 22
When Should Strategic Planning Be Done?……………………………………………………………. 23
Six Keys to Successful Strategic Planning………………………………………………………………. 24
Simplicity…………………………………………………………………………………………………. 24
vii
TAF-K11348-10-0301-C000toc.indd vii
8/18/10 3:20:00 PM
viii ◾
Contents
Passion (Emotional Energy) and Speed of Planning and Adapting……………………..25
Connection to Core Values …………………………………………………………………………. 26
Core Competencies……………………………………………………………………………………. 27
Communication………………………………………………………………………………………… 28
Implementation…………………………………………………………………………………………. 29
Myths about Strategic Planning …………………………………………………………………………… 30
Barriers to Strategic Planning………………………………………………………………………………..31
Pushing through to the Next Level of Strategic Breakthrough (Inside/Outside
Organizational Input/Output)………………………………………………………………………..31
Going Slow to Go Faster, or Don’t Just Do Something, Sit There (Honing
Organizational Strategic Planning Skills)………………………………………………………. 32
Think Ahead, Act Now………………………………………………………………………………. 32
Strategic Business Principles and Workplace Politics……………………………………….. 32
Looking for Niches, Voids, Under-Your-Nose Advantages………………………………….33
Overcoming Negative Perceptions of Security………………………………………………………….33
Averse to Outsourcing………………………………………………………………………………… 34
Reluctant to Change Quickly……………………………………………………………………… 34
Stovepiped Organization Out of Touch with Business Realities ………………………… 34
Always Looking for the Next Magic Technology Bullet…………………………………….35
Promises, Promises You Can’t Keep……………………………………………………………….35
Developing Strategic Thinking Skills ……………………………………………………………………..35
Create Time for Thinking…………………………………………………………………………… 36
Scan ………………………………………………………………………………………………………… 36
Inquire …………………………………………………………………………………………………….. 37
Focus Long Distance/Practice Short Distance………………………………………………… 37
Anticipate ………………………………………………………………………………………………… 38
Communicate …………………………………………………………………………………………… 38
Evaluate …………………………………………………………………………………………………… 38
Practice Flexibility……………………………………………………………………………………… 39
Conclusion……………………………………………………………………………………………………….. 40
3 Testing the Consumer …………………………………………………………………………………….41
Introduction……………………………………………………………………………………………………….41
Defining the Consumer Buckets ………………………………………………………………………….. 42
What Historic Issues Are We Trying to Resolve or Avoid?………………………………… 42
What Are the Challenges?…………………………………………………………………………… 43
Customer Relationship Management (CRM)…………………………………………………. 43
Customer Value Management (CVM) ………………………………………………………….. 44
When Should You Collect Consumer Data?…………………………………………………….45
Quick Customer Assessment……………………………………………………………………………….. 46
Managing Key Internal Relationships…………………………………………………………… 46
Conducting Face-to-Face Interviews………………………………………………………………47
Guidelines for How to Solicit Feedback ………………………………………………………….47
Designing Customer Feedback Surveys…………………………………………………………………. 48
Online Survey Guidelines…………………………………………………………………………… 49
Focus Group Guidelines …………………………………………………………………………….. 49
Deploying a Survey ……………………………………………………………………………………………. 50
TAF-K11348-10-0301-C000toc.indd viii
8/18/10 3:20:00 PM
Contents

ix
Measuring Customer Satisfaction Results ……………………………………………………………… 50
Integration of Consumer Data …………………………………………………………………………….. 50
Conclusion…………………………………………………………………………………………………………52
4 Strategic Framework (Inputs to Strategic Planning)…………………………………………..53
Introduction……………………………………………………………………………………………………….53
Environmental Scan…………………………………………………………………………………………… 54
Regulations and Legal Environment ………………………………………………………………………55
Industry Standards…………………………………………………………………………………………….. 56
Marketplace–Customer Base ………………………………………………………………………………..59
Organizational Culture………………………………………………………………………………………. 60
National and International Requirements (Political and Economic)…………………………….61
Competitive Intelligence …………………………………………………………………………………….. 62
Business Intelligence ………………………………………………………………………………………….. 63
Technical Environment and Culture…………………………………………………………………….. 63
Business Drivers ………………………………………………………………………………………………….65
Business Drivers for the Enterprise……………………………………………………………….. 66
Additional Environmental Scan Resources………………………………………………………………67
Scenario Planning ……………………………………………………………………………………………… 68
Futurist Consultant Services ……………………………………………………………………………….. 69
Blue Ocean Strategy versus Red Ocean Strategy …………………………………………………….. 70
Future (the Need to Be Forward Looking)…………………………………………………………….. 71
Conclusion……………………………………………………………………………………………………….. 72
5 Developing a Strategic Planning Process ………………………………………………………….73
Roles and Responsibilities …………………………………………………………………………………….74
Process and Procedures ………………………………………………………………………………………. 75
Get Ready to Plan for a Plan …………………………………………………………………………………76
Planning, Preparation, and Facilitation…………………………………………………………………. 77
Building a Foundation for Strategy (High, Wide, and Deep) ……………………………………. 79
In the Beginning ……………………………………………………………………………………………….. 79
Vision, Mission, and Strategic Initiatives……………………………………………………….. 80
Vision Statement ……………………………………………………………………………….. 80
Mission Statement ………………………………………………………………………………81
Strategic Initiatives………………………………………………………………………………81
Analysis……………………………………………………………………………………………………. 82
Strategy Formation (Goals, Measurable Objectives)………………………………………… 83
Implementation (a Bias toward Action and Learning) ……………………………………………… 84
Keys to Success for the Implementation Stage of Strategic Planning …………………… 84
Feedback, Tracking, and Control…………………………………………………………………………..85
Completion ………………………………………………………………………………………………………. 87
Best Strategies (Strategies That Work) …………………………………………………………………… 87
Conclusion……………………………………………………………………………………………………….. 88
6 Gates, Geeks, and Guards (Security Convergence)……………………………………………..91
Introduction……………………………………………………………………………………………………….91
Terms and Definitions ……………………………………………………………………………….. 93
Benefits of Security Convergence …………………………………………………………………………. 93
TAF-K11348-10-0301-C000toc.indd ix
8/18/10 3:20:00 PM
x

Contents
Cost Savings …………………………………………………………………………………………….. 93
Improved Security and Risk Management…………………………………………………….. 94
More Effective Event/Incident Management………………………………………………….. 95
User Experience ………………………………………………………………………………………… 96
Regulatory Compliance ……………………………………………………………………………… 96
Improved Business Continuity Planning……………………………………………………….. 96
Other Improvements………………………………………………………………………………….. 97
Convergence Challenges …………………………………………………………………………………….. 97
Success Factors………………………………………………………………………………………………….. 98
Conclusion……………………………………………………………………………………………………….. 99
SECTION II TACTICS
7 Tactics: An Introduction……………………………………………………………………………….103
Tactical Framework……………………………………………………………………………………………103
Facilities—Physical Attack Scenarios……………………………………………………………104
IT Systems—Logical Attack Scenarios …………………………………………………………106
Objectives Identification …………………………………………………………………………………….107
First Principles ………………………………………………………………………………………………….108
Observation Principle…………………………………………………………………………………108
Response Principle …………………………………………………………………………………….109
Timeliness Principle………………………………………………………………….. …
Purchase answer to see full
attachment

How it works

  1. Paste your instructions in the instructions box. You can also attach an instructions file
  2. Select the writer category, deadline, education level and review the instructions 
  3. Make a payment for the order to be assignment to a writer
  4.  Download the paper after the writer uploads it 

Will the writer plagiarize my essay?

You will get a plagiarism-free paper and you can get an originality report upon request.

Is this service safe?

All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
$26
The price is based on these factors:
Academic level
Number of pages
Urgency
Basic features
  • Free title page and bibliography
  • Unlimited revisions
  • Plagiarism-free guarantee
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Part-by-part delivery
  • Overnight delivery
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.

Money-back guarantee

You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.

Read more

Zero-plagiarism guarantee

Each paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

Thanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.

Read more

Privacy policy

Your email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

By sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.

Read more

Order your essay today and save 20% with the discount code ESSAYHELP