Answer & Explanation:Q1. Pick one of the items below for your Original Post in this week’s discussion forum:· Why do policies need to be clearly worded? What happens if they’re not, they are confusing, or if they are too “legalese?” Provide at least one example supporting your points.· Why do policy documents need to address the six key questions: who, what, where, when, why, and how? What is the potential result if they do not? Provide at least one example supporting your points.· Describe the policy review and approval process. Who needs to be involved and why? Include how this process works for an organization.· Explain different methods for publishing policy documents. How and where should policies be stored? Why is it important to formally publish and publicize them? · Explain the purpose of a policy change control board. Include why it’s important to have oversight of the policy development process.· Describe the business drivers for changing policy documents. When, why, and how would these prompt a change?· Explain different organizational challenges when implementing policies. How can they be overcome?· Why should a security policy implementation be flexible to allow for updates? What can happen if it’s not?· Fully explain why an organization should have annual awareness training for organizational policies. Include costs and benefits.· Describe two methods for conducting policy awareness training.Requirement: One to One and Half PageDeadline: One day.Q2. Learning Objectives and Outcomes· Create a layered IT management policy defining separation of duties.AssignmentIn this assignment, you are to create a security management policy that addresses the management and the separation of duties throughout the seven domains of a typical IT infrastructure. You are to define what the information systems security responsibility is for each of the seven domains of a typical IT infrastructure. From this definition, you must incorporate a definition for the separation of duties into the Procedures section of the policy definition template that you will fill out later in this step. The company that’s the subject of this case study is Five Fourths Bank:· Five Fourths Bank is a regional Bank that has multiple branches and locations throughout the area.· Bank Management made the strategic decision to focus on online banking and use of the Internet.· The bank prides itself on its customer service department and their ability to quickly answer customer questions.· The organization needs to be in compliance with the Gramm-Leach-Bliley Act (GLBA), FS-ISAC, and IT best practices regarding its employees.· The organization wants to monitor and control use of the Internet by implementing web content filtering.· The organization wants to eliminate personal use of organization-owned IT assets and systems. However, they allow BYOD to attach to their guest wireless network.· The organization wants to monitor and control use of messaging systems by implementing e-mail security controls.· The bank wants to implement this policy for all its IT assets and to incorporate a policy review process into its annual awareness training.· The organization wants to define a policy framework, including a security management policy defining the separation of duties for information systems.Using the templates in your Security Policy text (pp.185-190), create the IT policy, standard, guideline, and procedure for Five Fourths Bank regarding the use of personal devices (cell phones, tablets, home computers, etc.). All of these may be contained in a single document, but each one should start on a new page. Deadline : 4 DaysSeven Domains of IT Infrastructure.pdf IT Strategy Policy 185-190.pdf Note: It’s Just Three paages work with 4 days deadline for the main question. I won’t pay more than $15. So don’t bid more that because I will not assign that work to you.
seven_domains_of_it_infrastructure.pdf
it_strategy_policy_185_190.pdf
Unformatted Attachment Preview
2/8/2016
Security Policies and Implementation Issues
PRINTED BY: karthikkoppisetty@yahoo.com. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without
publisher’s prior permission. Violators will be prosecuted.
https://bookshelf.vitalsource.com/#/books/9781284072136/cfi/110!/4/4@0.00:0.00
1/15
2/8/2016
Security Policies and Implementation Issues
PRINTED BY: karthikkoppisetty@yahoo.com. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without
publisher’s prior permission. Violators will be prosecuted.
https://bookshelf.vitalsource.com/#/books/9781284072136/cfi/110!/4/4@0.00:0.00
2/15
2/8/2016
Security Policies and Implementation Issues
PRINTED BY: karthikkoppisetty@yahoo.com. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without
publisher’s prior permission. Violators will be prosecuted.
https://bookshelf.vitalsource.com/#/books/9781284072136/cfi/110!/4/4@0.00:0.00
3/15
2/8/2016
Security Policies and Implementation Issues
PRINTED BY: karthikkoppisetty@yahoo.com. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without
publisher’s prior permission. Violators will be prosecuted.
https://bookshelf.vitalsource.com/#/books/9781284072136/cfi/110!/4/4@0.00:0.00
4/15
2/8/2016
Security Policies and Implementation Issues
PRINTED BY: karthikkoppisetty@yahoo.com. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without
publisher’s prior permission. Violators will be prosecuted.
https://bookshelf.vitalsource.com/#/books/9781284072136/cfi/110!/4/4@0.00:0.00
5/15
2/8/2016
Security Policies and Implementation Issues
PRINTED BY: karthikkoppisetty@yahoo.com. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without
publisher’s prior permission. Violators will be prosecuted.
https://bookshelf.vitalsource.com/#/books/9781284072136/cfi/110!/4/4@0.00:0.00
6/15
2/8/2016
Security Policies and Implementation Issues
PRINTED BY: karthikkoppisetty@yahoo.com. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without
publisher’s prior permission. Violators will be prosecuted.
https://bookshelf.vitalsource.com/#/books/9781284072136/cfi/110!/4/4@0.00:0.00
7/15
2/8/2016
Security Policies and Implementation Issues
PRINTED BY: karthikkoppisetty@yahoo.com. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without
publisher’s prior permission. Violators will be prosecuted.
https://bookshelf.vitalsource.com/#/books/9781284072136/cfi/110!/4/4@0.00:0.00
8/15
2/8/2016
Security Policies and Implementation Issues
PRINTED BY: karthikkoppisetty@yahoo.com. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without
publisher’s prior permission. Violators will be prosecuted.
https://bookshelf.vitalsource.com/#/books/9781284072136/cfi/110!/4/4@0.00:0.00
9/15
2/8/2016
Security Policies and Implementation Issues
PRINTED BY: karthikkoppisetty@yahoo.com. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without
publisher’s prior permission. Violators will be prosecuted.
https://bookshelf.vitalsource.com/#/books/9781284072136/cfi/110!/4/4@0.00:0.00
10/15
2/8/2016
Security Policies and Implementation Issues
PRINTED BY: karthikkoppisetty@yahoo.com. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without
publisher’s prior permission. Violators will be prosecuted.
https://bookshelf.vitalsource.com/#/books/9781284072136/cfi/110!/4/4@0.00:0.00
11/15
2/8/2016
Security Policies and Implementation Issues
PRINTED BY: karthikkoppisetty@yahoo.com. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without
publisher’s prior permission. Violators will be prosecuted.
https://bookshelf.vitalsource.com/#/books/9781284072136/cfi/110!/4/4@0.00:0.00
12/15
2/8/2016
Security Policies and Implementation Issues
PRINTED BY: karthikkoppisetty@yahoo.com. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without
publisher’s prior permission. Violators will be prosecuted.
https://bookshelf.vitalsource.com/#/books/9781284072136/cfi/110!/4/4@0.00:0.00
13/15
2/8/2016
Security Policies and Implementation Issues
PRINTED BY: karthikkoppisetty@yahoo.com. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without
publisher’s prior permission. Violators will be prosecuted.
https://bookshelf.vitalsource.com/#/books/9781284072136/cfi/110!/4/4@0.00:0.00
14/15
2/8/2016
Security Policies and Implementation Issues
PRINTED BY: karthikkoppisetty@yahoo.com. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without
publisher’s prior permission. Violators will be prosecuted.
https://bookshelf.vitalsource.com/#/books/9781284072136/cfi/110!/4/4@0.00:0.00
15/15
2/8/2016
Security Policies and Implementation Issues
PRINTED BY: karthikkoppisetty@yahoo.com. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without
publisher’s prior permission. Violators will be prosecuted.
https://bookshelf.vitalsource.com/#/books/9781284072136/cfi/204!/4/4@0.00:24.8
1/7
2/8/2016
Security Policies and Implementation Issues
PRINTED BY: karthikkoppisetty@yahoo.com. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without
publisher’s prior permission. Violators will be prosecuted.
https://bookshelf.vitalsource.com/#/books/9781284072136/cfi/204!/4/4@0.00:24.8
2/7
2/8/2016
Security Policies and Implementation Issues
PRINTED BY: karthikkoppisetty@yahoo.com. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without
publisher’s prior permission. Violators will be prosecuted.
https://bookshelf.vitalsource.com/#/books/9781284072136/cfi/204!/4/4@0.00:24.8
3/7
2/8/2016
Security Policies and Implementation Issues
PRINTED BY: karthikkoppisetty@yahoo.com. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without
publisher’s prior permission. Violators will be prosecuted.
https://bookshelf.vitalsource.com/#/books/9781284072136/cfi/204!/4/4@0.00:24.8
4/7
2/8/2016
Security Policies and Implementation Issues
PRINTED BY: karthikkoppisetty@yahoo.com. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without
publisher’s prior permission. Violators will be prosecuted.
https://bookshelf.vitalsource.com/#/books/9781284072136/cfi/204!/4/4@0.00:24.8
5/7
2/8/2016
Security Policies and Implementation Issues
PRINTED BY: karthikkoppisetty@yahoo.com. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without
publisher’s prior permission. Violators will be prosecuted.
https://bookshelf.vitalsource.com/#/books/9781284072136/cfi/204!/4/4@0.00:24.8
6/7
2/8/2016
Security Policies and Implementation Issues
PRINTED BY: karthikkoppisetty@yahoo.com. Printing is for personal, private use only. No part of this book may be reproduced or transmitted without
publisher’s prior permission. Violators will be prosecuted.
https://bookshelf.vitalsource.com/#/books/9781284072136/cfi/204!/4/4@0.00:24.8
7/7
…
Purchase answer to see full
attachment
You will get a plagiarism-free paper and you can get an originality report upon request.
All the personal information is confidential and we have 100% safe payment methods. We also guarantee good grades
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more