Information Systems

Case 4 - 17: Need help | Information Systems

Need help case4-ITM17.docx Module 4 - Case Managing and Assessing Information Security Policy Assignment Overview The Information Security Blueprint is t

Jun 02, 2025 0 views

Check out this sample solution our expert writers created for a client with a "write assignment" task.

Need help case4-ITM17.docx Module 4 - Case Managing and Assessing Information Security Policy Assignment Overview The Information Security Blueprint is the basis for the design, selection, and implementation of all security program elements. The blueprint builds on top of the organization's information security policies and it is a scalable, upgradable, comprehensive plan to meet the organization’s current and future information security needs. The blueprint is a detailed version of the information security framework, which is an outline of the overall information security strategy for the organization and a roadmap for planned changes to the information security environment of the organization. Security education and training is an important part of the Information Security Blueprint. Module 4 Video Case Assignment Search the Web for security education and training programs in your area. Keep a list and categorize the types of training offered. Determine the costs associated with each. Is the training general or for a specific security certification? Assess the cost effectiveness of the training both in terms of both time and money. Assignment Expectations Describe your results. Put them in a table describing the training program and cost.  You will assess the programs in terms of time, money, and effectiveness.  Summarize with a discussion of the key characteristics for Web security and training programs. You are required to make effective and appropriate use of in-text citations to the assigned readings and other source material to support your arguments. Please use the  Trident APA 7 Guide  at https://careered.libguides.com/tui/library/apa for proper formatting and style. Module 4 - Resources Managing and Assessing Information Security Policy Required Reading  Blum, D. (2021).  Rational Cybersecurity for Business: The Security Leaders' Guide to Business Alignment, Apress.  Chapter 5-9.  Finding Skillsoft Books (2022) Cybersecurity 101: Auditing & Incident Response. Course. 1st half of course.  Finding Skillsoft Books (2022). Cybersecurity Awareness: Getting Started with Security Foundations. 1st half of course.  Finding Skillsoft Books De Freminville, Marie (2020). Cybersecurity and Decision Makers: Data Security and Digital Trust, Wiley Chapter 3,4,5, and 6.  Finding Skillsoft Books Smallwood, R. F. (2020). Information Governance: Concepts, Strategies and Best Practices, Second Edition. Wiley-VCH. Chapters 1 – 5.  Finding Skillsoft Books Optional Reading Gregory, P. H. (07/24/2019). CISM® : Certified information security manager practice exams McGraw-Hill. Chapter 4

Need a similar assignment?

Our expert writers can help you with your specific requirements. Get started today.

Order Your Custom Solution

Get a Price Estimate

Price Estimate

Deadline.

Number of Pages.

Price: $12

Order Now

Why Students Choose Us

  • 150+ subject experts with advanced degrees
  • 100% original work with plagiarism reports
  • Secure confidentiality and data protection
  • 24/7 customer support and progress updates
  • Unlimited revisions until you're satisfied