Get a unique, high-quality and non-plagiarized paper from us today at the most affordable price
Email us : premieredtutorials@gmail.com

The Enterprise Information Security Policy


Al Ain Women’s COLLEGE

Assessment Cover Sheet

November 24, 2015

Programme Name:Bachelor
Course Code and Name:CIS 2103– Principles of Information Security
Time Allowed:4 Weeks (Week 10 – End of Week 14)
Assessment Number:AT4 – Designing an IS Policy
LO/Goals Covered: LO 03
Special Instructions:
  • Students to work in groups.
  • Students to submit both a soft copy, and a hard copy of the report.

 

% of Final Grade:15% of the final grade
Total Marks Available:35 marks.
Student Name:______________________________
Student Section:______________________________
Result:   / 35                                         (         %)
HCT Academic Honesty Policy

 

 

 

Academic dishonesty will not be tolerated within the HCT. Academic dishonesty includes cheating, plagiarism (copying) or any other attempt to gain an academic advantage in a dishonest or unfair manner. Breaches of the Academic Honesty Policy will result in dismissal from HCT
                      Writer Name and Signature                      Checker Name and Signature
 


ProjectOverview

In this Project, each group of students is required to choose a company and understand the security requirements based on the nature ofits business. They need to use the collected information about the company to design a suitable Information Security Policy.

Each group needs to deliver a status report of what they have finished/are doing on a weekly basis. Members of each group need to use the following to come up with a good Information Security policy report:

  • Good communication skills: when they communicate with companies.
  • Good research skills: when they search for suitable IS policies
  • Good analytical skills: when they study the company and find out the most suitable EISP and ISSP
  • Good writing skills: when they write the required sections in their report

The designed information security policy must demonstrate the students’ understanding of the chosen business and a comprehensive understanding of the components of both the Enterprise Information Security Policy and the Issue-Specific Security Policy.

The created report should include both the EISP and a number of ISSPs that address 5 different issues that are listed in the following sections.

General information about the Project

  1. What should I include in the report:

Students are required to include the following sections:

  1. Section 1: Introduction
  2. Section 2: Overview of the chosen company
  3. Section 3: The Enterprise Information Security Policy
  4. Section 4:Five different Issue-Specific Policies
  5. Section 5: Conclusion
  6. Section 6: References

 

  1. What should I include in each one of these section?

Following is a summary of what students need to include in each section:

  1. Section 1: Introduction

Students need to write general information about the project. This may include information about the team members, the way they collected information about the company, which might be a pure research or a real company that has been visited and/or called. It can also include an overview of the sections in the report, and a summary of what is covered in each section.

 

 

 

  1. Section 2: Overview of the chosen company

In this section, Students need to provide an overview of the company. This may include:What is the nature of business? What is the number of employees? How many branches or locations?How many computers? How many servers? Do they have a data center? If yes, where is it located in the building? How many locations are needed to be Secure Facilities?How many people are working in the security team?

 

  1. Section 3: The Enterprise Information Security Policy

In this section, Students need to design the EISP (general policy of the company). This should include the following elements:

  • An overview of the corporate philosophy on security
  • Information on the structure of the IS organization and individuals who fulfill the IS role
  • Fully articulated responsibilities for security that are shared by all members of the organization
  • Fully articulated responsibilities for security that are unique to each role within the organization

 

  1. Section 3: Five different Issue-Specific Policies

In this section, Students need to compose a single comprehensive ISSP document covering the following five issues:

  1. Email Security Policy
  2. Laptop Security Policy
  3. Wireless LAN Security Policy
  4. Backup Security Policy
  5. Physical Security Policy

 

Each of these policies must contain all the elements that are listed in the textbook page 177.

 

  1. Section 5: Conclusion

Students can use this section to summarize the outcomes of their project and give some details on how applying these policies will help the company in general.

 

  1. Section 6: References

Students are requested to list the URLs of all the websites they reviewed and used to be able to write there IS policies.

 

Check list

Before submitting your project, make sure that the following all the following sections arecompleted:

 

 

 


 

Marking Scheme (Assessment Rubrics)

 

Name:                                                                                       Student ID:                                                      

 

ItemInformationMarks availableMarks Awarded
Section 1: Project overview
  • General overview of the project
  • Members of the team
  • A List of the sections
  • A brief about each one of the sections
2
Section 2: Company overview
  • What is the nature of business
  • What is the number of employees
  • How many branches or locations?
  • How many computers? How many servers?
  • Do they have a data center? If yes, where is it located?
  • Location of the server rooms and wiring closets.
  • How many locations are needed to be Secure Facilities?
  • How many people are working in the security team?
3
Section 3: The EISP
  • An overview of the corporate philosophy on security
  • Information on the structure of the IS organization and individuals who fulfill the IS role
  • Fully articulated responsibilities for security that are shared by all members of the organization
  • Fully articulated responsibilities for security that are unique to each role within the organization
5
Section 4: Five ISSPs
  • Email Security Policy
4
  • Laptop Security Policy
4
  • Wireless LAN Security Policy
4
  • Backup Security Policy
4
  • Physical Security Policy
4
Section 5: Conclusion
  • Students can use this section to summarize the outcomes of their project and give some details on how applying these policies will help the company in general.
3
Section 6: References
  • The URLs of all the websites that have been used to collect information about the company and the different types of policies
2

 

Total35

 

 

For a custom paper on the above topic, place your order now!

 

What We Offer:

 

  • On-time delivery guarantee

 

  • PhD-level writers

 

  • Automatic plagiarism check

 

  • 100% money-back guarantee

 

  • 100% Privacy and Confidentiality

 

  • High Quality custom-written paper


How to Place an Order 

Send the assignment details such as the instructions, due date/deadline, number of pages and college level to the customer support agent online on live chat,  fill in the assignment details at place an order or send the information to our email address premieredtutorials@gmail.com and a customer support agent will respond to you immediately. 

Once you place your order, we choose for you the best and competent writer for your assignment based on each writer’s competence in handling a subject. 

When the homework is completed, we have a quality assurance team that proofreads the assignment to ensure it meets the required rubric instructions from your professor.

After thorough review of your assignment, we send the paper to the client. In case you need any changes at this point, you can let us know so that we can handle it for you at no extra charge. 

Homework Help Website

Why we should write your Paper 

  1. Money Return guarantee
  2. 0% Plagiarism Rate
  3. Guaranteed Privacy
  4. Written from scratch by highly qualified writers 
  5. Communication at Any Time (24/7)
  6. Flexible Pricing and Great Discount Programs
  7. Timely Deliveries
  8. Free Amendments
Looking for a similar assignment and in urgent need for help? Place your order and have excellent work written by our team of professionals to ensure you acquire the best grades.

  We are here to assist you.

 

Statistics about Us

130 New Projects
235 Projects in Progress
315 Inquiries
420 Repeat clients

© 2021 Premiered Tutorials
All rights reserved. We provide online custom written papers, such as term papers, research papers, thesis papers, essays, dissertations and other custom writing services.

All papers inclusive of research material are strictly intended to be used for research and study purposes only. Premiered Tutorials does not support or condone plagiarism in any form. These custom papers should be used with proper reference.

Place an Order
error: Content is protected !!