Benchmark – Developing Enterprise Framework for a Security Program

  

COMPANY PROFILE: 

Mission Statement

The mission of Across the States Bank is to provide superior customer service and tools that enable citizens of the United States to manage their money domestically and abroad.

Vision Statement

Our vision is to become the premier banking services provider across all business segments through offering outstanding customer-centered service.

Across the States Bank (ASB) takes pride in providing our customers with superior service and the ability to manage their finances 24/7 from anywhere in the world. As one of America’s largest banks, our 132,500 employees are available to address personal and business banking customer needs any time of the day or night by phone, e-mail, or through our online chat feature. Our seamless online and mobile banking and 24-hour customer support ensure that your money management needs can always be met.

Based in Metropolis, California, ASB offers over 17,000 branch offices and ATMs to service customers across the continental United States. When traveling abroad, ASB customers can easily access accounts and complete routine banking transactions in most European nations through our foreign partner, Across the EU Bank. Always looking for means of expanding our $10 billion business, we are developing additional foreign partnerships that will soon allow us to expand our services to South America and Asia to better meet our customer needs.

Products and Services

Personal Banking

As one of the nation’s leading personal banking service providers, ASB allows individuals to select from a wide range of banking services, including:

  • Savings and      checking accounts
  • Debit and credit      cards
  • Personal and      automobile loans
  • Home loans,      including first mortgages, home equity, and lines of credit
  • Insurance
  • Investment      banking services
  • Wealth management      and estate services

Business and Commercial Banking

To meet the diverse needs of business and commercial customers, ASB offers individually selected and bundled services, including:

  • Business savings      and checking accounts
  • Business loans
  • Merchant services
  • Payroll services
  • Insurance
  • Investment      banking
  • Trust services
  • Shareowner      Services

Strategic Goals

  • Increase annual sales to $12 billion within the next 3 years.
  • Improve customer relations and customer service response times through the implementation of a state-of-the-art customer resource management system.
  • Increase services in the commercial sector by 15%.
  • Achieve      an average customer service satisfaction survey score of 95%

1. Select a fictitious company to use for the duration of this course and create an associated abbreviation (e.g., Across the States Bank (ASB), Lopes Manufacturing (LM), or Pike’s Peak Health Care (PPHC)).

2. For the company selected, research online or use Chapter 2 of the textbook and identify, at minimum, two laws or regulations that include a set of standards the organization must implement to achieve compliance (i.e., PCI DSS, HIPAAHITECH, ISO/IEC 27001:2013, or NISPOM 5220.22).

3. Use the “NIST 800-53r5 Framework – Appendix C,” the two identified laws, and the “ITT-430 Developing Enterprise Framework Template,” to map the various standards to the controls within the framework. Refer to the “ITT-430 Developing Enterprise Framework Example.”

4. Map a minimum of two NIST controls per law or regulation. NIST 800-53 controls may duplicate across standards as shown in the Developing Enterprise Framework Example (see SC-13).

5. Complete at least 25 mappings.

6. In the “Notes” column, briefly explain the purpose that the two laws or regulations and the associated controls are trying to achieve. For example, the first row in the example is establishing a policy on risk assessment and the identification and management of threats and vulnerabilities.

7. Research and create a security program framework outline for your fictitious company that aligns to the mission and vision of the company. Your outline should include a table of contents; list the topics your company would need to address in order to resolve the many issues of its business concerning confidentiality, integrity, and availability.

8. In 500–750 words, explain your security framework outline and how it is specific to your company. Explain why you chose to include your specific topics and how they will help to secure your companies interests as well as systems long term, differentiating between legal, regulatory, and framework compliance needs. Describe the major components, policies, and processes related to cyber defense, security controls, and network security.

9. Include at least two references outside of the required reading.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Database secuirty

  In 500 words discussing discussing how a blockchain implementation would improve data security in a military, education, or other context. 

Use the five-paragraph format. Each paragraph must have at least five sentences. Include 3 quotes with quotation marks and cited in-line and in a list of references. Include an interesting meaningful title.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Discussion Board DB5a

DB5a
Initial posts should be at least one paragraph (4-8 sentences) per question. In the first chapter of your textbook, various fallacies of critical thinking are described. Review attached PowerPoint.
1.)Based on your understanding/interpretation of these fallacies, highlight two fallacies that you or someone you know are guilty of and why. Provide examples.
2.)Speak to how you can/will avoid these critical thinking fallacies in your academic endeavors and/or discussion and debate with peers.
Discussion Board
Grading Criteria
Point Value
The initial response is extremely well-written containing relevant information regarding the topic. The response includes details and incorporates examples that accurately reflect the concept being discussed. Correct grammar and punctuation is utilized. The student uses external sources in addition to the course textbook to inform his or her response.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

IP – 3 – 4 pages

 

Audit Checklist

Based on what is in your risk assessment, policies, and monitoring plans, create your audit checklist. An audit tells you if you did what you said you were going to do. This checklist should include at least 20 items that will be checked during a standard audit. Create a table with four columns. The title for each column should be as follows:

  • Audit Item (under this header, list the 20 items that will be checked)
  • Item Described
  • Source
  • Audit Criteria

For the Item Described column, include a sentence or two about the item being audited. The Source should describe where this control came from (such as a policy, monitored control). For the Audit Criteria, include what the auditor should look for, including acceptable ranges.

Assessment Plan

Determine if there is any improvement possible on the existing controls and processes. As you create the assessment plan, keep in mind that an assessment looks for ways to continuously improve.

Determine if there is any improvement possible on the existing controls and processes. Provide a 10-step high-level assessment approach. An assessment looks for ways to continuously improve.

Provide 10 bullet points describing the approach the company would go through to conduct a self-assessment.

The following is an example:

  • Review what tools may be available that may offer security controls in a better fashion.
  • Review what tools may combine one or more existing tools.
  • Review trends in incidents or user requests to suggest different processes.

Submit all sections of your Enterprise Security Strategy Plan.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

Computer science 142 Java due today

write a program , Computer science 142 Java  due today 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

computer question

 What will a future without secrets look like? Description Information privacy or data privacy has been an issue when more and more our private data are being collected by numerous organizations. Watch the TED videos about the information privacy. Video URL: https://www.ted.com/talks/alessandro_acquisti_why_privacy_matters Answer these questions: 1-What new terms were introduced? 2-What new ideas/concerns were introduced? 3- What did you learn? 4-How can you use this in organizations? 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

IFSM 304 Week 6

Paper C2 (Individual) – Individual research paper on existing or emerging technology and its related ethical issues.

This is the second part of a three-part assignment, an individual assignment to research an existing or emerging technology and its ethical impact using the Web for the topic and questions that you selected for Paper C1. Please ensure that your research for this assignment addresses the ethical issues of an existing or emerging technology!

Prepare a minimum 3- 5 page, double-spaced paper and submit it to the Assignments Module as an attached Microsoft Word file. Indicate appropriate APA compliant reference citations for all sources you use.  In addition to critical thinking and analysis skills, your paper should reflect appropriate grammar and spelling, good organization, and proper business-writing style.

Preparation for Paper C3 (see Table below):

  • The instructor has assigned Study Groups for the third part or Paper C3.
  • To assist in collaboration for Paper C3, please prepare and post an approximate one page synopsis (i.e., a brief summary) of Paper C1 concerning your topic selection to your assigned Group topic under the Group Collaboration on Paper C3 forum in the LEO Discussions section. This will permit further interaction of the group in preparation for the group presentation of Paper C3.   The synopsis should state why you feel this topic is important and describe any supporting resources you found supporting your choice.
  • To assist in the further collaboration for Paper C3 please post your research paper (i.e., Paper C2), when it is completed in the assigned Group topic under the Group Collaboration on Paper C3 forum in the LEO Discussions section. This will enable others in your Group to read additional details on the topic that you wrote about.

In order to clarify a potentially confusing situation for the C series of papers, due to overlapping dates, the following table has been constructed:

Item

x/xx – x/xx

x/xx – x/xx

x/xx – x/xx

x/xx – x/xx

Paper C1

Start paper

Complete and Post to Assignments

Paper C1 – Synopsis

Prepare and Post to assigned Group topic under the Group Collaboration on Paper C3 forum in the Discussions section, when completed

Paper C2

Start paper

Complete and Post to Assignments

Paper C2

Post to assigned Group topic under the Group Collaboration on Paper C3 forum in the Discussions section, when completed

Paper C3

Groups review the Paper C1 synopsis and Paper C2 when they are posted and start to build consensus for the group topic to be featured in Paper C3

Designate Group Leader and start paper by completing consensus building on the topic and commence group preparation of presentation. The designated Group Leader must identify him or herself to the Instructor

Group completes presentation and only Group Leaders post to Assignments and to the respective DT-8 Group topic.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

SEC435 Discussion

  

“Encryption in Organizations” Select one of the following and discuss in no less than three paragraphs, and have at least one response to another student of at least one paragraph:

  1. Suppose an executive-level manager asked you to explain the importance of encryption. Detail the key points that you would use to justify the importance of using encryption during the overall security posture analysis of the executive-level manager’s organization.
  2. Research the web for examples of the manner in which security professionals could use encryption in organizations today (e.g., database encryption), describe at least two uses of encryption within organizations today that you found in your research. From the uses identified, indicate the information resource the encryption is designed to protect. Assess the importance of protecting such an information resource from a security perspective.
  3. Any current topic or article related to penetration techniques.
  4. The instructor insight.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

2 pages due Wednesday Noon PST

 Instructions: The Federal Bureau of Investigation (FBI) and the Secret Service both have outreach programs to the private sector to enhance reporting or cyber crime. The FBI program is called the InfraGard National Members Alliance. The Secret Service program is the Electronic Crimes Task Force. Below are 2 statements regarding these efforts. Please state which statement you agree with, and explain why you support that statement. **Explain selected Statement #2.

Statement 1: Having 2 industry outreach efforts on cybersecurity by federal law enforcement is a waste of taxpayers’ dollars and serves to only confuse industry. These programs should be combined into 1 consolidated initiative.

Statement 2: Having 2 efforts is necessary because these programs have similar but distinct missions. These programs need to remain separate, because having both provides a scaling capability that would not be achieved if only 1 agency conducted outreach efforts.

   * Would you say that the ongoing attacks against U.S. industry and government networks represent cyber war or cyber crime?

    *What implications do defining attacks have on how the U.S. government responds to them?

Thanks!

2 Full Pages double spaced.

Number of Pages: 2 Pages

Deadline: 2 days

Academic Level: Post-graduate

Paper Format: APA

Project categorization: essays/articles/responses/case study
 

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now

quiz questions

Employee behavior in an organization is:

usually far from optimal.

prone to create secure work environments.

not subject to policies and guidance.

similar to machines.

10.00000 points   Saved

QUESTION 2

Which of the following statements is true regarding organizational policy and security awareness training?

Employee attitudes toward security awareness training can range from indifferent to eager.

Employees’ willingness to work and learn is universal across different organizations.

Employees’ adherence to security policy is solely dependent upon the organization’s structure.

You can only create an organizational policy framework to define policies in flat organizations.

10.00000 points   Saved

QUESTION 3

Executive management, IT security policy enforcement monitoring, and human resources, all must have a unified front regarding the:

size and structure of the organization.

management structure and advancement opportunities.

issuance of executive orders within the organization.

disciplinary treatment of policy violations.

10.00000 points   Saved

QUESTION 4

Which of the following areas of the organization is responsible for establishing the policy commitment and implementation for the entire organization?

Executive Management

Supervisory-Level Management

Human Resources

IT Security Policy Enforcement Monitoring

10.00000 points   Save Answer

QUESTION 5

Which of the following areas of the organization conducts system logging, content filtering logging, and e-mail filtering logging with automated reporting for monthly or quarterly policy compliance reviews?

Executive Management

Supervisory-Level Management

Human Resources

IT Security Policy Enforcement Monitoring

10.00000 points   Save Answer

QUESTION 6

Which of the following areas of the organization is responsible for ensuring that employees, contractors, and consultants conform to all organizational policies?

Executive Management

Supervisory-Level Management

Human Resources

IT Security Policy Enforcement Monitoring

10.00000 points   Save Answer

QUESTION 7

Violations of security policies are considered to be a(n) __________ issue upon which proper disciplinary actions must be taken.

law enforcement

employer-employee

executive-staff

implementation

10.00000 points   Save Answer

QUESTION 8

Depending on the violation’s severity, repeat or continued violations of organization-wide policies might be grounds for:

refusing to pay earned wages.

denying overtime assignments.

termination of employment.

limiting an employee’s Internet access.

10.00000 points   Save Answer

QUESTION 9

Flat organizational structures are characterized by a management structure that:

is cross-functional and more open to employee input.

places all decision making at the executive management level.

provides limited access and connectivity to employees.

considers employee contributions to be of no value.

10.00000 points   Save Answer

QUESTION 10

Hierarchical organizational structures are characterized by departments that are separated by:

creativity level.

salary level, creating animosity between departments.

teams, creating competitiveness between departments.

function, creating multiple functional silos.

10.00000 points   Save Answer

QUESTION 11

In hierarchical organizational structures, communication between employees tends to:

be very difficult to achieve at all.

occur across organizational functions.

be more “top-down.”

be more “bottom-up.”

10.00000 points   Save Answer

QUESTION 12

In flat organizational structures, employees tend to be:

more open and communicative.

more interested in financial rewards.

constrained within their role or function.

less likely to interact across the organization.

10.00000 points   Save Answer

QUESTION 13

Employees in organizations with flat organizational structures tend to be more:

creative and involved in business decisions.

dissatisfied and apathetic.

financially successful.

concerned about job security.

10.00000 points   Save Answer

QUESTION 14

Hierarchical organizations are more likely than flat organizations to have a:

security policy.

formal chain of command.

profitable business model.

chief executive officer.

10.00000 points   Save Answer

QUESTION 15

Which of the following can affect an employee’s sense of job security, purpose, and potential to contribute to the company’s success, all of which can make an employee feel dissatisfied or apathetic?

The U.S economy

A company’s IT policies

A company’s size

A company’s board of directors

10.00000 points   Save Answer

QUESTION 16

Conducting annual audits and security assessments for policy compliance are critical security operations and management functions because:

people constantly change (they grow on the job, move to new jobs, etc.).

people tend to shy away from repetition and repetitive inputs.

employees never discover new risks and threats.

security awareness training is most often ineffective.

10.00000 points   Save Answer

QUESTION 17

Which of the following statements is true regarding the scenario in the lab in which the Specialty Medical Clinic was being acquired by a larger parent organization?

Both the medical clinic and the larger parent organization had a hierarchical structure with multiple departments and clinics.

Both the medical clinic and the larger parent organization had a flat organizational structure.

The medical clinic had a hierarchical structure with multiple departments and clinics, while the larger parent organization had a flat organizational structure.

The larger parent organization had a hierarchical structure with multiple departments and clinics, while the medical clinic had a flat organizational structure.

10.00000 points   Saved

QUESTION 18

Security awareness training can include special all-hands meetings called __________ meetings that are held between team or departmental leaders, with those leaders then sharing the information they’ve gained from those meetings with employees.

Town Hall

Task Force

Awareness

Security Reminders

10.00000 points   Save Answer

QUESTION 19

Which of the following statements is true regarding ongoing security policy management?

New policy and procedures always negatively impact a business process or create unintended challenges in a particular department.

When users find that a policy is going to make their jobs harder, they’re much more likely to try to circumvent that policy.

Employee feedback is not helpful in determining how a policy might impose unintended challenges on an employee.

Be certain to communicate, to leaders and employees alike, that there may be adverse repercussions for providing feedback.

10.00000 points   Save Answer

QUESTION 20

Which of the following statements is true regarding security awareness training?

Employees typically look forward to and enjoy mandatory security awareness training.

Security awareness training can be more effective if made unconventional or interactive.

The training should be uniform across all employees and departments.

The rationale behind the security training should be withheld from the employees.

10.00000 points   Save Answer

Click Save and Submit to save and submit. Click Save All Answers to save all answers.

Needs help with similar assignment?

We are available 24x7 to deliver the best services and assignment ready within 3-4 hours? Order a custom-written, plagiarism-free paper

Get Answer Over WhatsApp Order Paper Now