security management week 1 ( primary and main task )

Primary Task Response: Within the Discussion Board area, write 400–600 words that respond to the following questions with your thoughts, ideas, and comments. This will be the foundation for future discussions by your classmates. Be substantive and clear, and use examples to reinforce your ideas:
Using the library and Internet, search for information about security management organizations. One example might be a silo structure, which is vertical or hierarchical with both reporting and responsibilities. A second example might be a security working group (WG), which is a service with enterprise-wide participation. Complete the following:

Begin by making a choice of 3 priority security expectations for any security organization.

Justify your choices, and explain why other choices may not have been sufficient.
For each expectation, compare how it is achieved through both the silo and the WG organizational structures.

For each organizational structure, compare the roles that have security responsibilities.

For example, the chief security officer (CSO) has high visibility in both the silo and WG structures, but significant differences in leadership directions.

Acknowledge role differences, and justify changes with their responsibility assignments for each structure.

 main task 
Project Selection
The first step will be to select a real or hypothetical organization as the target for your Comprehensive Security Management Plan document. This organization will be used as the basis for each of the assignments throughout the course and should conform to the following guidelines:

Nontrivial: The selected organization should be large enough to allow reasonable exercise of the security management analysis and planning processes.
Domain knowledge: You should be familiar enough with the organization to allow focus on the project tasks without requiring significant time for domain education.
Accessibility: You should have good access to the people and other information that is related to the organization because this will be an important part of the process.
The selected organization may already have security management in place, but it may still be used as the basis for the projects in this course.
The selected organization must have a need for some kind of security management as part of its operations.

Feel free to identify a hypothetical organization that meets the requirements.
You may make any necessary assumptions to fulfill the requirements of organization selection.

Select an existing organization or identify a hypothetical organization that fits these requirements, and submit your proposal to your instructor before proceeding further with the assignments in the course. Approval should be sought within the first several days of the course through an e-mail proposal to your instructor.
The first task in this process will be to select an organization or identify a hypothetical organization to use as the basis of the projects. Next, you will create the shell document for the final project deliverable that will be worked on during each unit. While you proceed through each project phase, content will be added for each section of the document to gradually complete the final project. Appropriate research should be conducted to support the development of the document, and assumptions may be made.
For the first phase of the Comprehensive Security Management Plan document, you will create an enterprise organizational chart in the first document section. A proposed security working group (WG) organization and its ties to the enterprise will be added. Finally, include a 1-page discussion of the flow of information, decision-making communication, and responsibilities of the chief security officer (CSO). Create the skeleton for the Comprehensive Security Management Plan as follows:

Use Word
Title Page

Course number and name
Project name
Your name

Table of Contents (TOC)

Use an auto-generated TOC.
This must be on a separate page.
This must be a maximum of 3 levels deep.
Be sure to update the fields of the TOC before submitting your project.

Section Headings (Create each heading on a new page with “TBD” as content, except for the sections that are listed under “New Content.”)

Project Outline (Week 1)
Security Requirements (Week 1)
Security Business Requirements (Week 2)
Security Policy (Week 3)
System Design Principles (Week 4)
The Training Module (Week 5)


The following are the project deliverables for Week 1:

New Content

Project Outline and Security Requirements

Include a brief description of the real or hypothetical organization in which the Comprehensive Security Management Plan will be implemented.

Include the company’s size, location(s), and other pertinent information.

Initial Security Projects

Corporate organizational chart
WG structure and ties added to corporate organizational chart
Memo discussing communication flows with WG

The post security management week 1 ( primary and main task ) appeared first on Essay Bishops.

Order a unique copy of this paper
(550 words)

Approximate price: $22

Basic Guarantees
  • Free title page and bibliography
  • Free unlimited revisions
  • Plagiarism-free papers
  • Money-back guarantee
  • 24/7 support
On-demand options
  • Writer’s samples
  • Progressive delivery
  • Plagiarism report
  • Copies of used sources
  • Expert Proofreading
Paper format
  • 275 words per page
  • 12 pt Arial/Times New Roman
  • Double or single line spacing
  • Any citation style (APA, MLA, Chicago/Turabian, Harvard)

Our guarantees

Writing quality papers is a TOP priority. One expert takes one order at a time.
The service package includes topic brainstorm, research, drafting, proofreading, plagiarism check, citation formatting, and revisions.

Money-back guarantee

We appreciate how valuable your time is. Hence, we make sure all custom papers are 100% original and delivered within the agreed time frame

Read more

Zero-plagiarism guarantee

Each paper is written from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.

Read more

Free-revision policy

We see it as our duty to follow all instruction the client provides. If you feel the completed paper does not meet your exact requirements, we will revise the paper if you let us know about the problem within 14 business days from the date of delivery.

Read more

Privacy policy

Your email is safe, we use your personal data for legal purposes only and in accordance with personal data protection law. Your payment details are also secure, as we use only reliable payment systems.

Read more

Fair-cooperation guarantee

You can easily contact us with any question or issues you need to be addressed. Also, you have the opportunity to communicate directly with assigned writer, e-mail us, submit revision requests, chat with us online, or call our toll-free on our site. We are always available to our customers.

Read more

Calculate the price of your order

550 words
We'll send you the first draft for approval by September 11, 2018 at 10:52 AM
Total price:
The price is based on these factors:
Academic level
Number of pages