...Project Part 1 Task 2 Risk Management Plan Alen Kovacevic C. Wyrick IS3110 January 29, 2013 Purpose The Senior Management of the Defense Logistics Information Services (DLIS) has decided to update the previous risk management plan with a developing, new risk management plan. This new risk management plan will not only minimize the amount of risk for future endeavors, but will also be in compliance with regulations such as the Federal Information Security Management Act (FISMA), Department of Defense (DOD), Department of Homeland Security (DHS), National Institute of Standards and Technology (NIST), Control Objects for Information and Technology (COBIT), and Information Assurance Certification and Accreditation Process (DAICAP). Scope The risk management plan is for the organization use only and its network, including remote access company owned building in United States. Outside sources from this scope and risk management plan may cause the network infrastructure to fail or will make it a high risk structure due to the fact that the outside source may not protected to interact with other outside sources allowing hackers to infiltrate your system and steal important files. Compliances Federal Information Security Management Act (FISMA) compliance is required for federal agencies to protect their important information. Department of Homeland Security (DHS) compliance is to be required for protection to the United States against terrorists. There are other organizations...
Words: 1365 - Pages: 6
...Reggie Thurman. Project 1 IS3110 Mr. Rivers October 19, 2013 Project 1 Part 1: Risk Mgmt. Plan 1. Introduction Risk Mgmt. Plan Well for starters the purpose of this risk management for DLIS (Defense Logistics Information Service) plan will be similar to the purpose of any organization would be and that would be how to better protect and secure the company’s IT environment. The importance of this is major since there is all kind of important data that is on and transmitted throughout our networks on a daily basis. DLIS we must ensure that we implement all necessary preventative security measures as well as policies and procedures. We must do this by first of all ensuring that we have really good antivirus software installed on all of our systems and ensuring that it is always up to date. The next thing is extensively configuring our firewalls making it more difficult for our networks to be hacked. Another thing is data encryption which is very vital in securing all important data for our company and clients especially when we are performing data transmission over the networks. The last thing I want to mention which will be part of policies and procedure is implementing various password and logon policies and procedures for security purposes as well. As I stated the purpose of the development of this plan is to reduce the risk of threats and vulnerabilities on our networks. This is vital because threats and vulnerabilities definitely present risk(s) to any...
Words: 2058 - Pages: 9
...Final Project IS3110 11/24/2014 Aaron Roberts Tambotka Howard Francis Owagoke Robert Haslett SonoranBudds Consulting CEO: Aaron Roberts Lead: Tambotka Howard Technical professionals: Francis Owagoke, Robert Haslett PROPOSAL for Ricks Automotive Email Migration Plan The following proposal is for the mass email migration of Ricks Automotive and the plan for this migration. We will go over the scope that will be implemented and if there are any questions by the end of the proposal, email the team lead for any questions. Onboard Completion Roadmap: Ricks Automotive Below you’ll find the email migration plan created specifically for your business, Ricks Automotive. Please read through it and let us know if you have any questions. Please Note: The following agreement will not be considered until the Technical Team and an overview of Office 365 Online and Desktop applications has taken place, this will include installation of desktop applications, walkthrough of import/export feature and configuration of a web client. In attendance of this meeting will be the Ricks Automotive Technical Team and the onboarding engineer addressing any initial inquiries and further acquainting the Ricks Automotive Technical Team with Office 365. Note: This migration process will pose a branding issue as the mailboxes created will not be sending from the legacy mailbox name but rather the default alias in your account (e.x. admin@contoso.com would become admin@onmicrosoft.contoso.com) After the initial...
Words: 1884 - Pages: 8
...IS3110 IT RISK MANAGEMENT PROJECT Henry Smigielski, Steven Martin, Benjamin Yau, Ulises Martinez IS3110 IT RISK MANAGEMENT PROJECT Henry Smigielski, Steven Martin, Benjamin Yau, Ulises Martinez TABLE OF CONTENTS 1.0 PURPOSE AND SCOPE 4 2.0 RISK PLANNING 4 2.1 ROLES AND RESPONSIBILITIES 6 2.2 RISK IDENTIFICATION 7 2.2.1 Methods for Risk Identification 7 2.2.2 Identified Risks 7 2.3 RISK ASSESMENT 28 2.3.1 Qualitative Risk Assessment 28 Probability 28 Impact 29 Threat Matrix 30 2.3.2 Quantitative Risk Assessment 33 2.4 RISK RESPONSE PLANNING 34 Avoid 35 Mitigate 35 Accept 35 Contingency 35 Transfer 35 2.5 RISK MITIGATION 35 2.6 RISK MONITORING 39 Pulse Meetings 39 Variance Reports 40 Program Reviews 41 Technical Reviews 42 Project Forecasting 43 Problem Solving 45 2.6.1 Project Management Information System 46 Management Reviews 47 Project Dashboards 48 Change Management Log 50 3.0 Computer Incident Response Team Plan 51 3.1 Have an incident response plan. 52 3.2 Pre-define your incident response team 53 3.3 Define your approach: watch and learn or contain and recover. 54 3.4 Pre-distribute call cards. 55 3.5 Forensic and incident response data capture. 56 3.6 Get your users on-side. 56 3.7 Know how to report crimes and engage law enforcement. 57 3.8 Practice makes perfect. 58 4.0 Disaster Recovery versus Business Continuity Planning 59 4.1 Define Key...
Words: 14207 - Pages: 57
...Credit hours: 4.5 Contact/Instructional hours: 60 (30 Theory, 30 Lab) Prerequisite: IS3110 Risk Management in Information Technology Security or equivalent Corequisite: None Table of Contents Course Overview 5 Course Summary 5 Critical Considerations 5 Instructional Resources 6 Required Resources 6 Additional Resources 6 Course Management 8 Technical Requirements 8 Test Administration and Processing 8 Replacement of Learning Assignments 9 Communication and Student Support 9 Academic Integrity 10 Grading 11 Course Delivery 13 Instructional Approach 13 Methodology 13 Facilitation Strategies 14 Unit Plans 15 Unit 1: Information Security Policy Management 15 Unit 2: Risk Mitigation and Business Support Processes 25 Unit 3: Policies, Standards, Procedures, and Guidelines 33 Unit 4: Information Systems Security Policy Framework 42 Unit 5: User Policies 50 Unit 6: IT Infrastructure Security Policies 58 Unit 7: Risk Management 66 Unit 8: Incident Response Team Policies 74 Unit 9: Implementing and Maintaining an IT Security Policy Framework 83 Unit 10: Automated Policy Compliance Systems 90 Unit 11: Course Review and Final Examination 97 Course Support Tools 101 Evaluation of Student Learning 102 STUDENT COPY 103 Graded Assignment Requirements 104 Unit 1 Discussion 1: Importance of Security Policies 105 Unit 1 Assignment 1: Security Policies Overcoming Business...
Words: 18421 - Pages: 74