Create IT security policies that are DoD compliant for the organization’s IT infrastructure.

Create IT security policies that are DoD compliant for the organization’s IT infrastructure.

Subject: Operations Security

PART A:
Discussion Topic: Some organizations keep documents in Word format and publish them in PDF format. Other organizations use tools like Governance, Risk, and Compliance (GRC). What makes one type of tool better than the other?

– 1) Discussion topic must be around 200-250 words
– 2) Must respond to 2 peers discussion topics

Reference:

Texbook: Security Policies and Implementation Issues, Author: Robert Johnson

PART B:
Topic-Department of Defense (DoD) Ready

Create IT security policies that are DoD compliant for the organization’s IT infrastructure. For this part you need to create a bulleted list of DoD-compliant policies, standards, and controls that affect the WAN, Remote Access, and System/Application Domains.

Required Source Information and Tools

Web References: Links to Web references in this document and related materials are subject to change without prior notice. These links were last verified on June 16, 2014.

The following tools and resources will be needed to complete this project:

Course textbook
Internet access
DoD instructions or directives
http://www.dtic.mil/whs/directives/
Risk Management Framework (RF) for Department of Defense Information Technology (IT) http://www.dtic.mil/whs/directives/corres/pdf/8510… and http://www.rmf.org/images/stories/rmf_documents/85…
Department of Defense Information Security Program
http://www.fas.org/irp/doddir/dod/5200-1r/
Department of Defense Internet Services and Internet-Based Capabilities
http://www.dtic.mil/whs/directives/corres/pdf/8550…
Department of Defense Proposes New Information Security Requirements for Contractors:
http://www.hldataprotection.com/2010/03/articles/c…
School/public library (optional)

 

Image preview for create IT security policies that are DoD compliant for the organization’s IT infrastructure.

Create IT security policies that are DoD compliant for the organization’s IT infrastructure.

APA

262 words

Open chat
Hello
Contact us here via WhatsApp