Posted: May 16th, 2016
Utilizing your comprehensive Security plan outline, develop a proposal for implementing IT Security Management.
Outline:
Information Security Plan, Illustration using Amazon
1. Introduction
Information security plans could place enterprises in a state enabling them to avoid, transfer, acknowledge or evade risks centered on processes, people or technologies. Kouns and Minoli (2011) add that a properly grounded strategy also helps an institution to safeguard its integrity, integrity as well as confidentiality of information. This paper presents a security plan for Amazon Company.
2. Threat Profile
2.1 Asset Classification
2.1.1 Cloud server
Asset ID C.A 01 Cloud server
Attribute Description
Description Hosts tenant files and software utilities
Ownership Vice president operations
Location Internet
Security Classification
C Confidentiality Confidentiality impact assessment-very high
I Integrity Integrity impact assessment-high
A Availability Availability impact assessment-high
Value Corporate data store. Privacy agreements with tenants
Place an order in 3 easy steps. Takes less than 5 mins.