Posted: May 16th, 2016

IT Security Management Implementation

Utilizing your comprehensive Security plan outline, develop a proposal for implementing IT Security Management.
Outline:
Information Security Plan, Illustration using Amazon
1. Introduction
Information security plans could place enterprises in a state enabling them to avoid, transfer, acknowledge or evade risks centered on processes, people or technologies. Kouns and Minoli (2011) add that a properly grounded strategy also helps an institution to safeguard its integrity, integrity as well as confidentiality of information. This paper presents a security plan for Amazon Company.
2. Threat Profile
2.1 Asset Classification
2.1.1 Cloud server
Asset ID C.A 01 Cloud server
Attribute Description
Description Hosts tenant files and software utilities
Ownership Vice president operations
Location Internet
Security Classification
C Confidentiality Confidentiality impact assessment-very high
I Integrity Integrity impact assessment-high
A Availability Availability impact assessment-high
Value Corporate data store. Privacy agreements with tenants

Expert paper writers are just a few clicks away

Place an order in 3 easy steps. Takes less than 5 mins.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Live Chat+1-631-333-0101EmailWhatsApp