Preview

Security and Gap Analysis

Satisfactory Essays
Open Document
Open Document
632 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Security and Gap Analysis
IS4799 Information Systems and
Cybersecurity Capstone Project
Unit 3
IT Security Policy Framework Gap
Analysis
© ITT Educational Services, Inc. All rights reserved.

Learning Objective and Key
Concepts
Learning Objective
 Plan and perform a security compliance gap analysis Key Concepts
 Information technology (IT) security policy
 Security controls
 Compliance requirements
 Gap analysis

IS4799 Information Systems and Cybersecurity Capstone Project

© ITT Educational Services, Inc. All rights reserved.
Page 2

EXPLORE: CONCEPTS

IS4799 Information Systems and Cybersecurity Capstone Project

© ITT Educational Services, Inc. All rights reserved.
Page 3

Compliance and Governance
Requirements
 Requirements
• Compliance
• Governance

 Identify the requirements that apply
 Specific to types of organizations
• Organizations that handle payment cards must comply with

Payment Card Institute Data Security Standard (PCI DSS).
• Organizations that handle personal medical records must comply with Health Insurance Portability and Accountability
Act (HIPAA).

IS4799 Information Systems and Cybersecurity Capstone Project

© ITT Educational Services, Inc. All rights reserved.
Page 4

Align Requirements
 Align requirements to client’s policy framework.  Associate existing policy to requirements.
 Include descriptions for proposed changes.

IS4799 Information Systems and Cybersecurity Capstone Project

© ITT Educational Services, Inc. All rights reserved.
Page 5

Alignment Process
Identify
requirements.

Review existing policy.

Associate requirements to policy.

IS4799 Information Systems and Cybersecurity Capstone Project

© ITT Educational Services, Inc. All rights reserved.
Page 6

Review Policy Components
 Policy: Rules that fulfill security objectives
 Standards: General requirements everyone must meet
 Guidelines: Best practices for specific contexts  Procedures: Step-by-step instructions for carrying out tasks

IS4799 Information Systems and

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Argyle Security Inc. is a detention and commercial security provider based out of San Antonio, TX. Established in 2005 originally as Argyle Security Acquisition Corporation, Argyle Security Inc. operates through five different business units ISI, MCS, PDI, Com-Tec, and MCS Fire & Security business units. In April 2008, the private equity firm MML Capital made a $15 million investment into Argyle Security. The company has since successfully positioned itself to take advantage of increasing domestic incarceration rates and the need to house and secure an ever growing number of inmates.…

    • 756 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    NT 2580 Introduction To Information Security Teacher : Mr. Timothy Tacker Unit 10 Assignment 1 Examine Real-World Applications of Security Standards ++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++…

    • 493 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    A cyber-attack is a deliberate exploitation of computer systems, technology-dependent enterprises, and networks (Janssen, n.d.). There are 11 potential security threats thought to be the top security threats for 2013; targeted attacks and cyber-espionage, hacktivism, nation-state-sponsored cyber-attacks, legal surveillance tools, clouds and malware, privacy threats, fake security certificates, ransomeware spreading globally, MAC OS malware, mobile malware, and vulnerabilities and exploits (Davis, 2013). Symantec’s 2013 Internet Security Threat report finds that there was a 42% increase in targeted attacks in 2012…

    • 1317 Words
    • 6 Pages
    Better Essays
  • Satisfactory Essays

    Safeguarding Case Study

    • 378 Words
    • 2 Pages

    Therefore, it is Chris’s duty as a teaching assistant to follow the procedures regarding suspected abuse.…

    • 378 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Safeguarding Case Study

    • 615 Words
    • 3 Pages

    1. Leroy may be the victim of neglect as there is evidence that his parents are persistently failing to meet his basic physical and psychological needs and that this is likely to cause impairment to his health and development. HM Government (2006). Maccoby and Martin (1983) assert that a child may suffer neglect if that child’s needs form a low priority within the family unit. In addition to neglect, Leroy may well be the experiencing emotional abuse. Emotional abuse involves the “persistent maltreatment of a child such as to cause severe and persistent effect on their emotional development.” HM Government (2006:39). This may include conveying a feeling of worthlessness; being unloved; inappropriate expectations of a child’s ability or level of responsibility, which are out of kilter with that child’s age and stage and being witness to the maltreatment and abuse of others.…

    • 615 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Weak system security can cause massive problems for an organisation. Holes in security can allow hackers to gain access to an organisations data or its customers’ personal information etc. Once this happens, drastic problems can be caused for the organisation; anything from severe loss of earnings, loss of customers or even bankruptcy if the problem is not taken under control quickly. I will talk about some of the products of having weak system security, and the problems that these can cause.…

    • 744 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Working in partnership in Safeguarding children is the action we take to promote the welfare of children and protect them from harm, this is everyoneâ€TMs responsibility. Everyone who…

    • 1171 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Close The Gap Analysis

    • 354 Words
    • 2 Pages

    Malcolm Turnbull, Australia’s Prime Minister, admits that Close the Gap, a program aimed to reduce inequality between Aborigines and nonnative Australians, has had mixed progress at best. Child mortality rates have fallen and high school graduation rates have risen, but figures contrasting life expectancy and employment between the groups aren’t satisfactory. The Australian government has been criticized for weak engagement with Aboriginal communities and misguided spending, and barriers of language, culture, and physical distance make healthcare difficult to attain. A report detailing this inadequacy urges the major Australian political parties to prioritize Aboriginal healthcare…

    • 354 Words
    • 2 Pages
    Good Essays
  • Better Essays

    Alm Gap Analysis

    • 1033 Words
    • 5 Pages

    Gap analysis is a technique of asset-liability management that can be used to assess interest rate risk or liquidity risk. Implementations for those two applications differ in minor ways, so people distinguish between interest rate gaps and liquidity gaps. This article discusses both.…

    • 1033 Words
    • 5 Pages
    Better Essays
  • Better Essays

    Acievement Gap

    • 1079 Words
    • 5 Pages

    Why is the “achievement gap” important to understand within a multicultural framework? What are some of the problems with the term “achievement gap?” These questions will be answer in this essay describing multicultural education and how defining the term “achievement gap” and understanding it aids in narrowing the gap. In the multicultural framework of education, “achievement gaps” have been focused on the gap between black and white students. But as the U.S. became a “melting pot” for so many other ethnic populations, “achievement gaps” was seen between whites and other ethnic groups such as Hispanics. The measurement of the achievement gap will also be reviewed. There is no denying that “achievement gap” exists but to what capacity is what this essay hopes to explore.…

    • 1079 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    While both of the above elements of the question complement each other, without understanding the main purpose of security management, which is in itself is multifaceted in nature, and ideally to be successful should be employed throughout all aspects of a business, as can be seen…

    • 1598 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Gap Analysis: Riodoran

    • 1703 Words
    • 7 Pages

    References: Bertone, S., & Leahy, M. (2001). Chapter 11: Globalization and Diversity Management. In , Globalization, Employment & the Workplace (pp. 207-238). Taylor & Francis Ltd / Books.…

    • 1703 Words
    • 7 Pages
    Powerful Essays
  • Satisfactory Essays

    There are countless steps that can be taken to safeguard a company’s data systems against intrusions; however, our collaborative discussion stressed three. Our team reviewed the benefits of updating POS…

    • 499 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Analyzer (MBSA) to assess its security state, and you examined the results of the Microsoft…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    References: Johnson, Rob. with Merkow, Mike. Security Policies and Implementation Issues. First Edition. Copyright © 2011by Jones & Bartlett Learning, LLC, an Ascend Learning company…

    • 577 Words
    • 2 Pages
    Good Essays