logo

CSG3309 IT Security Management

14 Pages3183 Words452 Views
   

Added on  2021-04-29

CSG3309 IT Security Management

   Added on 2021-04-29

ShareRelated Documents
Group Assignment- Lecturer- Gaven HenryIMPLEMENTATION PLANCSG3309.2020.TR1.ALL IT Security Management
CSG3309 IT Security Management_1
ContentsExecutive summary.........................................................................................................................3SCOPE.............................................................................................................................................3Goal..................................................................................................................................................3Vision...........................................................................................................................................3Timeline...........................................................................................................................................4Costs................................................................................................................................................4SETA program.................................................................................................................................4Security Education.......................................................................................................................5Training........................................................................................................................................5Awareness....................................................................................................................................5Incident Response Plan....................................................................................................................5Data breach..................................................................................................................................6Preparation...............................................................................................................................6Identifying and Scoping...........................................................................................................6Data Access Security...................................................................................................................6Intelligence gathering..................................................................................................................6Eradication...................................................................................................................................6Recovery & review......................................................................................................................6Continuity plan................................................................................................................................7Business Continuity Plan.............................................................................................................7Disaster Recovery Plan................................................................................................................8Organizational Structure..................................................................................................................9Implementation for major Tasks in JOHN DOUGH Pizza...........................................................10Database.....................................................................................................................................10Physical Security.......................................................................................................................11Video Recording & Alert System..........................................................................................11Maintain exterior...................................................................................................................11Keep valuable safe.................................................................................................................11Implementing Security Policies.................................................................................................11Access control policy.............................................................................................................11Two-factor authentication policy...........................................................................................121
CSG3309 IT Security Management_2
Backup Policy........................................................................................................................12Security audit policy..............................................................................................................12Incident reports policy...........................................................................................................12Conclusion.....................................................................................................................................12References......................................................................................................................................13References.................................................................................................................................132
CSG3309 IT Security Management_3
Executive summaryThe report is to plan the implementation addressing to improve the Information Security & Management issues of JOHN DOUGH pizza which is advised to CTO. Starting from the scope and including goals of the report, timeline for implementation, costs, SETA program, implementation for major tasks (implement security policy, etc.), incident response plan, business continuity, disaster recovery plan and organizational structure.SCOPEThe scope is to implement the plans with goal, time and cost. These plans contain:-Implementation for major task in JOHN DOUGH-Incident response plan-Business Continuity Plan-Disaster Recovery Plan-Revised Organizational StructureImplementation for major task will preventing the JOHN DOUGH from happening same fault.GoalJOHN DOUGH pizza planned to achieve this goal within 5 years:-Maintain the standards chain of pizza-To grow their business into remote geographic environment-To apply latest technology system for the efficient pizza ordering and management system with franchisees-Use the social media to engage the customers interest in pizza ordering-Boost the level of IT security for the organization and customer with IT security team andR&D team-Disseminate the pizza ordering service to different regionsThe goal of the JOHN DOUGH pizza will be easily to implement with the well-structured organizational structure. Vision-Can give number1 experience in pizza ordering online-Become #1 name in pizza orderingTimelineTimeline for implementing the secure the IT system will take over 3 months. Startingfrom March 10th,2020 to June 30th,2020. For the training the employees’ phase, it’s from start toend of the implementation.3
CSG3309 IT Security Management_4

End of preview

Want to access all the pages? Upload your documents or become a member.

Related Documents
1. TITLE OF PAPER. Title of Paper My Name Course Title
|10
|1681
|3

Network Design Proposal for XYZ Retails
|15
|873
|395

Securing Backups
|5
|419
|289

Data Integrity Policy for Regional Gardens
|10
|2264
|17

Network Security Plan Template- cyber security
|3
|451
|2880

CST 610 9043 Cyberspace and Cyber security Foundation
|11
|792
|22