CSG3309 IT Security Management

Added on - 29 Apr 2021

  • 14

    Pages

  • 3183

    Words

  • 15

    Views

  • 0

    Downloads

Trusted by +2 million users,
1000+ happy students everyday
Showing pages 1 to 4 of 14 pages
Group Assignment-Lecturer-Gaven HenryIMPLEMENTATIONPLANCSG3309.2020.TR1.ALL IT Security Management
ContentsExecutive summary.........................................................................................................................3SCOPE.............................................................................................................................................3Goal..................................................................................................................................................3Vision...........................................................................................................................................3Timeline...........................................................................................................................................4Costs................................................................................................................................................4SETA program.................................................................................................................................4Security Education.......................................................................................................................5Training........................................................................................................................................5Awareness....................................................................................................................................5Incident Response Plan....................................................................................................................5Data breach..................................................................................................................................6Preparation...............................................................................................................................6Identifying and Scoping...........................................................................................................6Data Access Security...................................................................................................................6Intelligence gathering..................................................................................................................6Eradication...................................................................................................................................6Recovery & review......................................................................................................................6Continuity plan................................................................................................................................7Business Continuity Plan.............................................................................................................7Disaster Recovery Plan................................................................................................................8Organizational Structure..................................................................................................................9Implementation for major Tasks in JOHN DOUGH Pizza...........................................................10Database.....................................................................................................................................10Physical Security.......................................................................................................................11Video Recording & Alert System..........................................................................................11Maintain exterior...................................................................................................................11Keep valuable safe.................................................................................................................11Implementing Security Policies.................................................................................................11Access control policy.............................................................................................................11Two-factor authentication policy...........................................................................................121
Backup Policy........................................................................................................................12Security audit policy..............................................................................................................12Incident reports policy...........................................................................................................12Conclusion.....................................................................................................................................12References......................................................................................................................................13References.................................................................................................................................132
Executive summaryThe report is to plan the implementation addressing to improve the Information Security& Management issues of JOHN DOUGH pizza which is advised to CTO. Starting from thescope and including goals of the report, timeline for implementation, costs, SETA program,implementation for major tasks (implement security policy, etc.), incident response plan,business continuity, disaster recovery plan and organizational structure.SCOPEThe scope is to implement the plans with goal, time and cost. These plans contain:-Implementation for major task in JOHN DOUGH-Incident response plan-Business Continuity Plan-Disaster Recovery Plan-Revised Organizational StructureImplementation for major task will preventing the JOHN DOUGH from happening same fault.GoalJOHN DOUGH pizza planned to achieve this goal within 5 years:-Maintain the standards chain of pizza-To grow their business into remote geographic environment-To apply latest technology system for the efficient pizza ordering and managementsystem with franchisees-Use the social media to engage the customers interest in pizza ordering-Boost the level of IT security for the organization and customer with IT security team andR&D team-Disseminate the pizza ordering service to different regionsThe goal of the JOHN DOUGH pizza will be easily to implement with the well-structuredorganizational structure.Vision-Can give number1 experience in pizza ordering online-Become #1 name in pizza orderingTimelineTimeline for implementing the secure the IT system will take over 3 months. Startingfrom March 10th,2020 to June 30th,2020. For the training the employees’ phase, it’s from start toend of the implementation.3
desklib-logo
You’re reading a preview
Preview Documents

To View Complete Document

Click the button to download
Subscribe to our plans

Download This Document