CSG3309 IT Security Management
14 Pages3183 Words452 Views
Added on 2021-04-29
CSG3309 IT Security Management
Added on 2021-04-29
ShareRelated Documents
Group Assignment- Lecturer- Gaven HenryIMPLEMENTATION PLANCSG3309.2020.TR1.ALL IT Security Management
ContentsExecutive summary.........................................................................................................................3SCOPE.............................................................................................................................................3Goal..................................................................................................................................................3Vision...........................................................................................................................................3Timeline...........................................................................................................................................4Costs................................................................................................................................................4SETA program.................................................................................................................................4Security Education.......................................................................................................................5Training........................................................................................................................................5Awareness....................................................................................................................................5Incident Response Plan....................................................................................................................5Data breach..................................................................................................................................6Preparation...............................................................................................................................6Identifying and Scoping...........................................................................................................6Data Access Security...................................................................................................................6Intelligence gathering..................................................................................................................6Eradication...................................................................................................................................6Recovery & review......................................................................................................................6Continuity plan................................................................................................................................7Business Continuity Plan.............................................................................................................7Disaster Recovery Plan................................................................................................................8Organizational Structure..................................................................................................................9Implementation for major Tasks in JOHN DOUGH Pizza...........................................................10Database.....................................................................................................................................10Physical Security.......................................................................................................................11Video Recording & Alert System..........................................................................................11Maintain exterior...................................................................................................................11Keep valuable safe.................................................................................................................11Implementing Security Policies.................................................................................................11Access control policy.............................................................................................................11Two-factor authentication policy...........................................................................................121
Backup Policy........................................................................................................................12Security audit policy..............................................................................................................12Incident reports policy...........................................................................................................12Conclusion.....................................................................................................................................12References......................................................................................................................................13References.................................................................................................................................132
Executive summaryThe report is to plan the implementation addressing to improve the Information Security & Management issues of JOHN DOUGH pizza which is advised to CTO. Starting from the scope and including goals of the report, timeline for implementation, costs, SETA program, implementation for major tasks (implement security policy, etc.), incident response plan, business continuity, disaster recovery plan and organizational structure.SCOPEThe scope is to implement the plans with goal, time and cost. These plans contain:-Implementation for major task in JOHN DOUGH-Incident response plan-Business Continuity Plan-Disaster Recovery Plan-Revised Organizational StructureImplementation for major task will preventing the JOHN DOUGH from happening same fault.GoalJOHN DOUGH pizza planned to achieve this goal within 5 years:-Maintain the standards chain of pizza-To grow their business into remote geographic environment-To apply latest technology system for the efficient pizza ordering and management system with franchisees-Use the social media to engage the customers interest in pizza ordering-Boost the level of IT security for the organization and customer with IT security team andR&D team-Disseminate the pizza ordering service to different regionsThe goal of the JOHN DOUGH pizza will be easily to implement with the well-structured organizational structure. Vision-Can give number1 experience in pizza ordering online-Become #1 name in pizza orderingTimelineTimeline for implementing the secure the IT system will take over 3 months. Startingfrom March 10th,2020 to June 30th,2020. For the training the employees’ phase, it’s from start toend of the implementation.3
End of preview
Want to access all the pages? Upload your documents or become a member.
Related Documents
1. TITLE OF PAPER. Title of Paper My Name Course Titlelg...
|10
|1681
|3
Network Design Proposal for XYZ Retailslg...
|15
|873
|395
Securing Backupslg...
|5
|419
|289
Data Integrity Policy for Regional Gardenslg...
|10
|2264
|17
Network Security Plan Template- cyber securitylg...
|3
|451
|2880
CST 610 9043 Cyberspace and Cyber security Foundationlg...
|11
|792
|22