CASE STUDY

Your policies need high visibility to be effective.  When implementing policies, you can use various methods to spread the word throughout your organization.  Use management presentations, videos, panel discussions, guest speakers, and road shows, in a manner that ensures that management’s support is clear, especially where employees feel overwhelmed with policies, directives, guidelines, and procedures

Based on the case study or the Case Study on Page 168 of your text, write a 3 – 6 page paper to include the below information:

  1. Assign roles and responsibilities for employees at varying levels in the corporate hierarchy that are responsible for security policies.
  2. Analyze risk assessment and risk mitigation strategies and policy needs based on best practices
  3. Summarize your findings

Include proper APA citations for any references you use in your research. Ensure you have proper spelling, grammar, and mechanics throughout your writing.

Discussion

The Information Technology Infrastructure Library (ITIL) includes five books that represent the ITIL life cycle. A central part of ITIL, is Service Transition.  This relates to the transition of services into production.  It includes configuration management and change management. Discuss how you would use ITIL enhance you organization’s  security pposture.

500-700 words

 

  • attachment

    Week14SEcurityPolicyFrameworkCaseStudy.pdf

Found something interesting ?

• On-time delivery guarantee
• PhD-level professional writers
• Free Plagiarism Report

• 100% money-back guarantee
• Absolute Privacy & Confidentiality
• High Quality custom-written papers

Related Model Questions

Feel free to peruse our college and university model questions. If any our our assignment tasks interests you, click to place your order. Every paper is written by our professional essay writers from scratch to avoid plagiarism. We guarantee highest quality of work besides delivering your paper on time.

Grab your Discount!

25% Coupon Code: SAVE25
get 25% !!