ITS 460 Milestone – Propose a Security Program for an Organization | My Homework Helper

Preparation: Choose a real or hypothetical organization, corporation (profit or non-profit), or institution that uses IT in its product, services, activities, and/or operations. If you work in an organization or field that could benefit from an information security program, you might wish to apply the project to it.
Assignment: Prepare a well-written security program proposal for your organization that utilizes the concepts learned in the course as a basis for your analysis and proposed solution.
Make sure that your proposal includes these basic elements of a good security policy:
An introduction that describes your organization, its mission, products/services, technical resources, and technical strategy.
An assessment of the impact on organizational culture from implementing information security.
An assessment of likely challenges in implementing and sustaining the proposed information security program.
Your recommendation for a security program should:Propose a set of information security positions and titles and define the roles information security personnel will have in the new organization.
Include an organizational chart that reflects the proposed security personnel.
Describe security education and training—who is trained on what subjects and how often.
Consider security awareness—how to incorporate information security awareness throughout the organization.
Summarize your security program recommendations.

Important: You must justify every element of your proposal in ethical and legal terms. In other words, you need to state why each policy/code element (including technical elements) is good for business and why it is good/sound ethical policy (how it is good for the organization and why it is good for customers, users, or employees, or the public). You should also identify any ethical/legal tensions, conflicts, and/or contradictions and justify any trade-offs being made in the recommendation.
Your paper should be 8-10-pages in length and conform to APA guidelines in the CSU Global Writing Center (Links to an external site.). Discuss and cite at least three credible or scholarly sources other than the course textbooks (which can be cited as well) to support your analysis and policy choices. The CSU Global Library is a good place to find these references.
Scenario Selection – Information Security Program
Submit a brief description of the real or hypothetical organization, corporation (profit or non-profit), or institution that uses IT in its product, activities, or operations that will serve as the scenario for your Portfolio Project. If you work or have worked for an organization could benefit from an information security program, consider using it as the scenario for your project. Your description should be at least a paragraph and no more than a page in length. You will receive valuable instructor feedback on your description that should be processed when you complete the Portfolio assignment.
CriteriaRatingsPtsThis criterion is linked to a Learning OutcomeRequirements
20 to >16.0 ptsMeets Expectation
The Portfolio includes all of the required components, as specified in the assignment.
16 to >12.0 ptsApproaches Expectation
The Portfolio includes most of the required components, as specified in the assignment.
12 to >8.0 ptsBelow Expectation
The Portfolio includes some of the required components, as specified in the assignment.
8 to >0 ptsLimited Evidence
The Portfolio includes few of the required components, as specified in the assignment.
20 pts
This criterion is linked to a Learning OutcomeContent
40 to >32.0 ptsMeets Expectation
Demonstrates strong or adequate knowledge of the selected organization, including mission, products/services, technical resources, and technical strategy; correctly represents knowledge from the readings and sources.
32 to >24.0 ptsApproaches Expectation
Some significant but not major errors or omissions in demonstration of knowledge.
24 to >16.0 ptsBelow Expectation
Major errors or omissions in demonstration of knowledge.
16 to >0 ptsLimited Evidence
Fails to demonstrate knowledge of the materials.
40 pts
This criterion is linked to a Learning OutcomeContent
40 to >32.0 ptsMeets Expectation
Demonstrates strong or adequate knowledge of either security policies or security programs, depending on the option selected; correctly represents knowledge from the readings and sources.
32 to >24.0 ptsApproaches Expectation
Some significant but not major errors or omissions in demonstration of knowledge.
24 to >16.0 ptsBelow Expectation
Major errors or omissions in demonstration of knowledge.
16 to >0 ptsLimited Evidence
Fails to demonstrate knowledge of the materials.
40 pts
This criterion is linked to a Learning OutcomeCritical Analysis
50 to >40.0 ptsMeets Expectation
Provides strong or adequate thought, insight and analysis of either the organization’s relationships with all stakeholders (Option 1) or of organizational culture regarding information security (Option 2).
40 to >30.0 ptsApproaches Expectation
Some significant but not major errors or omissions in thought, insight and analysis.
30 to >20.0 ptsBelow Expectation
Major errors or omissions in thought, insight and analysis.
20 to >0 ptsLimited Evidence
Fails to demonstrate thought, insight and analysis.
50 pts
This criterion is linked to a Learning OutcomeCritical Analysis
40 to >32.0 ptsMeets Expectation
Provides strong or adequate thought, insight and analysis of either the organization’s vulnerability (Option 1) or of likely challenges in implementing and sustaining the proposed information security program (Option 2).
32 to >24.0 ptsApproaches Expectation
Some significant but not major errors or omissions in thought, insight and analysis.
24 to >16.0 ptsBelow Expectation
Major errors or omissions in thought, insight and analysis.
16 to >0 ptsLimited Evidence
Fails to demonstrate thought, insight and analysis.
40 pts
This criterion is linked to a Learning OutcomeSynthesis and Evaluation
50 to >40.0 ptsMeets Expectation
Demonstrates strong or adequate synthesis and evaluation of course concepts in information security policy or planning recommendations.
40 to >30.0 ptsApproaches Expectation
Some significant but not major errors or omissions in synthesis and evaluation.
30 to >20.0 ptsBelow Expectation
Major errors or omissions in synthesis and evaluation.
20 to >0 ptsLimited Evidence
Fails to demonstrate synthesis and evaluation.
50 pts
This criterion is linked to a Learning OutcomeSources
15 to >12.0 ptsMeets Expectation
Cites and integrates at least 3 credible sources.
12 to >9.0 ptsApproaches Expectation
Cites and integrates 2 credible sources.
9 to >6.0 ptsBelow Expectation
Cites and integrates 1 credible source.
6 to >0 ptsLimited Evidence
Cites and integrates no credible sources.
15 pts
This criterion is linked to a Learning OutcomeApplication of Source Material
15 to >12.0 ptsMeets Expectation
Sources well or adequately chosen to provide substance and perspectives on the issue; knowledge from the course linked properly to source material.
12 to >9.0 ptsApproaches Expectation
Some significant but not major problems with selection and linkage of sources.
9 to >6.0 ptsBelow Expectation
Major problems with selection and linkage of sources.
6 to >0 ptsLimited Evidence
Source selection is seriously flawed; no linkage to knowledge from the course.
15 pts
This criterion is linked to a Learning OutcomeOrganization
20 to >16.0 ptsMeets Expectation
Project is clearly organized, well written, and in proper essay format including an introduction, body, and conclusion. Conforms to project requirements.
16 to >12.0 ptsApproaches Expectation
Small number of significant but not major flaws in organization and writing; is in proper essay format. In a minor way does not conform to project requirements.
12 to >8.0 ptsBelow Expectation
Major problems in organization and writing; does not completely follow proper essay format. In a significant way does not conform to project requirements.
8 to >0 ptsLimited Evidence
Project is not well organized or well written and is not in proper essay format. Does not conform to project requirements.
20 pts
This criterion is linked to a Learning OutcomeGrammar and Style
20 to >16.0 ptsMeets Expectation
Strong sentence and paragraph structure; few or no minor errors in grammar and spelling; appropriate writing style; clear and concise with no unsupported comments.
16 to >12.0 ptsApproaches Expectation
Small number of significant but not major errors in grammar and spelling; generally appropriate writing.
12 to >8.0 ptsBelow Expectation
Inconsistent to inadequate sentence and paragraph development; work needed on grammar and spelling; does not meet program expectations.
8 to >0 ptsLimited Evidence
Poor quality; unacceptable in terms of grammar and/or spelling; inappropriate writing style that interferes with clarity.
20 pts
This criterion is linked to a Learning OutcomeDemonstrates proper use of APA style
20 to >16.0 ptsMeets Expectation
Project contains proper APA formatting, according to the CSU Global Writing Center, with no more than one significant error.
16 to >12.0 ptsApproaches Expectation
Few errors in APA formatting, according to the CSU Global Writing Center, with no more than two to three significant errors.
12 to >8.0 ptsBelow Expectation
Significant errors in APA formatting, according to the CSU Global Writing Center, with four to five significant errors.
8 to >0 ptsLimited Evidence
Numerous errors in APA formatting, according to the CSU Global Writing Center, with more than five significant errors.
20 pts
Total Points: 330

Don't use plagiarized sources. Get Your Custom Essay on
ITS 460 Milestone – Propose a Security Program for an Organization | My Homework Helper
For $10/Page 0nly
Order Essay
Calculator

Calculate the price of your paper

Total price:$26

Need a better grade?
We've got you covered.

Order your paper