Discussion Question

 

Question 1 – Security Planning: Business Continuity Planning and Incident Response Procedures

Create the following security policies for the company described in the Course Security Scenario. State any assumptions that you make, or details that might add depth, texture, or provide a foundation for your policies. Your goal is to create effective policies that represent modern systems assurance security practices and planning.

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now
  1. Business Continuity Planning(2–4 pages).
  2. Incident Response Procedures (2–3 pages).

Consider the following scoring guide criteria as you complete your assignment:

  • Write a business continuity plan that is appropriate for the Course Security Scenario.
  • Write an incident response procedure policy that is appropriate for the Course Security Scenario.
  • Explain how configuring Websites to use a common NFS share could strengthen business continuity efforts.
  • Explain how the lab demonstrates the importance of business continuity efforts in organizations.

 

 

Question 2– Security Planning: Encryption Usage and Remote Access

Create the following security policies for the company described in the Course Security Scenario. State any assumptions that you make, or details that might add depth, texture, or provide a foundation for your policies. Your goal is to create effective policies that represent modern systems assurance security practices and planning.

  1. Encryption Usage in a regulated healthcare environment (1–2 pages).
  2. Remote Access (1 page).

Consider the following scoring guide criteria as you complete your assignment:

  • Write an encryption usage policy that is appropriate for the Course Security Scenario.
  • Write a remote access policy that is appropriate for the Course Security Scenario.
  • Explain why both public and private keys are needed in an asymmetric key pair.
 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "Newclient"