Week # 4 Assignment

Prepare a plan to design functions that encompass scoping a program or developing procedures, processes, and architectures that guide work execution at the program and/or system level). For this assignment instructions, please see below:
ASSIGNMENT INSTRUCTIONS:
See this Web Site: http://www.faulkner.com.ezproxy2.apus.edu/products/securitymgt and read the Geoff Keston article titled “Developing A Security Communications Plan“.
According to Keston (2013), “A mark of a mature security communications program is the shift away from one-time messages, such as ad hoc emails. Such messages are easily forgotten and are often hard to find after a few weeks. A good security communications plan will include sending updates and alerts as well as maintaining a repository of documentation. Creating such a repository (or a consolidated document) makes information easier to find, and it helps to link together disparate elements into a unified plan.”
For the purpose of this assignment, you are tasked as the Cybersecurity Director to prepare a Security Communications Plan for execution at the program level. You are to develop a security communications plan for your organization that addresses the handling of all communications related to security. Follow the requirements below:
REQUIREMENTS:
1. 5 Pages in length in APA format (not including a cover page and reference section)
2. Cover Page
3. Develop a comprehensive security plan that does the following:
– Identify archiving procedures
– Establish approval processes for sending communications
– Describe legal and regulatory requirements
– Define key terms
– Define severity levels and message types
– Using the definitions of severity levels and message types, diagram who receives messages and through what means they receive them (e.g., text messages)
– The plan will address the concerns of many constituents, including executives, IT staff members, and end users, as well as customers and partners. Each group has somewhat different needs, so it is helpful to structure a plan to protect sensitive information from the entire group and to make targeted information easy for its audience to find.
4. Reference Section
– Your references should not be more than 5 years old
IT SecurityCybersecurity

Don't use plagiarized sources. Get Your Custom Essay on
Week # 4 Assignment
Just from $13/Page
Order Essay
Calculate your order
Pages (275 words)
Standard price: $0.00
Client Reviews
4.9
Sitejabber
4.6
Trustpilot
4.8
Our Guarantees
100% Confidentiality
Information about customers is confidential and never disclosed to third parties.
Original Writing
We complete all papers from scratch. You can get a plagiarism report.
Timely Delivery
No missed deadlines – 97% of assignments are completed in time.
Money Back
If you're confident that a writer didn't follow your order details, ask for a refund.

Calculate the price of your order

You will get a personal manager and a discount.
We'll send you the first draft for approval by at
Total price:
$0.00
Power up Your Academic Success with the
Team of Professionals. We’ve Got Your Back.
Power up Your Study Success with Experts We’ve Got Your Back.
error: Content is protected !!
Live Chat+1(978) 822-0999EmailWhatsApp

Order your essay today and save 20% with the discount code ORIGINAL