Question details

Competency 427.3.3: Security Audits - The graduate evaluates the practice of
$ 20.00

SUBDOMAIN 427.3 - SECURITY POLICY & STANDARDS


Competency 427.3.3: Security Audits - The graduate evaluates the practice of defining and implementing a security audit and conducts an information security audit using industry best practices.

 

Introduction:


An Information Security Management System (ISMS) represents a systematic approach for designing, implementing, maintaining, and auditing an organization’s information system security objectives. As with any process, if an ISMS is not continually monitored, its effectiveness will tend to deteriorate.


For this task you will be using the attached “Healthy Body Wellness Center Risk Assessment” case study. In this task, you will be writing a 1–2 page white paper outlining the scope of an ISMS plan for the Healthy Body Wellness Center and an evaluation of the previously conducted risk assessment.


The first step in initiating an ISMS is to form a committee of upper level management that would set the tone for the ISMS. Assume you are part of that team. Initiating an ISMS involves developing a plan that includes the scope of the ISMS and identifying and assessing risk. The risk assessment for the Health Body Wellness Center has already been conducted. Your task is to define the ISMS scope for the Healthy Body Wellness Center and make recommendations for implementing the resulting ISMS plan.


Task:

A. Outline the scope (suggested length of 1–2 pages) for the ISMS plan being developed in the case study by including the following:

1. Information about the business objectives for the organization

2. A description of the guiding security principles of the organization

3. A justification of the processes that should be included in the scope

4. A justification of the information systems that should be included in the scope

5. A description of the IT infrastructure that includes a description of information flow

B. Recommend additional steps that the organization would need to take to implement the ISMS plan.

1. Discuss what each recommended step entails.

2. Justify each recommended step.

C. When you use sources, include all in-text citations and references in APA format.

Note: When bulleted points are present in the task prompt, the level of detail or support called for in the rubric refers to those bulleted points.


Note: For definitions of terms commonly used in the rubric, see the Rubric Terms web link included in the Evaluation Procedures section.


Note: When using sources to support ideas and elements in a paper or project, the submission MUST include APA formatted in-text citations with a corresponding reference list for any direct quotes or paraphrasing. It is not necessary to list sources that were consulted if they have not been quoted or paraphrased in the text of the paper or project.

Note: No more than a combined total of 30% of a submission can be directly quoted or closely paraphrased from sources, even if cited correctly. For tips on using APA style, please refer to the APA Handout web link included in the General Instructions section.

Available solutions