Project #78062 - information security

 

While change controls are a necessary part of any information security policy, it is just human nature to resist change. Changes must be introduced incrementally so that all members of an organization accept them gradually. Understanding the scope of changes to be made for implementing the security implementation project will help you enlist the full cooperation of your senior technical analysts in implementing information security policies.

 

For this assignment, you will write a report to respond to a case study about implementing information security policies.

 


Instructions

 

  1. Read the Kelvin Urich Case study below about implementing project management tasks.

 

Kelvin Urich Case Study

 

Kelvin Urich—the Chief Information Security Officer of a large organization—was very confident about the change control meeting that was just about to begin. During last week’s meeting, the technical review committee had approved his ideas, and he was confident that his project plan was complete, tight, and well-ordered.

 

 

 

The meeting began and soon it was Kelvin’s chance to address the meeting. He began with the plan for the information security upgrades, which he had created after a detailed analysis of the threats to the systems. He went on to the seven change requests on his list for the day which were all network changes and were all top priorities. He would be sending each department head a complete list of planned changes and the expected dates for fulfillment of the changes. Each department would have to file detailed change requests in advance and find out about upcoming change requests by checking the master list. Kelvin was sure that the change requests resulting from this project would garner complete support from his colleagues due to the vast improvements it would bring into the information security program.

 

 

 

Sudden chaos broke out in the room when almost everyone seemed to feel that too much work had been dumped on them all at once. The six senior technical analysts who were not on the technical review committee had issues with the plan and the scheduling. As the meeting ended, it was clear that Kelvin was unsuccessful in his effort to convince his colleagues about his project plan.

 

  1. Create a Word document in which you respond to the following questions:

 

 

 

  • Which of the seven components of managing a security implementation project did Kelvin’s plan address and which did not?
  • What contributed to the chaos in the meeting?
  • Had you been in Kelvin’s place, what would you have done differently to prepare for this meeting?

 

 

 

Writing Requirements

 

Your responses must be two to three pages.

 

Your document must be double-spaced using a 12-point font with 1-inch margins and include your name at the top of the first page.

 

Proofread your document to eliminate mechanical and grammatical errors.

 

For citations, follow APA format.

 

 

 

Subject Computer
Due By (Pacific Time) 08/03/2015 12:00 am
Report DMCA
TutorRating
pallavi

Chat Now!

out of 1971 reviews
More..
amosmm

Chat Now!

out of 766 reviews
More..
PhyzKyd

Chat Now!

out of 1164 reviews
More..
rajdeep77

Chat Now!

out of 721 reviews
More..
sctys

Chat Now!

out of 1600 reviews
More..
sharadgreen

Chat Now!

out of 770 reviews
More..
topnotcher

Chat Now!

out of 766 reviews
More..
XXXIAO

Chat Now!

out of 680 reviews
More..
All Rights Reserved. Copyright by AceMyHW.com - Copyright Policy