Preview

Comprehensive Security Management Plan

Powerful Essays
Open Document
Open Document
8519 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Comprehensive Security Management Plan
Colorado Technical University Comprehensive Security Management Plan for Colorado History Individual Project 5 By
Roy A. Kelly II
Colorado Springs, Colorado
December 22, 2012

Table of Contents Project Outline 4 Security Requirements 5 Organizational Chart (Colorado Historical Society, 2012) 5 Proposed Security Working Group 6 Security Business Requirements 9 Capability Maturity Model Integration (CMMI) 9 Capability Levels 11 Base Practices 11 Procedures to review 12 Security Policy 19 Why We Need Security Policies 19 Security Policy Table 19 System Design Principles 22 Open Design 22 Securing the Weakest Link 23 Defense in Depth 23 Failing Securely 24 Least Privilege 25 Separation of Privilege 26 Economy of Mechanism 26 How Security Principles Relate to Us 27 The Training Module 29 User Roles 29 Executive Management 29 Mid-level Management 29 Museum Staff 30 Museum Volunteers 30 IT and Security 30 Courses 30 Introduction to Information Security 31 Information Security for Executives 31 Computer and Network Security Awareness 33 Cloud Security Fundamentals 33 Social Engineering 34 Email, Instant Messaging, and Browsing 35 Training Matrix 35 Measuring Impact 35 References 38

Project Outline
Repurposed: This task contains portions of material that were originally submitted during the Summer 1, 2012 session in CS631 OLA1 with Shawn Murray.
History Colorado is headquartered in Denver, with other offices in Denver, Montrose, and Pueblo; and five museums scattered around the state. Each office has 6 to 10 computers and each museum has 1 to 5 computers that connect to the headquarters over a leased line to make a WAN spanning the entire state. The webserver is in the headquarters and is in a DMZ that is separate from the rest of the network. Guest lecturers and other historians that may work temporarily in our offices may have different operating systems, so we also



References: Barnum, S., Gegick, M. (2005). Design Principles. Retrieved from https://buildsecurityin.us-cert.gov/bsi/articles/knowledge/principles/358-BSI.html Benzel, T., Irvine, C., Levin, T., Bhaskara, G., Nguyen, T Capability Maturity Model Integration (CMMI) [ACQuipedia]. (2012). Retrieved from https://dap.dau.mil/acquipedia/Pages/ArticleDetails.aspx?aid=700579d2-7b76-4dbc-b877-9c97fd18a341 CMMI Institute - the home of Capability Maturity Model Intergration (2012) CMMI Product Team. (2010) CMMI® for Development, Version 1.3. Retrieved from https://campus.ctuonline.edu/pages/MainFrame.aspx?ContentFrame=/Classroom/course.aspx?Class=235253&tid=195 Colorado Historical Society (2012) Garbars, K. (2002). Implementing an Effective IT Security Program. Retrieved from http://www.sans.org/reading_room/whitepapers/bestprac/implementing-effective-security-program_80 Greiner, L Guel, M. (2007). Policy Primer. Retrieved from http://www.sans.org/security-resources/policies/Policy_Primer.pdf Hadnagy, C., Aharoni Saxena, N. (2010). Lecture 6: Security Design Principles. Retrieved from http://isis.poly.edu/courses/cs392-f2010/Lectures/lecture4.pdf Scher, R Scher, R. (2011). Protect Your Company. Retrieved from http://www.social-engineer.org/wiki/archives/NewsArticles/ProtectYourCompany.pdf Schneier, B Shackleford, D. (2012). SEC524: Cloud Security Fundamentals. Retrieved from http://www.sans.org/course/cloud-security-fundamentals Shinder, T Spitzner, L. (2012). Securing the Human. Retrieved from http://www.securingthehuman.org/resources/presentations SSE-CMM Project Team Stout, G. (2012). Live chat presentation 8: Phases 4 & 5. Colorado Springs, CO: CTU Online. Retrieved from CTU Online, Virtual Campus, ICS, 652-1203B-01 https://campus.ctuonline.edu/MainFrame.aspx?ContentFrame=/Default.aspx

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Upgrade- Establish endpoint security updates (Antivirus, Malware protection). Upgrade all desktop and laptop Operating Systems. Once all systems are running on the same system, it will be easier to set up security protocols across the board. Make sure Patch updates are being made regularly, set up a specified time frame to check for and install new patches and updates.…

    • 409 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Sr-Rm-022 Part 1

    • 1061 Words
    • 5 Pages

    Valacich, J.S., George, J.F., & Hoffer, J.A. (2012). (5th ed.). Retrieved from The University of Phoenix eBook Collection database.…

    • 1061 Words
    • 5 Pages
    Better Essays
  • Powerful Essays

    Keller Econ 545 Project

    • 4023 Words
    • 13 Pages

    Hubbard , R. G., & O 'Brien, A. P. (2013). HO4e_Ch13_1Click. Retrieved on 3/21/2015 from PowerPoint…

    • 4023 Words
    • 13 Pages
    Powerful Essays
  • Satisfactory Essays

    In this Multi-Layered Security Plan, I will provide information on how to better improve the security of each domain and protect the data of Richman Investments. We shall secure all ports for incoming and outgoing traffic, only allowing the information that is needed through certain ports and to conduct business fast and efficiently. We will also be using the latest and most updated firewall protection and anti-virus software to add a better degree of security. This will be implemented throughout the entire company and we will inform all employees of this MLS plan.…

    • 492 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    In the WAN domain, enforce encryption, and VPN tunneling for remote connections. Configure routers, and network firewalls to block Ping requests to reduce chance of Denial of Service attacks. Deployment of…

    • 386 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Bio121

    • 835 Words
    • 4 Pages

    |Th 8/22 |Ch.1 Nature of Science & Outline 1 |Finish reading the rest of Ch1 |HO: Group Invest.Lab: Proposal |…

    • 835 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    |Author(s): |Gabriel , H . ; Marko , J . ; Nikolaidis , P |…

    • 3227 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    Evaluate the resources you are using and explain how each is helping you complete this project.…

    • 734 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    Picking Cotton

    • 1915 Words
    • 8 Pages

    Jackiw, L. B., Arbuthnott, K. D., Pfeifer, J. E., Marcon, J. L., & Meissner, C. A.(2008).…

    • 1915 Words
    • 8 Pages
    Powerful Essays
  • Better Essays

    The historical development of private security in the United States has changed drastically over the centuries. The need for private security has grown as well. There are many gaps and areas for intrusion within the current public law enforcement system, almost mandating the necessity for private security. As the need and expectations for the private security grows, so will the qualifications for these positions. Understanding the history of the industry development creates a way to learn from the past, and make necessary changes for the future. Private security is the backbone of the American culture, and will continually evolve to prevent and protect society from any type of potential harm.…

    • 1277 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Corresponding Author: William Aspray, University of Texas at Austin, 1616 Guadalupe St., D8600, Austin TX 78701 Email: bill@ischool.utexas.edu…

    • 10332 Words
    • 42 Pages
    Better Essays
  • Best Essays

    Illinois Institute of Technology, Chicago – 1-Sep with Funding 15-Oct without Funding 3. East Carolina University – 1-Sep 4. George Washington University – 1-Sep 5. Indiana University, Bloomington – 1-Sep 6. Lamar University – 1-Sep 7.…

    • 1249 Words
    • 5 Pages
    Best Essays
  • Satisfactory Essays

    Reused: This task was originally submitted during the previous session, Term 1402B, in MGMT600-01 with Priscilla Johnson.…

    • 679 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Science meets Real Life

    • 1188 Words
    • 5 Pages

    Trefil, J., & Hazen, R. (2010). The Sciences (6th ed.). John Wiley & Sons, Inc. Retrieved October 16, 2013…

    • 1188 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Digital Divide

    • 768 Words
    • 4 Pages

    Wei, K.-K., Teo, H.-H., Chan, H. C., & Tan, B. C. (2011, March). Science and Technology. Retrieved from ProQuest: http://search.proquest.com.proxy-library.ashford.edu/science/docview/863644535/13D76D43BD670D0578A/1?accountid=32521…

    • 768 Words
    • 4 Pages
    Good Essays