Preview

Project Part 1 Task 1

Better Essays
Open Document
Open Document
1367 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Project Part 1 Task 1
Project Part 1 Task 1
Draft Risk Management Plan

Ernest Martinez Jr.
C. Flack
IS3110
October 22, 2012

Purpose The Senior Management of the Defense Logistics Information Services (DLIS) has decided to update the previous risk management plan with a developing, new risk management plan. This new risk management plan will not only minimize the amount of risk for future endeavors, but will also be in compliance with regulations such as the Federal Information Security Management Act (FISMA), Department of Defense (DOD), Department of Homeland Security (DHS), National Institute of Standards and Technology (NIST), Control Objects for Information and Technology (COBIT), and Information Assurance Certification and Accreditation Process (DAICAP).
Scope
The risk management plan is for the organization use only and its network, including remote access company owned building in United States. Outside sources from this scope and risk management plan may cause the network infrastructure to fail or will make it a high risk structure due to the fact that the outside source may not protected to interact with other outside sources allowing hackers to infiltrate your system and steal important files.
Compliances
Federal Information Security Management Act (FISMA) compliance is required for federal agencies to protect their important information. Department of Homeland Security (DHS) compliance is to be required for protection to the United States against terrorists. There are other organizations in which standards are given for risk management projects, including: National Institute of Standards and Technology (NIST), Department of Defense (DOD) Information Assurance Certification and Accreditation Process (DAICAP), and Control Objects for Information and related Technology (COBIT).
Roles and Responsibilities
Project Manager (PM): The overall coordinator of the Risk Management Program.
• Maintaining the Risk Management Plan
• Maintaining the Risk Management



References: Enterprise Project Management Office. State of North Dakota. Retrieved from: www.nd.gov/itd/files/services/pm/risk-management-plan-sample.pdf Gibson, D. (2011). Managing risk in information systems. Sudbury, Mass.: Jones & Bartlett Learning. Risk Management Plan. (2007, November 29). Northrop Grumman . Retrieved October 16, 2012, from interop.mt.gov/content/docs/IM_Risk_Management_Plan_v4_0.pdf Rouse, M. (n.d.). What is Federal Information Security Management Act (FISMA)? - Definition from WhatIs.com. Information Security information, news and tips - SearchSecurity.com. Retrieved October 15, 2012, from http://searchsecurity.techtarget.com/definition/Federal-Information-Security-Management-Act

You May Also Find These Documents Helpful

  • Powerful Essays

    7. This phase as its name implies deals with the preparing a team to be ready to handle an Incident at a moment’s notice. An incident can range from anything such as a power outage or hardware failure to the most extreme incidents such as a violation of organizational policy by disgruntled employees or being hacked by state sponsored hackers (Beijtlich).…

    • 4846 Words
    • 17 Pages
    Powerful Essays
  • Better Essays

    Mgmt404 Project Plan

    • 1494 Words
    • 6 Pages

    To secure the parameter of the facility with security cameras within four weeks and not to exceed $20,000 for the entire project cost.…

    • 1494 Words
    • 6 Pages
    Better Essays
  • Better Essays

    Swanson, M. (2006, February). Guide for Developing Security Plans for Federal Information Systems. Retrieved from http://csrc.nist.gov/publications/nistpubs/800-18-Rev1/sp800-18-Rev1-final.pdf…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Powerful Essays

    CMGT582 Wk2 IA

    • 1133 Words
    • 4 Pages

    This instruction obligates that “all information assurance (IA) and IA-enabled IT products incorporated into DOD information systems shall be configured in accordance with DOD approved security configuration guidelines”. This mandate provides that recommendations delineated in STIG checklists, will ensure DOD environments address those security requirements.…

    • 1133 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Course Project - Part 1

    • 637 Words
    • 3 Pages

    Now, initial setup for one-pound bags of premium coffee are at equilibrium. As Starbucks introduces the world to premium blends, the demand curve shifts to the right increasing the price of premium blend coffee. One will have to purchase coffee at this new equilibrium price as other coffee vendors enter the market to…

    • 637 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario.…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    Project part 6

    • 406 Words
    • 2 Pages

    The senior management has been advised by the legal department that the organization will need to become PCI DSS compliant before using online applications that accept credit cards and customer personal information. The management isn’t familiar with PCI DSS compliance; therefore, the management asked you to prepare a recommendation explaining PCI DSS compliance, how the organization can move through the compliance process, and the consequences of noncompliance.…

    • 406 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    RAR Template 07112007 3

    • 5647 Words
    • 25 Pages

    The Centers for Disease Control and Prevention (CDC) recognizes the best, most up-to-date health information is without value unless it is pertinent and accessible to the people it is meant to serve. Lockheed Martin Information Technology has been tasked to conduct a risk assessment of the <System Name and Acronym> for the purpose of certification and accreditation (C&A) of <System Name> under DHHS Information Security Program Policy. This Risk Assessment Report, in conjunction with the System Security Plan, assesses the use of resources and controls to eliminate and/or manage vulnerabilities that are exploitable by threats internal and external to CDC. The successful completion of the C&A process results in a formal Authorization to Operate of <System Name>.…

    • 5647 Words
    • 25 Pages
    Powerful Essays
  • Satisfactory Essays

    Risk Assesment and Mitigation Plan. (2006, July 28). Retrieved March 26, 2014, from Cd Lib Org: http://www.cdlib.org/services/project_planning/docs/templates/risk_assessment.doc.…

    • 341 Words
    • 2 Pages
    Satisfactory Essays
  • Better Essays

    Hillson, D & Simon, P. (2007). _Practical Project Risk Management: The ATOM Methodology_, Vienna, VA: Management Concepts, Inc.…

    • 1150 Words
    • 6 Pages
    Better Essays
  • Good Essays

    BSB51107: Diploma of Management BSB07: Business Services Training Package Assessment Task Workbook Candidate Name: Student No BSB51107: Diploma of Management: Assessment Task Workbook Table of Contents Terms and Conditions Instructions to the Candidate (trainee)…

    • 2800 Words
    • 12 Pages
    Good Essays
  • Satisfactory Essays

    508 Case 5

    • 802 Words
    • 4 Pages

    Many government agencies are in the mature section of the continuum because they tend to be more risk averse. However, there are government agencies, especially in the Department of Defense, that are very interested in being cutting edge in certain areas, and they have the funds and stakeholders to support this approach and its associated costs and risks. Many of DoD’s most risky IT-related undertakings are classified.…

    • 802 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    ANNEX J – Information Assurance (All Users) J-1 BN COMSEC Procedures 1. References. a. USASOC Pam 25-1, Information Mission Area Procurement. b. USASOC Pam 25-2, Personal Use of Government-Owned IMA Resources Guide. c.…

    • 2469 Words
    • 13 Pages
    Powerful Essays
  • Good Essays

    FOD Prevention Program

    • 1053 Words
    • 5 Pages

    Each unit operating aircraft, engines, or SE or directly supporting flight operations, shall designate a FOD Prevention Program Manager, and form a command FOD Prevention/Investigation Team. The FOD Prevention Program Manager, Safety Department, and QA Division shall be included members of the FOD Prevention/Investigation Team. The team is responsible to the CO to carry out the FOD Prevention Program on a day-to-day basis. COs of FRCs shall establish a FOD Prevention Program, FOD Prevention Committee, and appoint a FOD Committee Chairperson. The FOD Prevention Committee shall have sufficient authority and organizational freedom to identify and implement FOD prevention measures whenever and wherever required. The FOD prevention committee is to develop and implement plans and programs to prevent hardware damage during storage, transporting, flight line, and launch operations. The committee will be responsible for providing information to update the status of the local FOD Prevention Program and will ensure prevention efforts are in consonance with local policy, direction, and procedures. A successful program requires command support, personnel knowledge and awareness, and integration into the total maintenance effort.…

    • 1053 Words
    • 5 Pages
    Good Essays
  • Powerful Essays

    Security Clearance Info

    • 8089 Words
    • 33 Pages

    The Defense Industrial Security Clearance Office (DISCO) is part of the Defense Security Service (DSS), an…

    • 8089 Words
    • 33 Pages
    Powerful Essays