A newly established company has approached your team of information security con
ID: 3541723 • Letter: A
Question
A newly established company has approached your team of information security consultants to develop an information security system for them. All they heard about is that an information security system must be based on the C.I.A triangle.
For your preliminary meeting with the company to discuss the off-taking of the project prepare a clearly logical data flow diagram of the SecSDLC phases to explain to the company what stages will be undertaken from start to the end of the project.
Points to consider:
? There must be an introduction of what you are going to present
o Explain why you are following the system methodology(Importance of using a system methodology)
? Relate the importance of the C.I.A triangle to the field information security
? Indicate an estimated time frame from the start to end of the project
o Provide a schedule of tasks per phase
Please note that as a newly established company, it is operating under a strictly limited budget. They expect the project to finish at least within a month; therefore you must deliver in time. They would also like to be updated on the progress of the project throughout. That means you must prepare a summary report of the milestones at every phase as an appendix to flow diagram for submission. (JUST a SUMMARY OF ACHIEVEMENTS AND DRAWBACKS PER PHASE
Explanation / Answer
Sharing 3M confidential information with friends or family. Talking about 3M confidential information in public places, such as elevators, airplanes or restaurants, where you can be overheard. Leaving 3M confidential information unattended on your desk, within 3M facilities, in public areas, etc. Copying 3M confidential information onto non-3M computers or systems, or accessing 3M confidential information through non-3M computers or systems. Disclosing 3M confidential information to anyone outside 3M who does not have a confidential disclosure agreement protecting that information, or to anyone inside 3M who does not have a need to know the information. Divulging information about a new product or service before any necessary patent applications have been filed. Receiving confidential information from an employee about his or her former employer. Using third party confidential information that has been obtained illegally or unethically.
Related Questions
drjack9650@gmail.com
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.