Haag Engineering has an enterprise security policy located on the intranet but h
ID: 3849201 • Letter: H
Question
Haag Engineering has an enterprise security policy located on the intranet but has more detailed information when accessing this policy on our server for internal Haag employee files. The enterprise security policy of an organization describes several responsibilities in regards to information security management. It’s important for an organization to determine their assets, threats and then come up with a list of safety measures you can employ. There are several potential threats and IT practices that are listed in Haag’s security policy and I will list a few, roles assigned to IT security and an emphasis on the need for IT Security and a good security policy. The policy also talks about the general use and ownership of private information stored on electronic and computing devices whether owned or leased by Haag Engineering. Carry out a cybersecurity assesment of a forensics consulating engineering company. You may use any NIST Special Publications (e.g. SP800-171, SP1800), or any other national framework to assist in your report.
Include a brief description of the organization, nature of the business, analysis of the results, and recommendations for improvement in the form of a information technology action plan. Do not use old Chegg examples or copy/paste word from word from internet unless using proper citations.
Explanation / Answer
Brief Description of an organization: I here by inform you that there is an organzation named ABC (Not disclosed the name) has acquired a experince of 4 years in the filed of consulting the peoples over the telephone and face to face.
Nature of Business:
The principle areas of interest of the ABC company are as follows:
1) consulting related to tour & travel.
2) consulting related to Gazets and Gizmos.
3) consulting related to Health & Wealth
4) consulting related to Automobiles
5) consulting related to Legal Awareness
6) consulting related to Psychology
Analysis of the results:
Recommendations for improvement in the form of a information technology action plan
A organization should develop its IT action plan based on a four-part format:
1) Vision
2) Assessment/Audit
3) Gap Analysis
4) Plan/Feasibility Studies
Related Questions
Navigate
Integrity-first tutoring: explanations and feedback only — we do not complete graded work. Learn more.