Academic Integrity: tutoring, explanations, and feedback — we don’t complete graded work or submit on a student’s behalf.

E15. Review the situation with Bob\' s tower unit, as told in Chapters 1 and 2,

ID: 640472 • Letter: E

Question

E15. Review the situation with Bob's tower unit, as told in Chapters 1 and 2, then create a security plan for the tower unit. The plan includes the following: [25 pts]

a) A list of security assets and major risks based on Bobs story.

b) A security policy for Bob's tower computer.

c) A list of security controls for Bob's computer based on the policy.

E16. Write a security plan for your own information security assets. The plan includes the following: [25pts]

a) A list of security assets and risk assessment. This may reuse information produced in earlier assignments, as appropriate.

b) A security policy for your assets.

c) A list of security controls to implement your policy.

Explanation / Answer

I m not aware of Chapter 1 and 2 ?? And also who Bob's Tower unit is talked about here..

E 16: The purpose of security plan is to ensure the confidentiality, integrity, and availability of data, define, develop, and document the information policies and procedures that support the institute's goals and objectives, and to allow the Institute to satisfy its legal and ethical responsibilities with regard to its IT resources. Information security policies and procedures represent the foundation for the Institute