Research Proposal on "Enterprise Security Plan Proposal"

Research Proposal 4 pages (1088 words) Sources: 4

[EXCERPT] . . . .

Enterprise Security Plan Proposal

The objective of this study is to develop an enterprise security plan proposal which covers the ten domains of Information Security Common Body of Knowledge and includes the elements of widely accepted categories of information security; information security and the principles of success; planning procedures towards those goals, security policy and standards taxonomy; and policies complying with HIPAA Security Rule Standards as well as other policies relevant to information security and privacy currently defined by local, state or other regulatory bodies.

Information Security traditionally meant protect of corporate specific information such as trade secrets and other company-specific information. However, in today's business environment data protection means much more as medical service and health care providers store huge amounts of patient data making information security concerns more important than ever before.

Ten Domains of Information Security Common Body of Knowledge

The ten domains of information security common body of knowledge include the domains stated as follows:

(1) Security management practices;

(2) Access control systems and methodology

(3) Telecommunications and networking security

(4) Cryptography

(5) Security architecture and models

(6) Operations security

(7) Application and systems development security

(8) Physical security

(9) Business continuity and disaster recovery pl
Continue scrolling to

download full paper
anning

(10) Laws, investigation, and ethics. (American Health Information Management Association, 2011)

II. Confidentiality, Integrity and Availability

Forming what is known as the CIA Triad are the tenets identified as confidentiality, integrity and availability reported as the measures by which security practices are tested. Primary security issues are reported to include those stated as follows: (1) Feasibility of System: Identification of the requirement for security, policies and standards; (2) Requirements for Software Plans: Identification of Vulnerabilities, threats and risks. Planning adequate protection and completion of cost-benefit analysis. (3) Design of product: security specifications planning in design of product including access, encryption and so forth; (4) Design detail: the security controls and relationships for users linked to needs of business and legal liabilities set out; (5) Coding: Development of security-related software code and documentation"; (6) Implementation: Security measures implemented and testing of software prior to roll-out of system; (7) Product Integration: testing of security measures written in system software and refinements; (8) Operations and Maintenance: Monitoring of security software for any threats, changes and testing or changes when needed. (American Health Information Management Association, 2011, paraphrased)

III. Information Security Architecture and Models

Three types of security models exist including the following stated models: (1) Access control -- common in health field enables organizations to identify users and classification of data for access or restriction is used; (2) Integrity: this model protects confidentiality and data integrity. This means unauthorized users cannot make changes to data or modify data; (3) Information Flow -- this model classifies information and it flows in a specific manner guided by policies and rules on security. (American Health Information Management Association, 2011, paraphrased)

IV. Operation Security Domains

The following operation security domains are reported in the work of the American Health Information Management Association -- HIM Body of Knowledge: (1) controls to prevent and decrease risk of unintentional errors and unauthorized users; (2) Monitoring to identify an error;(3) System that makes provision of duties being assigned to various personnel so that no one person has total control of the security measures; (4) Tracking… READ MORE

Quoted Instructions for "Enterprise Security Plan Proposal" Assignment:

Please go by the directions verbatim.

Prepare an enterprise security plan proposal for any fake organization.

1. Your proposal should be four to six pages long excluding the title page, abstract, table of content, and references pages.

2. Use APA Style ***** follow the guidelines for APA Style in the Library or www.apastyle.org

3. Your proposal should cover the ten domains of Information Security Common Body of Knowledge and include the following:

a. Widely accepted categories of information security

b. Information security and the principles of success

c. Planning procedures toward those goals, security policy and standards taxonomy

d. Policies complying with HIPAA Security Rule Standards

e. Other policies relevant to information security and privacy currently defined by local, state or federal regulatory bodies.

How to Reference "Enterprise Security Plan Proposal" Research Proposal in a Bibliography

Enterprise Security Plan Proposal.” A1-TermPaper.com, 2013, https://www.a1-termpaper.com/topics/essay/enterprise-security-plan-proposal/8688425. Accessed 29 Jun 2024.

Enterprise Security Plan Proposal (2013). Retrieved from https://www.a1-termpaper.com/topics/essay/enterprise-security-plan-proposal/8688425
A1-TermPaper.com. (2013). Enterprise Security Plan Proposal. [online] Available at: https://www.a1-termpaper.com/topics/essay/enterprise-security-plan-proposal/8688425 [Accessed 29 Jun, 2024].
”Enterprise Security Plan Proposal” 2013. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/enterprise-security-plan-proposal/8688425.
”Enterprise Security Plan Proposal” A1-TermPaper.com, Last modified 2024. https://www.a1-termpaper.com/topics/essay/enterprise-security-plan-proposal/8688425.
[1] ”Enterprise Security Plan Proposal”, A1-TermPaper.com, 2013. [Online]. Available: https://www.a1-termpaper.com/topics/essay/enterprise-security-plan-proposal/8688425. [Accessed: 29-Jun-2024].
1. Enterprise Security Plan Proposal [Internet]. A1-TermPaper.com. 2013 [cited 29 June 2024]. Available from: https://www.a1-termpaper.com/topics/essay/enterprise-security-plan-proposal/8688425
1. Enterprise Security Plan Proposal. A1-TermPaper.com. https://www.a1-termpaper.com/topics/essay/enterprise-security-plan-proposal/8688425. Published 2013. Accessed June 29, 2024.

Related Research Proposals:

Enterprise Technical Infrastructure Security Plan Research Paper

Paper Icon

Enterprise Technical Infrastructure Security Plan

for ABBA Corporation

Information Technology Security: Implementation

The wrong it security plan can cause an enterprise millions of dollars of damages if breached by a… read more

Research Paper 6 pages (2249 words) Sources: 6 Topic: Computers / IT / Internet


Enterprise Saas ERP System for Workforce Dynamics Business Proposal

Paper Icon

Enterprise SaaS ERP system for workforce dynamics and better capital expenditure (CAPEX) saving and improved security: A proposal

The recent advancements in Information Technology coupled with the various inefficiencies and… read more

Business Proposal 11 pages (2948 words) Sources: 2 Topic: Business / Corporations / E-commerce


Information Technology (IT) Security Implementation Research Proposal

Paper Icon

it Security Plan & Implementation

IT Security Plan and Implementation for a Small Corporation

IT Security Proposal Summary

Small corporations often have to deal with many conflicting it and often… read more

Research Proposal 16 pages (5733 words) Sources: 5 Topic: Computers / IT / Internet


Security - Agip Kazakhstan North Caspian Operating Term Paper

Paper Icon

Security - Agip Kazakhstan North Caspian Operating Company N.V. (Agip KCO)

Agip Kazakhstan North Caspian Operating Company N.V. (Agip KCO) is the single operator of the North Caspian Sea Production… read more

Term Paper 35 pages (14948 words) Sources: 1+ Topic: Business / Corporations / E-commerce


Security Self-Assessment Coyote Systems Security Self-Assessment Organization Thesis

Paper Icon

Security Self-Assessment

Coyote Systems Security Self-Assessment

Organization Description

The company Coyote Systems develops enterprise software applications for the world's leading manufacturing companies. It has development offices in Chicago, Illinois, throughout… read more

Thesis 7 pages (2030 words) Sources: 1 Topic: Management / Organizations


Sat, Jun 29, 2024

If you don't see the paper you need, we will write it for you!

Established in 1995
900,000 Orders Finished
100% Guaranteed Work
300 Words Per Page
Simple Ordering
100% Private & Secure

We can write a new, 100% unique paper!

Search Papers

Navigation

Do NOT follow this link or you will be banned from the site!