Research Proposal on "Enterprise Security Plan Proposal"
Research Proposal 4 pages (1088 words) Sources: 4
[EXCERPT] . . . .
Enterprise Security Plan ProposalThe objective of this study is to develop an enterprise security plan proposal which covers the ten domains of Information Security Common Body of Knowledge and includes the elements of widely accepted categories of information security; information security and the principles of success; planning procedures towards those goals, security policy and standards taxonomy; and policies complying with HIPAA Security Rule Standards as well as other policies relevant to information security and privacy currently defined by local, state or other regulatory bodies.
Information Security traditionally meant protect of corporate specific information such as trade secrets and other company-specific information. However, in today's business environment data protection means much more as medical service and health care providers store huge amounts of patient data making information security concerns more important than ever before.
Ten Domains of Information Security Common Body of Knowledge
The ten domains of information security common body of knowledge include the domains stated as follows:
(1) Security management practices;
(2) Access control systems and methodology
(3) Telecommunications and networking security
(4) Cryptography
(5) Security architecture and models
(6) Operations security
(7) Application and systems development security
(8) Physical security
(9) Business continuity and disaster recovery pl
download full paper ⤓
(10) Laws, investigation, and ethics. (American Health Information Management Association, 2011)
II. Confidentiality, Integrity and Availability
Forming what is known as the CIA Triad are the tenets identified as confidentiality, integrity and availability reported as the measures by which security practices are tested. Primary security issues are reported to include those stated as follows: (1) Feasibility of System: Identification of the requirement for security, policies and standards; (2) Requirements for Software Plans: Identification of Vulnerabilities, threats and risks. Planning adequate protection and completion of cost-benefit analysis. (3) Design of product: security specifications planning in design of product including access, encryption and so forth; (4) Design detail: the security controls and relationships for users linked to needs of business and legal liabilities set out; (5) Coding: Development of security-related software code and documentation"; (6) Implementation: Security measures implemented and testing of software prior to roll-out of system; (7) Product Integration: testing of security measures written in system software and refinements; (8) Operations and Maintenance: Monitoring of security software for any threats, changes and testing or changes when needed. (American Health Information Management Association, 2011, paraphrased)
III. Information Security Architecture and Models
Three types of security models exist including the following stated models: (1) Access control -- common in health field enables organizations to identify users and classification of data for access or restriction is used; (2) Integrity: this model protects confidentiality and data integrity. This means unauthorized users cannot make changes to data or modify data; (3) Information Flow -- this model classifies information and it flows in a specific manner guided by policies and rules on security. (American Health Information Management Association, 2011, paraphrased)
IV. Operation Security Domains
The following operation security domains are reported in the work of the American Health Information Management Association -- HIM Body of Knowledge: (1) controls to prevent and decrease risk of unintentional errors and unauthorized users; (2) Monitoring to identify an error;(3) System that makes provision of duties being assigned to various personnel so that no one person has total control of the security measures; (4) Tracking… READ MORE
Quoted Instructions for "Enterprise Security Plan Proposal" Assignment:
Please go by the directions verbatim.
Prepare an enterprise security plan proposal for any fake organization.
1. Your proposal should be four to six pages long excluding the title page, abstract, table of content, and references pages.
2. Use APA Style ***** follow the guidelines for APA Style in the Library or www.apastyle.org
3. Your proposal should cover the ten domains of Information Security Common Body of Knowledge and include the following:
a. Widely accepted categories of information security
b. Information security and the principles of success
c. Planning procedures toward those goals, security policy and standards taxonomy
d. Policies complying with HIPAA Security Rule Standards
e. Other policies relevant to information security and privacy currently defined by local, state or federal regulatory bodies.
How to Reference "Enterprise Security Plan Proposal" Research Proposal in a Bibliography
“Enterprise Security Plan Proposal.” A1-TermPaper.com, 2013, https://www.a1-termpaper.com/topics/essay/enterprise-security-plan-proposal/8688425. Accessed 29 Jun 2024.
Related Research Proposals:
Enterprise Technical Infrastructure Security Plan Research Paper
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Enterprise Technical Infrastructure Security Plan
for ABBA Corporation
Information Technology Security: Implementation
The wrong it security plan can cause an enterprise millions of dollars of damages if breached by a… read more
Research Paper 6 pages (2249 words) Sources: 6 Topic: Computers / IT / Internet
Enterprise Saas ERP System for Workforce Dynamics Business Proposal
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Enterprise SaaS ERP system for workforce dynamics and better capital expenditure (CAPEX) saving and improved security: A proposal
The recent advancements in Information Technology coupled with the various inefficiencies and… read more
Business Proposal 11 pages (2948 words) Sources: 2 Topic: Business / Corporations / E-commerce
Information Technology (IT) Security Implementation Research Proposal
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
it Security Plan & Implementation
IT Security Plan and Implementation for a Small Corporation
IT Security Proposal Summary
Small corporations often have to deal with many conflicting it and often… read more
Research Proposal 16 pages (5733 words) Sources: 5 Topic: Computers / IT / Internet
Security - Agip Kazakhstan North Caspian Operating Term Paper
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Security - Agip Kazakhstan North Caspian Operating Company N.V. (Agip KCO)
Agip Kazakhstan North Caspian Operating Company N.V. (Agip KCO) is the single operator of the North Caspian Sea Production… read more
Term Paper 35 pages (14948 words) Sources: 1+ Topic: Business / Corporations / E-commerce
Security Self-Assessment Coyote Systems Security Self-Assessment Organization Thesis
![Paper Icon](https://www.a1-termpaper.com/images/term-paper-3.png)
Security Self-Assessment
Coyote Systems Security Self-Assessment
Organization Description
The company Coyote Systems develops enterprise software applications for the world's leading manufacturing companies. It has development offices in Chicago, Illinois, throughout… read more
Thesis 7 pages (2030 words) Sources: 1 Topic: Management / Organizations
Sat, Jun 29, 2024
If you don't see the paper you need, we will write it for you!
We can write a new, 100% unique paper!