BSA/525: Information Assets Protection

You may purchase tutorials by the Week below.

BSA/525 WEEK 1
BSA/525 WEEK 1 QUIZ
BSA/525 WEEK 1 QUIZ

BSA/525 Week 1

 

BSA 525 Wk 1: Practice: Evaluating Policies & Standards Quiz

Includes Quiz Questions & Answers - A+ Work!

 

BSA/515 Week 1 Assignment - EDMS Policies and Standards

The Hollywood Organic Co-op is in the process of implementing an electronic document management system (EDMS). There are five stores in the co-op, all within a 15 mile radius of LAX airport.

    • The co-op currently has separate document management tools in each location and is not consistently retaining and securely managing critical business documents.
    • A new EDMS must be developed or purchased which will allow all stores to create, store, and retrieve all official documents securely and efficiently. Documents refer to electronic documentation for all e-mail, text, orders and invoices, web pages, and marketing communication.
    • Some of the co-op members are celebrities, and considering recent hacking of major retail computer systems, there is concern that documentation security may need to be improved prior to final implementation of the EDMS.

As Hollywood Organic Co-op's IT manager, the CIO and CEO have tasked you with setting the stage for gathering the requirements for an EDMS that integrates all five stores to consistently retain and securely manage critical business documents.

Examine best practices, applicable standards, and types of policies that govern a document management life cycle for implementing an enterprise EDMS.

Prepare a 14- to 16-slide media-rich or voice-over presentation with detailed speaker notes of recommendations to Hollywood Organic Co-op for an EDMS. Include the following:

    • Major components that must be included in a document retention policy
    • Policies,standards, and procedures that will govern the secure management of the organization’s critical business documents
    • Regulatory requirements and generally accepted practices that are applicable to the organization to safeguard its data
    • A list of Hollywood Organic Co-op's stakeholders and their responsibilities
    • A recommended framework for a document life cycle
    • At least two examples of an enterprise tool available on the market that could be incorporated into the organization to integrate the EDMS across the various store locations

Format citations according to APA guidelines.

Submit your assignment.

 

 

Discussion Question - Security Policies

Includes 24 Discussion Question Responses! A+ Work!

A company’s security policies outline the behavior for users and administrators to ensure the security of information assets. These policies reveal much about the organization.
Select one company in one of the following industries to research:

  • Financial Institution
  • Health Organization
  • University
  • Car repair shop

Note: You will refer to different aspects of the company you research in another discussion in Week 3 of the course.
 Locate and review the company’s security policies. Discuss the following:

  • How difficult were the policies to locate? Why might that be?
  • What are the critical components of the policies? How do they reflect the company and its respective industry?

Consider other students’ responses about the companies and industries they researched. Discuss the following in your replies:

  • How do the policies for the company you chose compare to other companies in the same industry? Why might that be?
  • How do the policies for different industries vary? Why might that be?

Post your answers to the discussion forum. 

 

 

 

 

 

BSA/525 WEEK 2
BSA/525 WEEK 2 QUIZ
BSA/525 WEEK 2 QUIZ
BSA/525 WEEK 2 QUIZ

BSA/525 Week 2

BSA/525 Week 2 Practice: Securing Logical Systems Quiz

Includes Quiz Questions & Answers - A+ Work!

 

BSA/525 Week 2 Assignment - Part 1: BRD

The CEO and CIO have accepted your recommendations for implementing an EDMS for the Hollywood Organic Co-op’s five sites. They have requested that you develop a business requirements document (BRD) that details the requirements and design for an enterprise EDMS.

 

Begin working on the information that must be included in the final business requirements document due in Week 6.

 

Write a 2- to 3-page requirements document draft that addresses creating a new EDMS to be used by your company to store and track all e-documents.

o Identify the types of e-documents and other content that can be created (e.g., letters, spreadsheets, reports, or paper images).

o For each type of e-document, provide an example e-document that may exist in the Hollywood Organic Co-op organization.

o Define the key personnel within the Hollywood Organic Co-op organization who require access to the EDMS.

o Describe appropriate logical access controls for the EDMS based on the roles within the organization who require access to each type of e-document.

 

Note: You may format this assignment in a bulleted list, document table, or other method of your choice in a Microsoft® Word document. A narrative or formal paper is not required.

Submit your assignment.

 

 

Discussion Question - Logical Security Breach

Includes Discussion Question Response! A+ Work!

Discuss a security breach that occurred in an organization within the past three years and that could have been prevented with better, logical security. 
Answer the following questions:

  • Who were the major players in the security breach and what was the breach? 
  • What logical security components were in place and which were missing?
  • How did the missing features allow the breach and how would you protect it from happening again in the future?
  • How did the breach affect data confidentiality, integrity, and availability (CIA)?

Post your answers to the discussion forum. 
Respond to at least three of your peers.

 

 

 

 

BSA/525 WEEK 3
BSA/525 WEEK 3 QUIZ
BSA/525 WEEK 3 QUIZ
BSA/525 WEEK 3 QUIZ

BSA/525 Week 3

 

BSA 525 Wk 3: Classifying and Protecting Data Quiz

 

Includes Quiz Questions & Answers - A+ Work!

 

BSA/525 Week 3 - Part 2: Business Requirements Document

Your next task in building the business requirements document for Hollywood Organic Co-op is to examine how the data elements fit into the overall document life cycle. You must provide an update to the CEO and CIO on the metadata and document storage requirements and recommended document life cycle.
Create a 16- to 20-slide media-rich or voice-over presentation about how the EDMS will classify and protect data. Include the following:
o The metadata (descriptive information) that must be provided for each type of document
o The location where the documents are stored at each stage of a document's life cycle
o Recommendation and description of the cybersecurity framework for the new EDMS
o Justification for how the recommended cybersecurity framework best supports the document life cycle
o Tools that will be used to monitor protection at each of the data classification levels
Format your citations according to APA guidelines.
Submit your assignment.

 

 

Discussion Question - Data Classification Schemes

Includes Discussion Question Response! A+ Work!

Refer to the company you researched in the "Wk 1 Discussion - Security Policies" and review the data classification schemes in use within that company’s industry.
 Discuss the following:

  • How difficult was the classification scheme to locate? Why might that be?
  • What are the classification levels in place? How do they vary depending on the different industries?
  • Are the types of data classified the same in each industry? Should they be the same in each type of organization?

 Post your answers to the discussion forum. 
Respond to at least three of your peers.

 

 

 

BSA/525 WEEK 4
BSA/525 WEEK 4 QUIZ
BSA/525 WEEK 4 QUIZ
BSA/525 WEEK 4 QUIZ

BSA/525 Week 4

 

 

BSA 525 Wk 4: Implementing Physical& Environmental Controls Quiz

Includes Quiz Questions & Answers - A+ Work!


 

BSA/525 Week 4 - Part 3: Business Requirements Document

EDMS are able to maintain records of importance and sensitivity at a variety of different levels, so that organizations will be seen as having the appropriate access restrictions at all Document Lifecycle Stages (DLC). The transfer of documents needs to be secure, and the organization monitored to prevent any property damage.
Control Access control can be defined as an authentication function that will determine how the users can log into the device and what resources are available for them. Finally, established rules must be defined, and the tracking system may vary depending on the life cycle process and the classification level of the document. Also, a description of the metadata classification or a definition of the promotional text must be provided.
Hollywood Co-Op will be using the following access management guidelines:

  • Need to know - Users can only have access to the details they need to do their job.
  • Minimal privilege - A user can login only if the access has been configured.
  • Duty separation-Conflicting areas that need to be segregated in order to stop the abuse of corporate properties.

 

Discussion Question - Physical Access Controls

Includes Discussion Question Response! A+ Work!

Discussion Topic: Physical Access Controls

Analyze audit procedures for determining compliance with physical access policies for your organization or an organization with which you are familiar.
Discuss how you can internally audit procedures for determining compliance with physical access policies. Why is it important to maintain compliance with physical access policies? Share how you, as an IT manager, would expect to respond if an external auditor found evidence that your organization is out of compliance with its own physical access policies?
Post your answers to the discussion forum. 

 

 

BSA/525 WEEK 5
BSA/525 WEEK 5 QUIZ
BSA/525 WEEK 5 QUIZ
BSA/525 WEEK 5 QUIZ

BSA/525 Week 5

BSA 525 Wk 5: Handling Information Assets Quiz

Includes Questions and Answers

 

Signature Assignment: Part 4: BRD

This week, you will continue building the components of your business requirements document for Hollywood Organic Co-op. Last week you outlined how to electronically move data around in an EDMS. This week, you will further analyze Hollywood Organic Co-op's workflow process as the e-documents move through the life cycle, with a focus on the disposition of the documents.

Create a 2- to 4-page list in which you:

    • Define the policies to apply to documents so that document-related controls are audited, documents are retained or disposed of properly, and content important to the organization is protected.
    • Describe how documents are converted as they transition from one stage to another during their life cycles.
    • Explain how e-documents are treated as corporate records that must be retained according to legal requirements and corporate guidelines.
    • Recommend tools that are required to support disposing of information assets.

Note: You may format this assignment in a bulleted list, document table, or other method of your choice in a Microsoft® Word document. A narrative or formal paper is not required.

Submit your assignment.

 

 


Discussion Question - Technologies that can help Secure e-Documents

Includes Discussion Question Responses! A+ Work!

Discuss why information is an asset to a company. Explain why an effective information governance strategy is essential in safeguarding information assets.

What is the importance of digital signatures in today’s corporate environment?
Post your answers to the discussion forum. 
Respond to at least three of your peers.

 

 

 

BSA/525 WEEK 6
BSA/525 WEEK 6
BSA/525 WEEK 6
BSA/525 WEEK 6

BSA/525 Week 6

Signature Assignment: EDMS Business Requirements

You are ready to prepare the final version of the EDMS business requirements document (BRD) incorporating the assignments you completed and faculty feedback provided for Weeks 1–5. You will present your BRD to the Board of Directors for Hollywood Organic Co-op.

Write at least 4 to 6 pages for the finalbusiness requirements document for the new EDMS and prepare an 8- to 10-slide media-rich presentation summary of the BRD to the Hollywood Organic Co-op’s Board of Directors.

Analyze the critical components of your information security program as it relates to Hollywood Organic Co-op. Justify how the security objectives for the EDMS align with the business objectives.

Identify and describe document access controls and best practices, including:

    • Viewing
    • Editing
    • Copy/paste (including screen capture)
    • Printing
    • Forwarding e-­mail containing secured e­-documents

Identify, define, and describe document access policies and best practices including:

    • Text documents
    • Spreadsheets
    • Financial statements
    • E-mail messages
    • Policy and procedure manuals
    • Research
    • Customer and project data
    • Personnel files
    • Medical records
    • Intranet pages
    • Other sensitive information

Identify, define, and describe all stages of the document life cycle and best practices including:

    • Creation
    • Storage
    • Categorizing
    • Metadata tagging
    • Delivery or sharing
    • Repurposing
    • Review and reporting archiving and/or destruction

Format citations according to APA guidelines.

Submit your business requirements document and presentation.

 


Discussion Question - Mobile Usage and the EDMS

Includes Discussion Question Responses! A+ Work!

A critical component for any business today is the mobility of its employees. Many companies have employees who conduct business remotely and require remote access to systems and information to compete in today’s business environment.
Discuss how to make sure systems align with the business objective to be competitive in a digital, mobile environment. Consider the following questions:

  • Is the same person responsible for mobile or cloud computing also responsible for physical and logical security in your organization? Should the same person be responsible? Why or why not?
  • What specific tools or hardware are used for mobile or cloud computing? How effective are the tools or hardware?
  • What recommendations would you suggest to correct any security gaps or strengthen security for mobile or cloud computing? Explain your recommendations.

 Note: If your organization does not have these policies in place, consider the questions for an organization you are familiar with instead.
Post your answers to the discussion forum.
Respond to at least three of your peers.