Describes the ideal information system security plan

Refer to the “Case Scenario: Premiere Collegiate School” handout. Based on your discussion of this scenario in class, create an asset list in order of importance of each asset and then write an executive summary report:

  1. Identify all IT assets and enter a description of each into an asset identification and classification table, similar to the following.
  2. IT Asset DescriptionIT Infrastructure DomainPrivacy Data ImpactAssessment
    [Critical-Major-Minor]Quantitative Value ($)
  3. Indicate in which of the seven domains of a typical IT infrastructure the asset resides.
  4. Indicate if the asset accesses customer privacy data or contains customer privacy data.
  5. Classify the IT asset as Critical, Major, or Minor.
  • Critical: Generates revenues or represents intellectual property asset of organization
  • Major: Contains customer privacy data.
  • Minor: Required for normal business functions and operations.
  1. Assign a quantitative value ($) to each asset. Consider the measurable characteristics of each asset, such as the original cost and cost of replacement.
  2. Prioritize the order of the assets in the table based on their importance to the school. When prioritizing assets, consider why one asset should be protected more than another.
  3. Use the information in the table to create an executive summary that explains your list. This executive summary will be presented to the school’s board of directors.
  4. Required Resources
    Text Sheet: Case Scenario: Premiere Collegiate School (ts_premiercollegiateschool)
    Submission Requirements
  • Format: Microsoft Word
  • Font: Arial 12-point size, Double-space
  • Citation Style: Follow your school’s preferred style guide
  • Length: No more than 500 words
Order from us and get better grades. We are the service you have been looking for.