{"id":138361,"date":"2023-11-24T04:46:03","date_gmt":"2023-11-24T04:46:03","guid":{"rendered":"https:\/\/nursingstudybay.com\/?p=138361"},"modified":"2023-11-24T04:46:23","modified_gmt":"2023-11-24T04:46:23","slug":"information-security-capability-maturity-iscmm-levels","status":"publish","type":"post","link":"https:\/\/www.colapapers.com\/assessments\/information-security-capability-maturity-iscmm-levels\/","title":{"rendered":"Information Security capability maturity (ISCMM) levels"},"content":{"rendered":"<p>\u2003<\/p>\n<p>Description and Instructions<br \/>\nProject Description:<br \/>\nThis project ( help with nursing paper writing from experts with MSN &#038; DNP degrees) is an opportunity for you to practice your knowledge and skills by assessing the actual information security practice in Saudi companies\/organizations based on the information security capability maturity model (ISCMM).<br \/>\n\u2022\tTotal Marks = 14<br \/>\nProject Report\tPresentation<br \/>\n10 marks\t4 marks<\/p>\n<p>\u2022\tGroup Size = 2- 3 members.<br \/>\n\u2022\tEach student must visit a chosen company\/organization to interview a cybersecurity representative (i.e., each group should have two or three filled checklists based on the number of team members).<br \/>\n\u2022\tYou should answer the questions in this research activity as a group.<br \/>\n\u2022\tOne group member (group leader) should submit all files: Project Report and Presentation Slides on Blackboard. Marks will be given based on your submission and the quality of the content.<br \/>\nProject Report<br \/>\n\u2022\tEach Project Report will be evaluated according to the marking criteria in each question section.<br \/>\nPresentation<br \/>\nGrading Criteria:<br \/>\nComplete content (Introduction, body, and conclusion)\t 2 mark<br \/>\nEffective use of time (max. 8-10 minutes)\t 1 mark<br \/>\nVoice project ( help with nursing paper writing from experts with MSN &#038; DNP degrees)ion and loudness\/ Eye contact\/ Confidence and attitude\t 1 mark<br \/>\n \u2003<br \/>\nInformation Security capability maturity (ISCMM) levels<br \/>\nFor this project ( help with nursing paper writing from experts with MSN &#038; DNP degrees), you will use the following levels of the information security capability maturity model (ISCMM) as guiding principles for your journey to assess the maturity of the chosen company\/organization regarding information security.  <\/p>\n<p>Question One<br \/>\nUse the following checklist to fill out during the meeting with the chosen company\/organization cybersecurity representative. Provide the filled checklists for each team member.<br \/>\nISCMM Levels\tIndicators\tTick the applicable indicators<\/p>\n<p>Enhanced<br \/>\n\t1.\tYou actively explore opportunities to enhance information security as part of your continuous improvement program for security<br \/>\n\t2.\tInformation security measures are responsive, adaptable, efficient, robust, and benefit from strategic intent.\t<\/p>\n<p>Managed\t1.\tYou have mechanisms to assess and manage requirements for protecting, sharing, and assuring information. These mechanisms are well understood and updated as required.<br \/>\n\t2.\tYou have proportionate measures in place to prevent, detect, and respond to unauthorized or inappropriate access to information and ICT systems, including during systems development and throughout the information lifecycle.<br \/>\n\t3.\tYou clearly understand where and how information and data assets are shared with service providers.<br \/>\n\t4.\tYou appropriately archive or otherwise dispose of information holdings when they are no longer required.<br \/>\n\t5.\tMobile devices and remote working solutions are managed securely.<br \/>\n\t6.\tInformation or other assets you hold are consistently classified, marked, accessed, and handled in line with the Saudi Government Security Classification System.<br \/>\n\t7.\tYour systems ensure access controls are updated when your people change roles or leave your organization.<br \/>\n\t8.\tYou ensure changes made to information management measures are consistent with your security risk profile and wider protective security policies. Changes are promptly communicated<br \/>\n\t9.\tYou periodically conduct both scheduled and unannounced tests and audits of information security.<br \/>\n\t10.\tWhen appropriate, your access controls enforce segregation of duties to reduce opportunities for unauthorized or unintentional access to or misuse of information assets.<\/p>\n<p>Basic\t1.\tPeople most directly responsible for protective security understand the information security lifecycle.<br \/>\n\t2.\tYou have a certification and accreditation program in place for new and existing ICT systems; however, it is inconsistently followed.<br \/>\n\t3.\tYou have simple information security measures in place for areas holding physical records, ICT equipment, and basic ICT system access controls.<br \/>\n\t4.\tYou have pockets of good information security awareness and practice, but standards aren\u2019t applied consistently across your information holdings, and your overall compliance is poorly understood. This may be particularly true when external suppliers hold or manage your information.<br \/>\n\t5.\tYou have some security mechanisms in place for ICT systems development.<br \/>\n\t6.\tYou have a limited understanding of where and how information or data assets are shared with service providers.<br \/>\n\t7.\tYou understand emerging cyber intrusions and threats and have put in place simple information security measures to mitigate targeted cyber intrusions. \t<\/p>\n<p>Informal\t1.\tYou have limited understanding of your information assets and don\u2019t proactively assess the information assets you most need to protect<br \/>\n\t2.\tYou have limited information security measures in place to protect your information assets and ICT system development<br \/>\n\t3.\tYou do not have a certification and accreditation program in place for new or existing ICT systems.<br \/>\n\t4.\tYou can\u2019t be confident you would detect unauthorized access to, or the compromise of, electronic or physical information holdings<br \/>\n\t5.\tYou don\u2019t usually assess whether information or other assets require a national security classification. You also can\u2019t be confident that classified resources are managed correctly<br \/>\n\t6.\tYou can\u2019t be confident you implement measures for information assets that are proportional to their value, importance, and sensitivity<br \/>\n\t7.\tYou have limited information security measures in place for targeted cyber intrusions and have a reactive approach to emerging cyber intrusions and threats<br \/>\n\t8.\tYou do not understand where and how your information or data assets are shared with service providers.                                                                                                                                        \t<\/p>\n<p>Question Two<br \/>\nSummarize the key findings of your participating companies\/organizations in light of ISCMM levels.  (Maximum 250 words).<\/p>\n<p>Question Three<br \/>\nFrom your point of view, what are the main recommendations for participating companies\/organizations to upgrade their level in ISCMM.  <\/p>\n","protected":false},"excerpt":{"rendered":"<p>\u2003 Description and Instructions Project Description: This project ( help with nursing paper writing from experts with MSN &#038; DNP degrees) is an opportunity for you to practice your knowledge and skills by assessing the actual information security practice in Saudi companies\/organizations based on the information security capability maturity model (ISCMM). \u2022 Total Marks = [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[9023,9944],"tags":[],"class_list":["post-138361","post","type-post","status-publish","format-standard","hentry","category-homework-help","category-operations-and-supply-chain-management"],"_links":{"self":[{"href":"https:\/\/www.colapapers.com\/assessments\/wp-json\/wp\/v2\/posts\/138361","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.colapapers.com\/assessments\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.colapapers.com\/assessments\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.colapapers.com\/assessments\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/www.colapapers.com\/assessments\/wp-json\/wp\/v2\/comments?post=138361"}],"version-history":[{"count":1,"href":"https:\/\/www.colapapers.com\/assessments\/wp-json\/wp\/v2\/posts\/138361\/revisions"}],"predecessor-version":[{"id":138364,"href":"https:\/\/www.colapapers.com\/assessments\/wp-json\/wp\/v2\/posts\/138361\/revisions\/138364"}],"wp:attachment":[{"href":"https:\/\/www.colapapers.com\/assessments\/wp-json\/wp\/v2\/media?parent=138361"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.colapapers.com\/assessments\/wp-json\/wp\/v2\/categories?post=138361"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.colapapers.com\/assessments\/wp-json\/wp\/v2\/tags?post=138361"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}