Managing Information Security - Project Paper
Write a 7 to 8 page paper (double spaced font size 12). Citation Style: MLA intext citations and reference pageDirections: Put your desired topic in google search and the original article comes out for your reading.
Read the article and make sure the paper you write contains a summary, Critical Analysis(Positives and Negatives on the subject chosen) in addition get 3 other sources that you research online based on the contents of the article chosen and incorporate the ideas from the 3 sources into the paper.
Please make sure the proper MLA citation format is used.
Topics below. Pick one.
How to Choose a Qualified Security Assessor by Dave Shackleford - November 9, 2010
Security Best Practices for IT Project Managers by Michelle Pruitt - June 21, 2013
Practical Cyber Security Training Techniques for New IT Support Employees by Keil Hubert - July 11, 2013
Building a Security Practice within a Mixed Product-R&D and Managed-Service Business by Evan Scheessele - July 27, 2007
Beyond the Preoccupation with Certification & Accreditation by Kevin Esser - May 5, 2005
Using the Center for Internet Security (CIS) Benchmarks to Support an Information Security Management System by Robert J. Mavretich - January 25, 2013
A Plan for How to Get There and What to Do When You Arrive: Practical Advice on Establishing a Security Information Management Program within Healthcare by Barbara Filkins - January 26, 2015
Security Skills Assessment and Training: The Critical Security Control that can make or break all others by Paul Hershberger - December 2, 2014
Calculating Total Cost of Ownership on Intrusion Prevention Technology by J. Michael Butler, Dave Shackleford - February 17, 2014
Building and Maintaining a "Certifiable" Workforce by Robert J. Mavretich - September 23, 2013
Scoping Security Assessments - A Project Management Approach by Ahmed Abdel-Aziz - June 7, 2011
Using the PMBoK Framework on Small Business IT Projects by Courtney Imbert - February 9, 2015
Security Visibility in the Enterprise by Jim Hendrick - September 19, 2014
Information Security Gets a Seat at the Table by Kent Nabors - April 8, 2004
Systems Engineering: Required for Cost-Effective Development of Secure Products by Dan Lyon - October 8, 2012
Critical Security Controls: From Adoption to Implementation Analyst Paper by James Tarala - September 18, 2014
Exercise - Not Just for Your Body Anymore by Jonathan Risto - February 20, 2015