This study source was downloaded by 100000865965430 from CourseHero.com on 07-16-2023 14:41:28 GMT -05:00https://www.coursehero.com/file/28265339/ISSC-499-Week-5-Assignmentdocx/ Running head: STRATEGIC SECURITY PLAN 1Week 5 Assignment: Strategic Security Plan against Cyber AttacksXXXXXXXXXXXXXOctober 9, 2017ISSC 499Professor Ron BoothAmerican Military UniversityThis study source was downloaded by 100000865965430 from CourseHero.com on 07-16-2023 14:41:28 GMT -05:00https://www.coursehero.com/file/28265339/ISSC-499-Week-5-Assignmentdocx/STRATEGIC SECURITY PLAN 2Strategic Security Plan against Cyber AttacksIntroduction and overviewIn every organization, there must be security policies, standards, guidelines, and proceduresas well as practices to reinforce its security programs. There are critical objectives for the information security programs. For instance, they ensure the office's data and data preparing resources, manages vulnerabilities inside the data handling framework and instruct the workers about the data security and protection duties (Tu and Yuan, 2014). The organizations executives must confirm that the organization agrees to plan to oversee data innovation security and hazard administration. The officers must keep the developing advancements to guarantee proper securitycontrol inside the company. Information security officers have the role of distinguishing proof of the security risks to the business and having the capacity to assess and prescribe proper safety measures.Information security is vital for every organization because of sensitive information such asclient data, payment data, individual documents and financial balance. If