Create a comprehensive security policy for the company

Assignment Help Management Information Sys
Reference no: EM132240330

Assignment

This assignment consists of two (2) sections: an infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment for which it is written. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

The last section of the project plan will present the infrastructure in accordance with the parameters set forth at the outset of the project. The network solution that is chosen should support the conceived information system and allow for scalability.

The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. In addition, access paths for Internet access should be depicted. A narrative should be included to explain all the nodes of the network and the rationale for the design.

Lastly, using the Confidentiality, Integrity and Availability (CIA) Triangle, define the organizational security policy. CIA is a widely used benchmark for evaluation of information systems security.

Section 1: Infrastructure Document

1. Write a five to ten (5-10) page infrastructure document in which you:

a. Design a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.

b. Illustrate the possible placement of servers including access paths to the Internet and firewalls. Note: Facility limitations, workstations, printers, routers, switches, bridges and access points should be considered in the illustration.

c. Explain the rationale for the logical and physical topographical layout of the planned network.

d. Create a comprehensive security policy for the company that will:

i. Protect the company infrastructure and assets by applying the principals of CIA. Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three core goals of confidentiality, integrity and availability of information.

ii. Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.

Your assignment must follow these formatting requirements:

This course requires use of Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Include charts or diagrams created in MS Visio or Dia as an appendix of the infrastructure document. All references to these diagrams must be included in the body of the infrastructure document.

Section 2: Revised Gantt Chart / Project Plan

Use Microsoft Project or an open source alternative, such as Open Project, to:

2. Update the Gantt chart or project plan (summary and detail) template, from Project Deliverable 3: Database and Programming Design, with all the project tasks.

The specific course learning outcomes associated with this assignment are:

Demonstrate an understanding of existing and emerging information technologies and strategic impact on organizational operations.

Evaluate the issues and challenges associated with information technology integration.

Evaluate the ethical concerns that information technology solve or present in a global context.

Use technology and information resources to research issues in information technology.

Write clearly and concisely about strategic issues and practices in the information technology domain using proper writing mechanics and technical style conventions.

Reference no: EM132240330

Questions Cloud

Examine two advantages of hardware vpns : Examine and explain the two advantages and two disadvantages for three types of protocols used in VPNs.
Write the value of the expression and the type : What is your average time per mile? What is your average speed in miles per hour?
Identify the main functions of your proposed information : Identify the main functions of your proposed information system and why they are important to the business.
Discuss the importance of user technology security education : Discuss the importance of user technology security education within organizations.
Create a comprehensive security policy for the company : Illustrate the possible placement of servers including access paths to the Internet and firewalls.
Research the different mss processes currently used : The CEO of the company would like to incorporate a management support system (MSS) into the organization to help in making business decisions.
Write a critical evaluation of the article : ISOL536-Write a critical evaluation of the article; make sure to include three to five key points that you thought were important.
What are your strenghts and weakness : AS an individual, what are your strenghts and weakness and how will they impact you as a PHD students?
Debate about the ending of capital punishment : Analyst staff at the Texas Department of Criminal Justice reporting to senior management about aspects of their operations.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Define ongoing system maintenance roles and responsibilities

Define ongoing system maintenance roles and responsibilities. Describe procedures for evaluating and prioritizing system enhancements proposed by stakeholders.

  Versions of the jwdconsulting case study

After reading chapter three (THE PROJECT MANAGEMENT PROCESS GROUPS: A CASE STUDY), discuss the main differences between the two versions of the JWDConsulting case study

  What is involved in project scope management

Why do you need a good WBS to use project management software? What other types of software can you use to assist in project scope management?

  Are the dissatisfaction patterns random

Perform a median run test and an up/down run test, using 95.5 percent confidence intervals. -  Are the dissatisfaction patterns random?

  What are the advantages of using erp

Share an insight from having read your colleagues' postings, synthesizing the information to provide new perspectives.

  Find atleast ten pieces of spam mail from any account

Find atleast ten pieces of spam mail from any account, whether it be home,school, or something else.

  How you would use the tool in the investigation

Suppose a large aerospace engineering firm has immediately hired you as a consultant to investigate a potential violation of corporate policy and data theft. How you would use the tool in the investigation. How the tool helps the investigation and ..

  Importance of information management for the company

You investigated data analytics and the utilization of data analytics in business. In this assignment, use the company or industry that you selected, Ascertain the importance of information management for the company or industry that you have chose..

  Is this a discrete or a continuous probability distribution

Convert the information on the number of hours parked to a probability distribution. Is this a discrete or a continuous probability distribution?

  Why linux is installed on only a very small fraction

Describe some reasons why Linux is installed on only a very small fraction of desktop computers.

  Define operational excellence

Define operational excellence. How can information systems help achieve it

  Knowledge management amp dynamic managementthe learning

knowledge management amp dynamic managementthe learning organizations uses advance technologies and knowledge

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd