Create a comprehensive security policy for the company

Assignment Help Basic Computer Science
Reference no: EM13531444

An infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment for which it is written. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

The last section of the project plan will present the infrastructure in accordance with the parameters set forth at the outset of the project. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. In addition, access paths for Internet access should be depicted. A narrative should be included to explain all the nodes of the network and the rationale for the design. Lastly, using the Confidentiality, Integrity and Availability (CIA) Triangle, define the organizational security policy. CIA is a widely used benchmark for evaluation of information systems security.

Infrastructure Document

1. Write a five to ten (5-10) page infrastructure document in which you:

a. Design a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.

b. Illustrate the possible placement of servers including access paths to the Internet and firewalls. Note: Facility limitations, workstations, printers, routers, switches, bridges and access points should be considered in the illustration.

c. Explain the rationale for the logical and physical topographical layout of the planned network.

d. Create a comprehensive security policy for the company that will:

i. Protect the company infrastructure and assets by applying the principals of CIA. Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three core goals of confidentiality, integrity and availability of information.

ii. Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.

Revised Gantt Chart / Project Plan

Use Microsoft Project or an open source alternative, such as Open Project, to:

2. Update the Gantt chart or project plan (summary and detail) template, from Project Deliverable 3: Database and Programming Design, with all the project tasks.

The specific course learning outcomes associated with this assignment are:

Demonstrate an understanding of existing and emerging information technologies and strategic impact on organizational operations.

Evaluate the issues and challenges associated with information technology integration.

Evaluate the ethical concerns that information technology solve or present in a global context.

Use technology and information resources to research issues in information technology.

Write clearly and concisely about strategic issues and practices in the information technology domain using proper writing mechanics and technical style conventions.

Reference no: EM13531444

Questions Cloud

Explain extracted methylene chloride : How many Mg of catfish would be obtained if the same aqueous solution is extracted once with 60 ml of methylene chloride. Come pare the two results . In both experiments we use the same amount of organic solvent. However do we isolate the same amo..
How far will the ball have rolled from its starting point : When rolling a ball down an inclined plane, the ball rolls 1 cubit in ten seconds. How far will the ball have rolled from its starting point after 20 seconds
Genetics code is atriplet code-redundant code : What is meant by the following statements: The genetics code is atriplet code, redundant code, unambiguous code, and universalcode?
Calculate at what point does the other person lift : Two people are carrying a uniform wooden board that is 3.00 m long and weights 160 N. at what point does the other person lift
Create a comprehensive security policy for the company : Demonstrate an understanding of existing and emerging information technologies and strategic impact on organizational operations and evaluate the issues and challenges associated with information technology integration.
Testes could not producetestosterone : Developmentally speaking, what would you predictwould happen to a male human fetus whose testes could not producetestosterone?
Evaluate the partition coefficient of benzoic acid : When 200 ml of an aqueous benzoic acid solution were extracted with 30 ml of ethyl acetate, 45% of the benzoic acid were extracted. Calculate the partition coefficient of benzoic acid
Find what was the tires angular acceleration : Your car tire is rotating at 3.3 rev/s when suddenly you press down hard on the accelerator. What was the tire's angular acceleration
General property of minerals-significantamount of calcium : Which of the following is a general property of the minerals? Which of the following is not a known side effect of having insufficient fat stores? Which of the following sweeteners contains a significantamount of calcium? What two major nutrients are..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Memory allocation errors

The application should display all daily. Use a user-defined function as handler of memory allocation errors. The user-defined function should be registered as a default handler of new failures temperatures as well as average weekly temperatures in a..

  List three debugging methods within the debugger which can

list three debugging techniques within the debugger that can be used to locate logical error in the java code. for each

  Calculate the average for each student and for each exam

The original program is supposed to ask the user to enter 3 grades for 5 students, and then calculate the average for each student and for each exam.

  Common information security threats

Common Information Security Threats

  The current environment

The current environment doesn't have wireless interface, and the management would like to procure a cutting edge wireless technology infrastructure for the organisation.

  How to perform testing for each development method

Research, write, and give 4-6 page proposal of alternative methods Smith Consulting might consider for finishing Frequent Shopper Program. Describe how Smith would perform testing for each development method.

  Write a program that reads three integers and print

Write a program that reads three integers and print "In order" if they are sorted in ascending order or descending order, or "not in order" otherwise. For example: 1 2 5 in order 1 5 2 not in order 5 2 1 in order 1 2 2 in order 5 1 2 not in order.

  Atmega128 is being used to monitor humidity inside test cham

Atmega128 is being used to monitor humidity inside test chamber 03. The device uses two sensors to have some fault tolerance. They are connected to ADC channels 0 and 1. The program uses the average and maximum error of the two values.

  Write a method firstlast that could be added

Write a method firstLast that could be added to the LinkedIntList class that moves the first element of the list to the back end of the list. Suppose a LinkedIntList variable named list stores the following elements from front (left) to back (right)

  Determine the optimal plan

DSS Inc. is an electronics company with production facilities located in Atlanta, Boston, and Chicago. Components produced at these facilities may be shipped to the firm's regional warehouses that are located in Edison and Fargo.

  Recognize ten different areas where software helps

In spreadsheet, recognize at least 10 different areas where software could help you, like collecting rent, performing tenant background checks, and scheduling building maintenance.

  Show even-parity encoding of bit string in form of bytes

Show the even-parity encoding of the following bit string, in the form of bytes: 0100101011101011101010110110 (break it up into pieces of data large enough to encode as several parity-encoded bytes.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd