Create a cyber-security policy describing the principle

Assignment Help Computer Network Security
Reference no: EM13968829

Capstone Project Overview

The purpose of this Capstone Project is for students to examine and solve real world information assurance problems and apply associated techniques to create practical solutions. The course takes an integrative and senior security officer approach to address the policy, risk, and control opportunities within cyberspace and IT environments. Deliverables 1 through 5 focus on preparing students toward the final Capstone Project. Skills, experience, and knowledge gained through the completion of prerequisite courses will be used throughout each deliverable. The project contents to be addressed are as follows:

Project Deliverable: Cybersecurity Policy Catalog

Project Deliverable is a two-part deliverable using MS Word and MS Project, or their open source equivalents. This assignment focuses on information as an asset and logical security techniques for a hypothetical law firm. The goal of this deliverable is to secure an information security policy, suggesting the fundamental guidelines should an untoward event occur. It can be seen that information assets security management can be reduced down to three (3) basic principles: integrity, confidentiality, and availability. Structure a policy around and within computers and associated equipment, as well as the people using it. Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.

Submission Requirements

Infrastructure Document (MS Word)

Security Project Plan (MS Project)

Section 1

Write a three to five page paper in which you:

Create a cyber-security policy describing the principle, the objective, and policy statement for the law firm's company network.

Describe the roles and responsibilities by groups (e.g., position director of network security, the network security manager, network security engineers, IT area), defining roles and responsibilities.

Suggest the cyber-security policy statement, an explanation of the policy statement, and the reasons why the policy statement may be controversial.

Determine the security testing methodology you would use to facilitate the assessment of technical controls.

Section 2

Use Microsoft Project, or an open source alternative such as OpenProj, to create a security project plan for the law firm. The project plan should include:

Tasks, subtasks, resources, and predecessors.

An outline of the planning, analysis, design, and implementation phases.

The use of cyber-security in the information systems development life cycle.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Determine the strategy for cybersecurity and public policy development in the U.S.

Use technology and information resources to research issues in information assurance.

Write clearly and concisely about information assurance topics using proper writing mechanics and technical style conventions.

Reference no: EM13968829

Questions Cloud

What is crowdsourcing : What is crowdsourcing? Give examples of organizations that are taking advantage of crowdsourcing and be prepared to describe these efforts
Analyze the three internal governance mechanisms : Analyze the three internal governance mechanisms (ownership concentration, boards of directors, and executive compensation) and recommend a possible fourth mechanism that would help align the interests of managerial agents with those of the firm's..
How might you have avoided such a problem in the first place : What principle applies to this situation? How might you have avoided such a problem in the first place
Brief discussion about mendel''s laws and an overview of dna : Include the basic anatomy and physiology of a cell and describe how cell respiration, photosynthesis, and cell reproduction occur in a succinct manner. Include a brief discussion about Mendel's Laws and an overview of DNA structure and function.
Create a cyber-security policy describing the principle : Create a cyber-security policy describing the principle, the objective, and policy statement for the law firm's company network.
List the species involved, who benefits from relationship : List the species involved, who benefits from this relationship and describe this interaction.
Compare and contrast cisco systems physical security program : Compare and contrast Cisco Systems' physical security program with one of the researched organization's physical security program.
Production of walking-tour audiotapes : An enterprising art historian recently started a new business: the production of walking-tour audiotapes for use by those visiting major cities. She originally pro- duced tapes for eight cities:
Explain how each change will impact the human resources role : Explain how each change will impact the human resources role as a strategic employee relations partner and its practices for the next 5-10 years.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Write paper about information security and cyber security

Write paper about the following topics- information security, cyber security, and risk management with relation to cloud computing including things like risk management.

  You are a senior network engineer at a technology firm

you are a senior network engineer at a technology firm. your company has 500 employees. your ceo meets with you and

  A firewall works by blocking incoming

A firewall works by blocking incoming requests. Explain how a firewall can distinguish between two incoming requests allowing one while denying the other??

  Desktop publishing system

Consider a desktop publishing system used to produce documents for various organizations. a. Give an example of a type of publication for which confidentiality of the stored data is the most important requirement

  Explain why we should not choose primes p and q that are

1 find the primes p and q if n pq 4386607 and phin 4382136.2 explain why we should not choose primes p and q that are

  Apple inc is known for its state-of-the-art designs for

apple inc. is known for its state-of-the-art designs for products such as the iphone but most are unaware that apple

  Explain the three general sources of security threats and

explain the three general sources of security threats and five types of security losses. your response should be at

  How to protect a computer and business against their threat

Security goes hand-in-hand with developing effective Excel applications. As an Excel user, it is necessary to learn more about macro viruses and how to protect a computer and business against their threat

  Evaluate an organization''s security policies

Evaluate an organization's security policies and risk management procedures, and its ability to provide security countermeasures. Analyze the methods of managing, controlling, and mitigating security risks and vulnerabilities.

  Create resolutions/solutions for the threat or vulnerability

In the organization, there is an insider threat. The employee who is the threat has been discussing a perceived vulnerability in the system.  create resolutions/solutions for the threat or vulnerability

  Hacking occurred and the organization had the right plan

Security Computer forensics and hacking go hand in hand. Discuss in (Need 2 Reports with 2 pages each report = 4 Total Pages), two cases where hacking occurred and the organization had the right plan in place to combat the hack. Describe the proce..

  Explain what is meant by authentication

In the context of information processing, computer security and trusted systems, explain what is meant by the following terms and why we want to use them: Authentication and Two factor authentication

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd