Describe the security issues found on a network

Assignment Help Management Information Sys
Reference no: EM132080915

Project Deliverable : Infrastructure and Security

Project Deliverable is a two-part deliverable using MS Word and MS Visio, or their open source equivalents. You are the Chief Security Officer (CSO) of a law office that occupies four (4) floors of a high-rise building in downtown Washington, D.C.

There are approximately 50 PCs on the first floor, 150 PCs on the second floor, and 40 PCs on both the third and fourth floors. The servers for each department reside on their respective floors.

The director of the accounting department has expressed concerns about the security of his files. For this assignment, you will explain the key functions of a cyber-security policy catalog.

Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.

Submission Requirements

Document (MS Word)

Microsoft Visio Plan (MS Visio)

Section 1

Write a three to four (3-4) page deliverable in which you:

Explain the major cyber governance issues in an organization and, because of those issues, examine how organizations develop communication protocols.

Describe the security issues found on a network, and arrange them from highest to lowest, mapping out security loopholes to justify your answer.

Differentiate between intellectual property theft and cyber espionage. Determine how you, as the CSO of an organization, would deal with both cases and what standard operating procedures you would follow.

Section 2

4. Using Microsoft Visio, or an open source alternative such as Dia, illustrate the flow of data for both input and output information in an infrastructure. The diagram must map any issues in terms of a cyber-infrastructure.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Discuss the threats of modern technology in the workplace.

Discuss how policies play an important role in techniques adopted for cybersecurity.

Discuss the various issues related to cyber governance, cyber users, cyber management, and cyber infrastructure.

Use technology and information resources to research issues in information assurance.

Write clearly and concisely about information assurance topics using proper writing mechanics and technical style conventions.

Reference no: EM132080915

Questions Cloud

What is nature and significance of the transportation impact : What is the nature and significance of the transportation impact? “Improved transportation systems can also have social and political significance.”
How are the risks of natural events mitigated : Why has business continuity been recognized as a fundamental component of management's role in achieving good corporate governance?
Compounds every months : If you invest $5,000 in an investment which has an annual return of 10% but compounds every 6 months (instead of yearly), how much will it have after 6 years?
What will be increase in next month net operating income : Topeka Company's income statement for the current month shows that the company sold 500,000 units of its product and earned net operating income of $600,000.
Describe the security issues found on a network : Describe the security issues found on a network, and arrange them from highest to lowest, mapping out security loopholes to justify your answer.
Probability of succeeding : Is it possible to know their probability of succeeding if they receive finds from both parties?
Diversity in the working environment and empowerment : Diversity in the working environment. Empowerment. Leadership. The skills of a visionary leader.
What would be cost per equivalent unit for conversion costs : Tori Company uses the FIFO method in its process costing system. The first processing department, the Soldering Department, started the month with 25,000 units.
Identify Mr and Mrs Jones customer needs and expectations : Case Assignment - Duke University UAS. Identify Mr and Mrs Jones' customer needs and expectations in this case study

Reviews

Write a Review

Management Information Sys Questions & Answers

  Deliberate and emergent strategies

Deliberate and Emergent Strategies.

  What are the potential security risks in implementation

What process and procedural considerations should the organization need to understand to implement your solution?

  Write paper for each of the five technologies.

Research the following Google technologies below and write a minimum of one page for EACH of the FIVE technologies. This will be in essay form, APA format, minimum 7 references, totaling a minimum of 2700 words not including cover or referenc

  Explain three important user interface design principles

Explain three important user interface design principles. What are three fundamental parts of most user interfaces ?

  Explain how organizations are addressing green computing

Implications of Green Computing - Explain how organizations are addressing green computing. What are the short-term and long-term implications from a global perspective?

  Physical and environmental security

Research the Internet for the physical and environmental security measures taken by an organization of your choice. Also, read the NIST publication of Security Guide for Interconnecting Information Technology Systems

  What are association rules

BrieflyDifferentiate between Business Intelligence and Data Mining.What are Association Rules and Provide an example.

  Create an activity graph from the breakdown structure

Create an activity graph from the breakdown structure using Microsoft Visio or its open source alternative, Dia.

  What makes erp systems useful for enterprises

Distinguish between a business function and a business process. Describe how a business process cuts across functional lines in an organization.

  Create the screencast-o-matic video

Create the Screencast-O-Matic video demonstrating the IT solution. Wrapping Up the Capstone System Document and Demonstrating the IT Solution for Acceptance.

  Research about your chosen case

Your lecturer will place several links in Interact to a number of relevant articles and/or case studies. These will be available to you just after your second assignment has been submitted. Undertake further research about your chosen case, to assi..

  Internet security paperi have to write a 3-4 page paper

internet security paperi have to write a 3-4 page paper examining the impact that the internet has placed on

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd