Determine the best e-mail policy for an organization

Assignment Help Basic Computer Science
Reference no: EM13998108

In this assignment, you will write a paper in which you create a network security plan for a small business.

Tasks:

You are an IT manager for a small business. You are being asked to create a network security plan both for internal IT workers and for the company in general.

You are to put together a network security plan that addresses each of the following components:

  • Create a standard procedure for adding new users to a network.
  • Explain the use of virtual private networks (VPNs) and their security benefits and drawbacks.
  • Create a summary of a network plan, including the use of a firewall, written for a business person with limited knowledge of IT.
  • Document the uses of an intrusion detection system.
  • Identify and explain whether workers should be required to report potential security violations and create a policy based on your viewpoints.
  • Determine the best e-mail policy for an organization and document it for a business owner.
  • Create a password-change policy for a networking group.
  • Provide an executive summary briefing for a non-IT manager to review the business implications for the IT policies that you are recommending.

Submission Details:

  • By Monday, March 14, 2016, prepare a 7- to 9-page report. Write in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources (i.e., use APA format); and display accurate spelling, grammar, and punctuation.
  • Save your document in a Microsoft Word document with the name M5_A1_LastName_FirstIinitial.doc, and upload it to the M5 Assignment 1 LASA 2 Dropbox.

LASA 2 Grading Criteria and Rubric

All LASAs in this course will be graded using a rubric. This assignment is worth 300 points. Download the rubric and carefully read it to understand the expectations.

Assignment 1 Grading Criteria Maximum Points
Explained the use of VPNs and their security benefits and drawbacks. 32
Created a standard procedure for adding new users to a network. 36
Created a summary of a network plan, including the use of a firewall, written for a business person with limited knowledge of IT. 36
Documented the uses of an intrusion detection system. 40
Identified and explained whether workers should be required to report potential security violations and created a policy based on your viewpoints. 36
Determined the best e-mail policy for an organization and document it for a business owner. 28
Created a password-change policy for a networking group. 28
Writing Components:
  • Organization (16)
  • Usage and Mechanics (16)
  • APA Elements (24)
  • Style (8)
64
Total: 300

Reference no: EM13998108

Questions Cloud

What is the half-life of the radium nuclei : A sample is being analyzed 5800 years after undergoing an alpha decay process. As the technician is analyzing, he observes the sample contains only 8.5% of the radium nuclei it initially contained. What is the half-life of the radium nuclei?
How can managers promote sound leadership : How can managers promote sound leadership practices and good ethical behavior?  Why are they important and how do you promote an environment where they thrive?
Calculate number of collisions per second for a given atom : In a sample of Ar gas at 24 oC and 5.00 bar, calculate the number of collisions per second for a given atom. The diameter of an atom of Ar is 194 pm.
A programmer at a bank realized : A programmer at a bank realized that he had accidentally overdrawn his checking account.  He made a small adjustment in the bank's accounting system so that his account would not have the additional service charge assessed.  As soon as he deposited f..
Determine the best e-mail policy for an organization : Explain the use of virtual private networks (VPNs) and their security benefits and drawbacks.
What is the efficiency of the cycle : From A to B, the pressure increases from 1 atmosphere to PB=3.06 atmospheres and the process is adiabatic; from B to C, it is isobaric with 335.16 kJ of energy entering the system by heat. From C to D, the process is isothermal; from D to A, it is..
When choosing a store or business : When choosing a store or business, select a medium or large operation as it will be easier to complete the assignment. Look at the information the store or business uses in their daily business operations and identity four (4) key security risks to t..
Computer security is not an issue for organizations alone : Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer. Identify some of..
What is the equivalent resistance of the bulbs connected : What is the equivalent resistance of the bulbs connected in parallel? What peak current Imax will be supplied to the parallel combination by the 120-V rms source?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Transmit an uncompressed grayscale image

Determine the total time it takes to transmit an uncompressed grayscale image (with 8 bits/pixel) from a screen with a resolution of 1,280 × 840 pixels using each of the following media:

  Review the code of ethics of the institute of electrical

Review the code of ethics of the Institute of Electrical and Electronics Engineer (IEEE) and National Society of Professional Engineers (NSPE).

  Choices provided and prepare a security plan

Choose an organization from the choices provided and prepare a security plan that provides security awareness policy using a security policy framework outline and according the Critical Infrastructure document which concentrates on the following i..

  Report steps necessary evidence and protect company

Jonathan Simpson owns a construction company. Write a one-page report detailing the steps Jonathan and you need to take to obtain the necessary evidence and protect the company.

  Consider a server with poisson job-arrival stream

Consider a server with Poisson job-arrival stream at an average rate of 60 per hour. Determine the probability that the time interval between successive job arrivals is

  Is the difference y-x exactly representable

Is the difference y-x exactly representable, regardless of exponent range, if gradual underflow is allowed? WHy?

  Explain arithmetic-equality and quanti reasoning

Arithmetic, equality, and quanti reasoning. As it does simplication, automatic rewriting, and records sequent formulas in decision procedure database.

  Functionality for a contact management system

logging in a user, and maintaining contact information. Within each use case, create the expected flow (happy-path) and one alternate flow (an exception).

  Define fixed size instructions and varying size instructions

What are the advantages and disadvantage of fixed size instructions and varying size instructions?

  What is the proper syntax of declaring a c-style string

Take a look at the following program -- #include using namespace std; int main( ) { char name[100]; //declare a character array cout > name; cout

  Windows server deployment proposal

Windows Server Deployment Proposal

  Explain the pros and cons of thick or thin client char.

Explain the pros and cons of thick or thin client characteristics.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd