Develop a security policy document

Assignment Help Computer Network Security
Reference no: EM13774170

DigiNotar was a Certificate Authority (CA) whose security was breached in 2011. In your term paper, you are to play the role of a CIO and review the role CAs provide. Provide a historical perspective of CAs and their significance to the Internet and organizations. Your paper will review the events that lead to the breach of DigiNotar and the factors that would have mitigated it.

Write a ten to sixteen (10-16) page paper in which you develop a security policy document for your mid-sized organization that will include measures to protect against breaches and act as a proactive defense. You may select a fictitious name for your organization for the purpose of this paper. Do not duplicate a company's existing policy. Create your own unique work based on what you have learned in this course. Policy reference materials can be found in Part 6B of your textbook. There will be two (2) major sections of the handbook: Policy Introduction and Policy Criteria.

Section 1: Policy Introduction In two to four (2-4) pages total, develop a policy introduction that secures the reason for the policy. It must include the following four (4) items:

1. Document information 2. Audience 3. Purpose 4. Scope

Section 2: Policy Criteria In eight to twelve (8-12) pages total, develop a security policy to protect against breaches and act as a proactive defense. It must include the following five (5) policy items:

1. Objectives 2. Compliances 3. Responsibilities 4. Implementation 5. Controls 6. Use at least four (4) quality resources in this assignment.

Reference no: EM13774170

Questions Cloud

The outline is security threats & vulnerabilities : the outline is Security Threats & Vulnerabilities, You must provide a 1-page outline of your paper by the end of Week 3. Your outline must include citations to three references and a brief summary of at least three references that you will use in..
Write a responce paper on marketing and media industries : Write a responce paper on Marketing & Media Industries.
What level of excess reserves does the bank now have : what is the value of the dollar and what direction must its liabilities have changed from the day before and what level of excess reserves does the bank now have?
Why is it important for employees to stay motivated : Why is it important for employees to stay motivated in the workplace. Provide at least two ways in which motivation is achieved in your current job
Develop a security policy document : Write a ten to sixteen (10-16) page paper in which you develop a security policy document for your mid-sized organization that will include measures to protect against breaches and act as a proactive defense
Where do most jurisdictional issues usually arise : One often hears about so-called turf wars among the various local, state, and federal law enforcement agencies. These are usually related to jurisdictional conflicts and the blurry line between agency boundaries. Where do most jurisdictional issue..
What are some effective ways to teach academic language : What are some effective ways to teach academic language in social studies? Why is it important to teach students important vocabulary prior to studying a concept?
Is their case persuasive : According to Banerjee and Duflo, are poor people caught in a poverty trap, so that their pursuit of the things they need for immediate subsistence prevent them from saving up for better health care and education? Explain their position and the eviden..
Causes of morbidity and mortality in the united states : Influenza is a disease that affects many Americans. As an epidemiologist you are asked to review the three levels of prevention for influenza in front of your city council. How would you go about doing it?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Create a communication medium

Illustrate the authentication policies, in which you identified in Part 1 Question 1, by including at least two (2) SmartArt diagrams graphically depicting them.

  How vulnerable end-users are leaving themselves

Students must NOT include any audio or video files. The PowerPoint virtual presentation will not be formally presented. As a result students must endeavour to convey their views and research findings whilst adhering to best presentation practices.

  Ip security and attacksnbspbased on your understanding of

ip security and attacksnbspbased on your understanding of networking concepts create a 2- to 3-page report in a

  For a typical network environment

For a typical network environment (that includes an Internet-facing Website, a human resources database and application, and development workstations that contain copyrighted material), describe some typical devices or assets and vulnerabilities that..

  Understanding project priorities and scheduling issues

hat general suggestions would you give for helping to promote common understanding of project priorities and critical scheduling issues,

  Define and describe voip and virtual private networks and

1. list and describe the principal internet services.2. define and describe voip and virtual private networks and

  Paper about cyber security and identify assess and propose

Please refer to the latest document about cyber security and identify assess and propose: Risk related indicators and governance solutions, vulnerability assessment for cyber security

  Describe the secure communication scenarios

Both IPsec and SSL provide encrypted network communication, but at different layers in the Internet protocol stack, and for different purposes. Compare and contrast these two protocols, and describe the secure communication scenarios they are best..

  Several convicted cases of cyberstalking

There are several convicted cases of cyberstalking and Internet fraud/abuse. Misha Glenny, a United Kingdom-based journalist, recently wrote a book on the subject matter appropriately titled Dark Markets

  What is the value of the symmetric key

In the Diffie-Helman protocol, what happens is x and y have the same value, that is, Alice and Bob accidentally chosen the same number? Are R1 and R2 same?

  Essence of a digital signature is ensures authentication

1. The essence of a digital signature is that it ensures authentication. Explain how and why it does that.

  How should organizations respond to security threats your

how should organizations respond to security threats? your response should be at least 200 words in length. you are

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd