Develop deployment plan for implementation of these polices

Assignment Help Basic Computer Science
Reference no: EM132382925

Scenario

You work for a high-tech company with approximately 390 employees. Your firm recently won a large DoD contract, which will add 30% to the revenue of your organization. It is a high-priority, high-visibility project. You will be allowed to make your own budget, project timeline, and tollgate decisions.

You must develop the proper DoD security policies required to meet DoD standards for delivery of technology services to the U.S. Air Force Cyber Security Center (AFCSC), a DoD agency. To do this, you must develop DoD-approved policies and standards for your IT infrastructure (see the "Tasks" section below). The policies you create must pass DoD-based requirements. Currently, your organization does not have any DoD contracts and thus has no DoD-compliant security policies or controls in place.

The firm's computing environment includes the following:

 12 servers running Microsoft Server 2012 R2, providing the following:

o Active Directory (AD)

o Domain Name System (DNS)

o Dynamic Host Configuration Protocol (DHCP)

o Enterprise Resource Planning (ERP) application (Oracle)

o A Research and Development (R&D) Engineering network segment for testing, separate from the production environment

o Microsoft Exchange Server for e-mail

o Symantec e-mail filter

o Websense for Internet use

 Two Linux servers running Apache Server to host your Web site

 390 PCs/laptops running Microsoft Windows 7 or Windows 8, Microsoft Office 2013, Microsoft Visio, Microsoft Project, and Adobe Reader

Tasks

You must:

 Select a team leader for your project group.

 Create policies that are DoD compliant for the organization's IT infrastructure.

 Note DOD-specific requirements for the organization's IT infrastructure and U.S. compliance laws that may affect the firm

 Include DoD-compliant policies, standards, and controls that affect the User, Workstation, LAN, and LAN-to-WAN Domains

 Develop a list of compliance laws required for DoD contracts.

 List controls placed on domains in the IT infrastructure.

 List required standards for all devices, categorized by IT domain.

 Include DoD-compliant policies, standards, and controls that affect the WAN, Remote Access, and System/Application Domains

 Develop a deployment plan for implementation of these polices, standards, and controls.

 List all applicable DoD frameworks in the final delivery document.

 Write a professional report that includes all of the above content-related items.

Requirements:

• Minimum of 1,250 words / Maximum 1,800 words (Double spaced)

• APA style

• At least 7 works cited

• At least 5 of your references have to be scholarly peer-reviewed articles

• Research paper will be checked for plagiarism so be sure to correctly cite your sources!

• 80/20 rule for all submissions.

Attachment:- Operations Security.rar

Reference no: EM132382925

Questions Cloud

Examining health care delivery in the united states : The overall goal of the Session Long Project in this course is to examine health care delivery in the United States from a personal perspective and provide.
Compute the firm gross profit margin : Your firm has the following income statement items: sales of $52,000,000; income tax of $1,880,000; operating expenses of $9,000,000; cost of goods sold
Assignment - Cleaning, checking, and managing data in SPSS : Assignment - Cleaning, checking, and managing data in SPSS. Collapse the "Age" variable into ordinal variable with three categories
Unit 17 network security - network security project : Unit 17 Network Security Assignment help and solution, Crumlin Computers Limited, Network Security Project Assessment help, Higher National Diploma in Computing
Develop deployment plan for implementation of these polices : Develop a deployment plan for implementation of these polices, standards, and controls. List controls placed on domains in the IT infrastructure.
How much interest on interest would you have at the end : How much would you have at the end of 20 years? How much interest on interest would you have at the end of 20 years?
What is the projected net present value of project : Travis and sons has a capital sturcture which is based on 40 percent debt, 5 percent preferrerd stock, and 55 percent common stock.
Demonstrate connection to your desired work environment : Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.
What is the firms weight average cost of capital : This debt has a 9 percent coupon and pays interest annually. What is the firms weight average cost of capital?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd