Discuss each component from list and specific information

Assignment Help Computer Engineering
Reference no: EM133515192

Project Homework: Security Policy Implementation

Overview

For this homework, review information assurance policy templates via the SANS policy template site and select a template of your choice, to be used as a GUIDE ONLY. You can find this through Security Policy Templates found under Project: Security Policy Implementation Resources located on the Project: Security Policy Implementation Homework page. DO NOT format your paper in this outline format! You can look at the General / Acceptable Encryption Policy to download either the doc or pdf file, but this is NOT how you will format your paper. Utilize the downloaded template, from the SANS Policy website, and the Project Grading Rubric as a guide. However, you must still conform to the APA style of writing. I.E. DO NOT uses the 4.1.1 outline style in your paper. You must use paragraph style and provide a 5-page write-up, highlighting key components that should be included during the development of an information assurance policy. These are your mandatory Level One headers:

1) Overview
2) Purpose
3) Scope
4) Policy Compliance
5) Related Standards
6) Definitions
7) Terms

Instructions

Discuss each component from the above list and the specific information that can be included within each section of the policy. You will need at least 3 sentences under each Level One header. Support your paper with a minimum of five peer-review resources. In addition to these specified resources, other appropriate scholarly resources, including older articles, may be included. You are free to use as many other references as needed, as long as you have five peer-review sources properly included. Remember "scholarly articles" are the same as peer-review articles. Books, web sites, and blogs are not peer-review. Peer-review means a journal article that has been vetted by your peers. Books are allowed; however, they do not count as a peer-review article.

Length: 5 pages.

Your paper should demonstrate thoughtful consideration of the ideas and concepts that are presented in the course and provide new thoughts and insights relating directly to this topic. Your response should reflect scholarly writing and current APA standards.Only one set of bullet points is allowed in this paper. The bullet points can be only for your ‘Related Terms' section. No other bullet points/number points will be allowed. You must learn to phrase in sentence format.

Follow the Project: Security Policy Implementation Example. Ask your professor if there are example papers from past courses for you to review for ideas. Keep in mind that you will not have an Article Reference header at the top of the paper, but you will have a references section at the end.

Be sure to have a title page with Running head, and do not use a real company or organization name, make one up.

The purpose of this paper is to develop an information assurance policy. It should read like real guidance; you would deliver to your future or present company someday. The citations should be used to give clarity or credibility to a statement you are making. Do not just cite something because you saw them say it that way or format their paper that way. Make a statement, then back it up with a citation from a scholarly source. Be sure to cover all that is described in the instructions for the homework. It may be helpful to search the Jerry Falwell Library for scholarly sources that describe what is in an"Information Assurance Policy", or "Information Security Plan" or "Information Security Policy."

You might also want to search in the library for "Information Assurance Policy "and "Security Plan" and look for relevant examples, but be careful to not copy/paste, cite all borrowed ideas and use scholarly sources for at least 5 of those citations.

Reference no: EM133515192

Questions Cloud

Discuss a time when you had a single story about something : Discuss a time when you had a Single Story about something / someone and how this viewpoint wasexpanded. If you don't have your own story
Evaluate the telecommunication and network practices : Evaluate the telecommunication and network practices that were in place and describe what contributed to the security breach including vulnerability exploited.
Effect behind the issue of imidacloprid in apis mellifiera : What is the significance or effect behind the issue of Imidacloprid in Apis mellifiera?
Which you will pursue and fulfill this promise : deepest levels of scholarship in order to bring about meaningful social change for students with exceptionalities. As a part of this promise
Discuss each component from list and specific information : Discuss each component from the above list and the specific information that can be included within each section of the policy.
What role do they play in relating to teachers : what are the roles of the reading specialists and literacy coaches in the schools? What role do they play in relating to teachers, other professionals
Difference between a food chain and a food web : Draw a diagram of a simple food web with three trophic levels and describe the difference between a food chain and a food web.
Define species diversity : Explain how ecologists define species diversity. What data must be collected to determine the diversity of a community?
What is the contaminants source : Why is the contaminant an issue to the environment and/or human health and how does it affect humans and/or organisms?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Describe your clusters in english

Describe your clusters in English. Your description will be based on the cluster centers, but use descriptive terms instead of just listing the center values.

  Identify four risk control strategies in security management

Identify the four risk control strategies in security management and explain each of them. Discuss the differences between benchmarking and baselining

  Find and prints the number of positive and negative numbers

Write a shell script that reads a list of 100 numbers and saves them into an array, and then find and prints the number of positive and negative numbers.

  Solve the problem using qm for windows

A LP problem has three constraints: 2X + 10Y ≤ 100; 4X + 6Y ≤ 120; 6X + 3Y ≤ 90 and the non-negativity constraints. The objective is to Maximize X. Solve the problem using QM for Windows

  Why christians should study computer science

Why Christians Should Study Computer Science (And Other Technical Disciplines), and reflect on how it applies to the Christian world view and your development

  Define local and global declarations in an xml schema

What are the differences between simple and complex XML schema types? Define local and global declarations in an XML schema.

  Create a program where ten viewers were asked to rate

Create a program where ten viewers were asked to rate, on a scale of 1 to 5, the quality of a movie they just watched, with 1 being "awful" and 5 being ".

  Write a class testcatalan

CE152 Assignment Spring 2017 - Write a class TestCatalan with one or more JUnit tests that check that method catalan(n) returns the correct result

  Define what standards-compliance of html and css means

UUM 1033 Northern University of Malaysia Define what 'standards-compliance' of HTML and CSS means and explain why it is important to the WH-Moe.

  Different access methods like ofdma sdma tdma cdma and fdma

different access methods such as ofdma sdma tdma cdma and fdma rely on cross-layer optimization to different degrees.

  Create appropriate functions for these classes

Create appropriate functions for these classes, and write a main()function that instantiates and uses objects of each class.

  Do a little research to find the typical cost of different

do a little research to find the typical cost of different types of cables. how do the prices compare for different

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd