Discuss the differences between implementation and policy

Assignment Help Computer Networking
Reference no: EM132614122

Assignment: A Walk in the IT Director's Shoes

The final assignment for this course is a Final Paper. The purpose of the Final Paper is for you to culminate the learning achieved in the course. The Final Paper represents 32% of the overall course grade.

Focus of the Final Paper

Assume you are an Information Technology Director for a small, growing firm and are tasked with developing an electronic resource security policy to deploy within your organization. The policy needs to protect the organization's valuable electronic assets, but be flexible enough to accommodate employees as they go about executing their jobs and getting business done. It also needs to address communication and data security aspects such as remote data access, smartphone access, and internal electronic communications such as IM (instant messaging) and email.

(Note that a policy is different from a plan. Be sure you address primarily the policy aspects of this task.).

In a minimum five page APA formatted paper (excluding title and reference pages) using the lecture, supplemental resources, and your own research, discuss the following elements.

1. Discuss the differences between ‘implementation' and ‘policy', and describe the importance of their separation.

2. Using information from the course, including the lectures and weekly reading, develop an outline of your security policy which addresses the areas identified in the prompt. Be as specific as possible.

3. Compare the policy differences between users who work remotely or use wireless hotspots to users who work on site in a traditional office environment.

4. Discuss how you would implement your security policy within the organization, including how employees would be apprised of the new policies. Be sure to explain which elements are critical for a successful implementation of your policy

5. Include a minimum of five sources, one of which may be the textbook. Of these sources, three must be from the Ashford Library or from IT industry standard periodicals.

Writing the Final Paper

The Final Paper:

1. Must be a minimum of five double-spaced pages (excluding title and reference pages) in length, and formatted according to APA style as outlined in the Ashford Writing Center.

2. Must include a title page with the following:

• Title of paper

• Student's name

• Course name and number

• Instructor's name

• Date submitted

3. Must begin with an introductory paragraph that has a succinct thesis statement.

4. Must address the topic of the paper with critical thought.

5. Must end with a conclusion that reaffirms your thesis.

6. Include a minimum of five sources which may include the text. Of these sources, three must be from the Ashford Library or from IT industry standard periodicals.

7. Must document all sources in APA style, as outlined in the Ashford Writing Center.

8. Must include a separate reference page, formatted according to APA style as outlined in the Ashford Writing Center.

Reference no: EM132614122

Questions Cloud

Why is the inflation adjustment : Why is the inflation adjustment not as relevant to the project revenues?
What was Blossom Cos total dividends for the year : Splish Co. invested $910,000 in Blossom Co. for 25% of its outstanding stock. What was Blossom Cos total dividends for the year
Explain ato requirement for businesses : Explain ATO requirement's for businesses regarding GST registration. Outline three types and sources of data required for complex financial reports.
How much will be the amount of each payment : The relevant interest rate is 8% per annum. How much will be the amount of each payment?
Discuss the differences between implementation and policy : Discuss the differences between ‘implementation' and ‘policy', and describe the importance of their separation. Using information from the course, including.
Citrus glow selling prices per share : Joe, after talking to his MBA classmates, realized that his forecast of dividend payout might be too aggressive and it is by nature very difficult
Outline source of data required for complex financial report : Outline source of data required for complex financial. Explain five key features of integrated computerised accounting systems, for example MYOB or Xero.
What is the accumulated amount : Find the simple interest on a $500 investment made for 2 years at an interest rate of 8% per year. What is the accumulated amount?
What is the average amount of receivables : Snider Industries sells on terms of 2/10, net 45. Total sales for the year are $1,800,000. Thirty percent of customers pay

Reviews

Write a Review

Computer Networking Questions & Answers

  Find the value of the flags field for a query message

Find the value of the flags field (in hexadecimal) for a query message requesting an address and demanding a recursive answer.

  What windows server 2012 service and applications offer ipv6

What is the primary reason IPv6 has not completely replaced IPv4

  What was guiding principle behind the authors identification

What was the guiding principle behind the author's identification of step 8 as the data collection point in the provider's work process? Why not step 9?

  Chapter 331 describe why an application developer might

chapter 3.3.1 describe why an application developer might choose to run over tcp rather than udp.3.2 suppose host a is

  Prepare a budget for the complete project

A well researched and comprehensive definition of Network Infrastructure Management is given. The general responsibilities of the network manager are listed.

  Consider the kinds of systems that benefit from dhcp

consider the types of systems that benefit from dhcp reservations andor from having manually-configured static ip

  Devise an assessment plan of applications for performance

Apply concepts and theories of human factors as related to network design and implementation - Human factors in network analysis and design

  Finding machines is client and which is server

Which of machines A-E is the client and which is the server? In an X-windows environment, a program is running on machine A, displays windows on machine B and a window manager on machine C controls the look and feel of the windows.

  Write a simple shell script

Write a simple shell script, which will scan the ports for protocols: FTP, SSH, SMTP, HTTP, for the first 10 hosts in the network 192.168.1.0/24

  Use discrete event simulation approach

Use discrete event simulation approach I introduced in class to simulate the traditional "machine-repairman" closed queuing network.Please check "examples" lecture notes (lecture 13) Page 2-5 for the machine-repairman problem description.

  Define each protocol and describe two data transmission

Define each protocol and describe at least two data transmission technologies associated with the protocol. Include bandwidth limitations of each technology.

  Building a payroll program for a large organization

Application Architecture. You have been tasked with building a payroll program for a large organization with offices spread across the United States.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd