Implement your security policy within the organization

Assignment Help Basic Computer Science
Reference no: EM131044275

The final assignment for this course is a Final Paper. The purpose of the Final Paper is for you to culminate the learning achieved in the course. The Final Paper represents 32% of the overall course grade.

Focus of the Final Paper

Assume you are an Information Technology Director for a small, growing firm and are tasked with developing an electronic resource security policy to deploy within your organization. The policy needs to protect the organization's valuable electronic assets, but be flexible enough to accommodate employees as they go about executing their jobs and getting business done. It also needs to address communication and data security aspects such as remote data access, smartphone access, and internal electronic communications such as IM (instant messaging) and email.

In a minimum five page APA formatted paper (excluding title and reference pages) using the lecture, supplemental resources, and your own research, discuss the following elements.

  • Discuss the differences between ‘implementation' and ‘policy', and describe the importance of their separation.
  • Using information from the course, including the lectures and weekly reading, develop an outline of your security policy which addresses the areas identified in the prompt. Be as specific as possible.
  • Compare the policy differences between users who work remotely or use wireless hotspots to users who work on site in a traditional office environment.
  • Discuss how you would implement your security policy within the organization, including how employees would be apprised of the new policies. Be sure to explain which elements are critical for a successful implementation of your policy
  • Include a minimum of five sources, one of which may be the textbook. Of these sources, three must be from the Ashford Library or from IT industry standard periodicals.

Writing the Final Paper

The Final Paper:

 Must be a minimum of five double-spaced pages (excluding title and reference pages) in length, and formatted according to APA style as outlined in the Ashford Writing Center.
Must include a title page with the following:

  • Title of paper
  • Student's name
  • Course name and number
  • Instructor's name
  • Date submitted
  • Must begin with an introductory paragraph that has a succinct thesis statement.
  • Must address the topic of the paper with critical thought.
  • Must end with a conclusion that reaffirms your thesis.
  • Include a minimum of five sources which may include the text. Of these sources, three must be from the Ashford Library or from IT industry standard periodicals.
  • Must document all sources in APA style, as outlined in the Ashford Writing Center.
  • Must include a separate reference page, formatted according to APA style as outlined in the Ashford Writing Center.

Reference no: EM131044275

Questions Cloud

Question regarding the business and society : Specify the nature, structure, and types of products or services of Apple, and identify two (2) key factors in the organization's external environment that can affect its success. Provide explanation to support the rationale.
Identify when someone is an effective or in-effective leader : Trust and leadership go hand and hand in an organization. You cannot have effective leadership if people do not trust one another. The following attachment is developed by a consultant I have worked with Rob Fleischer. This list of signs provides can..
Explain your vision of future technology : Explain your vision of future technology and which potential technologies are likely to actually happen and which are not and why. Then for the technologies you think will eventually come to fruition, evaluate the impact impact our lives.
What is meant by the term grounded theory : Which of the following is a method that is commonly used in qualitative research? What is meant by the term "grounded theory"?
Implement your security policy within the organization : The final assignment for this course is a Final Paper. The purpose of the Final Paper is for you to culminate the learning achieved in the course. The Final Paper represents 32% of the overall course grade.
Change in the bond’s price in percentage : A $1,700 face value corporate bond with a 5.6 percent coupon (paid semiannually) has 12 years left to maturity. It has had a credit rating of BBB and a yield to maturity of 7.9 percent. The firm has recently gotten into some trouble and the rating ag..
Arbitrage opportunity in the currency markets : A US investor sees an arbitrage opportunity in the currency markets. The spot exchange rate between the Swiss Franc and US Dollar is 1.00549 ($ per CHF). Assume the continuously compounded interest rates in the US and Switzerland are 0.33% and -0.81%..
Hypothetical stock is expected to pay a dividend : A hypothetical stock is expected to pay a dividend of $12 per share in two months, in six months and in ten months. The stock price is $600, and the risk-free rate of interest is 0.55% per annum with continuous compounding for all maturities.
How would you define global citizenship : How would you define global citizenship? What are the characteristics of a globally competent citizen? How would you rate yourself on the degree to which you reflect various characteristics of a globally competent citizen?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Businesses rely heavily on knowledge

Businesses rely heavily on knowledge about Human Computer Interaction

  What does a java class contain

What does a Java class contain that identifies it as a Java application?

  Motherboard beep codes are useful for troubleshooting

Motherboard beep codes are useful for troubleshooting hardware and configuration faults. If all is well, a computer should beep once to signal this and continue the boot-up process. If there is no beep, or if nothing happens after the power button is..

  Perform a risk assessment for the university

Your organisation has been hired to perform a risk assessment for the University. In your own words what is a risk assessment and why is it important? Perform a vulnerability assessment for the database which was attacked.

  Covert the subsequent decimal numbers into binary numbers

Write the results of the two numbers (in decimal) after the BIT operations and please covert the subsequent decimal numbers into binary numbers:  (using 2 bytes = 16 bits)

  Sort the array and write out the sorted array

Consider a program that will read employee information into an array of objects, sort the array by employee identification number, write out the sorted array, and compute various statistics on the data, such as the average age of an employee.

  Protecting data transfer in network environment

It is expected your proposal has a length of 1 to 2 pages, the following information are needed:

  What is an html text editor

Windows NotePad is a simple text editor. What is the difference between a text editor and a word processor?" What is an HTML Text Editor? What is it used for and how does it compare to a regular text editor

  Compare the running time of this modification

Compare the running time of this modification with that of the original algorithm on sequences that are nearly sorted or reverse sorted, and on sequences with many identical elements. What do you observe?

  Difference between ipo and event driven programming

To add new menu items to an MFC application, you start by going to what view? So the menus are stored in what kind of files?

  The end-to-end communication

If a frame passes from a station through two switches, then through a router, then through two more switches, and then to the destination station, how many Ethernet frames will there be in the end-to-end communication?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd