List controls placed on domains in the it infrastructure

Assignment Help Management Information Sys
Reference no: EM132022608

Requirements

Word document 9-12 pages - Time New Roman 12 Font

Single Space

One-inch margin

All figures & diagrams must be labeled

All Citations & references formatted in accordance with APA 6th edition

Term Project Guidelines

Scenario

You work for a high-tech company with approximately 400 employees.

Your firm recently won a large Department of Defense (DoD) contract, which will add 30% to the revenue of your organization. It is a high-priority, high-visibility project. You will be allowed to make your own budget, project timeline, and tollgate decisions.

This project requires developing the proper DoD security policies required to meet DoD standards for delivery of technology services to the U.S. Air Force Cyber Security Center (AFCSC), a DoD agency.

To do this, you must develop DoD-approved policies and standards for your IT infrastructure (see the "Tasks" section below).

The policies you create must pass DoD-based requirements. Currently, your organization does not have any DoD contracts and thus has no DoD compliant security policies or controls in place.

Your firm's computing environment includes the following:

• 12 servers running Microsoft Server 2008 R2, providing the following:

o Active Directory (AD) o Domain Name System (DNS)

o Dynamic Host Configuration Protocol (DHCP)

o Enterprise Resource Planning (ERP) application (Oracle)

o A Research and Development (R&D) Engineering network segment for testing, separate from the production environment

o Microsoft Exchange Server for e-mail

o Symantec e-mail filter

o Websense for Internet use.

• Two Linux servers running Apache Server to host your Web site

• 390 PCs/laptops running Microsoft Windows 7, Microsoft Office 2007, Microsoft Visio, Microsoft Project, and Adobe Reader.

Tasks

• Create policies that are DoD compliant for the organization's IT infrastructure.

• Develop a list of compliance laws required for DoD contracts.

• List controls placed on domains in the IT infrastructure.

• List required standards for all devices, categorized by IT domain.

• Develop a deployment plan for implementation of these polices, standards, and controls.

• List all applicable DoD frameworks in the final delivery document.

• Write a professional report that includes all of the above content-related items

Internet Sites

DoD instructions or directives

Department of Defense Information Assurance Certification and Accreditation Process (DIACAP) Instruction-DoDI 8510.01

Department of Defense Information Security Program

Department of Defense Internet Services and Internet-Based Capabilities

Department of Defense Proposes New Information Security Requirements for Contractors

Reference no: EM132022608

Questions Cloud

How much will james have saved at age 65 : If the account earns 10% per year, how much will James have saved at age 65.
What is the percentage price change of bond : what is the percentage price change of Bond J Bond K
What is the value of hodges common stock : The rate of return for common stock with a risk level comparable to that of Hodges Enterprises is 14%. What is the value of Hodges common stock?
Develop the project idea based on the given steps : Project is a short or long-term activity with a stated beginning and end time. Projects requires several organized activities with defined scope and resources.
List controls placed on domains in the it infrastructure : Create policies that are DoD compliant for the organization's IT infrastructure. Develop a list of compliance laws required for DoD contracts.
Describe the disaster recovery and business continuity : How was the organization impacted? What losses did it suffer? Describe the disaster recovery and business continuity that the business had in place?
Correlation coefficient between the returns : If the covariance of returns on A and B is .0202, the correlation coefficient between the returns on A and B is __________.
Explain why the normal shape of the yield curve : What are the two contrasting views that have been offered to explain why the "normal shape" of the yield curve is upward sloping.
Formulate and solve a shortest-path problem : Assignment - Network Models - Formulate and solve a shortest-path problem whose solution will minimize the cost of meeting the demand for boxes

Reviews

Write a Review

Management Information Sys Questions & Answers

  Describe the expanded homeland security bureaucracy

Describes two (2) viewpoints on the expanded homeland security bureaucracy that resulted from the creation of the DHS.

  Essay about google and the future of computing

2500 word essay about Google and the future of computing. Research Google and discover at least 5 technologies they have developed (or are currently developing), other than the search and advertising features

  Provide an analysis of the current trends in health care

Assess ways in which contemporary patient records systems can support health care operations including privacy, quality patient care delivery, insurance and cost administration, and records access and retention.

  Discuss about the information systems infrastructure

Select a topic from the following list on which you would like to conduct an in-depth investigation: Information systems infrastructure: evolution and trends

  Introduce a leader of your choice

Review the theories of leadership, teamwork, ethics, diversity and change presented throughout the module.

  Develop a list of five security-related issues

Describe the relationship of the requirements phase, testing phase, and use cases with respect to software engineering development and secure code.

  What do you see as key difference between using social media

What do you see as the key differences between using social media and traditional media for corporate marketing? What kinds of technologies might be useful when updating a marketing plan to include social media and web applications?

  Describe the privacy concerns with internet service provider

Analyze honeypotting to determine if it is an optimal detection method for botnets and justify your answer.

  The significance of communication

From this project I have analyzed that leadership styles generally needs proper skills as well as knowledge for making the project successful.

  Identify the mean and the standard deviation

Calculate the mean duration time for each activity. -  Calculate the variance for each activity time. - Identify the mean and the standard deviation for each path.

  Purchasing and supply management processes

Supply Chain Management - Private vs. Public Sector - how do these differences affect the establishment or maintenance of buyer-supplier relationships and the implementation of Purchasing and Supply Management processes?

  How do your views on this issue help you in the pitch

Does IT Really Matter and Why? How do your views on this issue help/not help you in making the pitch of a New IT project?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd