Operation security

Assignment Help Basic Computer Science
Reference no: EM132767875

Scenario

You work for a high-tech company with approximately 390 employees. Your firm recently won a large DoD contract, which will add 30% to the revenue of your organization. It is a high-priority, high-visibility project. You will be allowed to make your own budget, project timeline, and tollgate decisions.

You must develop the proper DoD security policies required to meet DoD standards for delivery of technology services to the U.S. Air Force Cyber Security Center (AFCSC), a DoD agency. To do this, you must develop DoD-approved policies and standards for your IT infrastructure (see the "Tasks" section below). The policies you create must pass DoD-based requirements. Currently, your organization does not have any DoD contracts and thus has no DoD-compliant security policies or controls in place.

The firm's computing environment includes the following:

12 servers running Microsoft Server 2012 R2, providing the following:

o Active Directory (AD)

o Domain Name System (DNS)

o Dynamic Host Configuration Protocol (DHCP)

o Enterprise Resource Planning (ERP) application (Oracle)

o A Research and Development (R&D) Engineering network segment for testing, separate from the production environment

o Microsoft Exchange Server for e-mail

o Symantec e-mail filter

o Websense for Internet use

 Two Linux servers running Apache Server to host your Web site

 390 PCs/laptops running Microsoft Windows 7 or Windows 8, Microsoft Office 2013, Microsoft Visio, Microsoft Project, and Adobe Reader

Tasks

You must:

 Select a team leader for your project group.

 Create policies that are DoD compliant for the organization's IT infrastructure.

 Note DOD-specific requirements for the organization's IT infrastructure and U.S. compliance laws that may affect the firm

 Include DoD-compliant policies, standards, and controls that affect the User, Workstation, LAN, and LAN-to-WAN Domains

 Develop a list of compliance laws required for DoD contracts.

 List controls placed on domains in the IT infrastructure.

 List required standards for all devices, categorized by IT domain.

 Include DoD-compliant policies, standards, and controls that affect the WAN, Remote Access, and System/Application Domains

 Develop a deployment plan for implementation of these polices, standards, and controls.

 List all applicable DoD frameworks in the final delivery document.

 Write a professional report that includes all of the above content-related items.

Attachment:- Residency Research Project.rar

Reference no: EM132767875

Questions Cloud

Calculate the change in interest : At the end of the year, N Ngobe is admitted into the CC and he will receive a 20% share in the close corporation. Calculate the change in interest
Related to application security : Locate a peer-reviewed article related to application security from the UC virtual library.
What is the cost of producing one unit of the product : Actual data for one unit of the product are as follows: $20 of direct material cost was incurred. What is the cost of producing one unit of the product
Compute the break-even point in dollar sales : Compute the break-even point in dollar sales for the company under the new marketing strategy. Do you agree with the marketing manager's proposal
Operation security : A Research and Development (R&D) Engineering network segment for testing, separate from the production environment
Calculate the net cost of debt of the bonds issued : Issue bonds amounting to $ 2.5 Million with an annual coupon rate of 6.5%. Calculate the net cost of debt of the bonds issued
Compute the company net income for the year : Penno Corporation recorded service revenues of $120,000 during the current year, Compute the company net income for the year
About information systems continuity : What were the lessons learned about information systems continuity?
What must be the current price of the stock : The prevailing risk-free rate is 7.00%. What must be the current price of the stock on which these two options are written

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd