Project on a local it policy

Assignment Help Software Engineering
Reference no: EM13777993

This project is divided into two parts.

the first part (Project 2a), you will complete the policy document and submit it to TurnItIn.

Then, you will reformat your policy using the provided policy template (paste your content into the appropriate sections).

 

There are two deliverables for this assignment:
1. Completed Local IT Policy (Project 2a)
2. Completed Local IT Policy Reformatted Using the Policy Template (Project 2b)

Security policy is based on choosing the appropriate controls to protect the organization. Choose an organization from industry, government, private business, or military that you want to protect from unauthorized access. You may choose from any established industry, any government organization or military division such as General Dynamics, Department of Defense, Department of State, United States Air Force, etc. You are protecting the data center from unauthorized access. This requires that you write a policy for protecting the data center from unauthorized access by preventing personnel who are not authorized to use the resources of the organization from gaining access and potentially causing harm.

You will write a local policy to prevent unauthorized access by mandating that the data center in your organization follow your policy.

Your policy is being written by you as the information system owner (person responsible for the data center). Your instructions are being written for the Tier 1 staff. Tier 1 staff are the technicians. You are the supervisor of the technicians. This is considered a local policy. An enterprise policy contains all major procedures for security the enterprise. A local policy is based on certain controls with a specific function. Choose the appropriate controls below and write a local policy.

Complete the attached template for the policy to prevent unauthorized access by developing effective passwords in the data center. Submit the template to your assignment folder by the due date in your syllabus. The template is a guide for you to develop the policy based on access controls and effective password strategy for the development of the security policy.

Reference no: EM13777993

Questions Cloud

Role of contemporary human resource departments : A significant apprehension in achieving financial outcomes through globalization is the influence it has on the overall organization. Did you know, the role of contemporary human resource departments is to strategically focus on organizations long..
Discuss diagnosis-prescription-evaluation : Discuss diagnosis/prescription/evaluation and analyses of goal instruction with a teacher of students with intellectual disability (ID), including the implementation and development of goal instruction for students. What role do such procedures pl..
Generic term that covers a broad range of feelings : Which of the following is a generic term that covers a broad range of feelings that people experience
Adolescent decision-making issues : What are the four common patterns of irrational or unethical decision-making? Describe each type and provide an example from your own experience where you saw this happen or used this type decision-making
Project on a local it policy : Security policy is based on choosing the appropriate controls to protect the organization. Choose an organization from industry, government, private business, or military that you want to protect from unauthorized access. You may choose from any esta..
Total number of phosphate ions on each side of the equation : The following equation is not balanced: Na3PO4+MgCl2→Mg3(PO4)2+NaCl Notice that "PO4" appears in two different places in this chemical equation. PO 3-4 is a polyatomic ion called phosphate . What number should be placed in front of Na3PO4 to give the..
Employee selection criteria : Eastern Financial Company recently experienced a corporate restructuring. Because some new jobs were added and some old jobs eliminated, many job responsibilities changed. HR hired an Organizational Development (OD) consultant, Joe, to help modera..
How do niemollers words in first they came for Socialists : How do Niemöller's words in "First they came for..." repeat the theme developed in "I Sit and Look Out" by Walt Whitman?
Trends in criminal justice administration : Did this course meet your expectations? What did you like the best about this course? What suggestions can you offer to improve this course? What do you think future trends in criminal justice administration will look like

Reviews

Write a Review

Software Engineering Questions & Answers

  What are the two most important factors in determining the

answer the module review questions listed below. these questions were chosen to demonstrate your understanding and help

  Designing e-r diagram for each product at pvf

Suppose that at PVF, each product. Design E-R diagram for this situation and state minimum and maximum cardinalities on the diagram.

  Compare and contrast at least three 3 vareious software

you have been hired as the cio of a large multinational internet advertising company. the president of the company is

  Specify the entity-relationship diagram for database

Specify the entity-relationship diagram for this database. Do not forget to underline main attributes and include arrowheads indicating multiplicity of relationships.

  Design pseudocode and flowchart for swallowing a pill

Write a solution in pseudocode for swallowing a pill. Translate solution into flowchart. Write about which tool they like best and why? Which tool do they think would be easiest to learn?

  Create a table with a primary key to identify business

Construct a table that will store data about each student that took a course and what grade they received. The data should include the semester of completion.

  Develop user acceptance tests for the review

Develop User Acceptance Tests for the Review Content Query use case text description and create bug reports for any bugs you have identified in your executed tests.

  Prepare a report explaining the possible methods

Prepare a report explaining the possible methods that can be adopted in this particular scenario, resources required for the methods chosen for this investigation, approximate budget to conduct the investigation

  Write an international mini-plan for a company that

write an international mini-plan for a company that interests you or a productservice that you want to sell yourself.

  Explanations on fixing c++ code errors

This technique takes an array of ints as a parameter and returns an array of Booleans. For each element in the parameter array whose value is 0,

  Structural modelingstructural modeling is a different view

structural modelingstructural modeling is a different view of the same system that you analyzed from a functional

  Importance of framing a problem

A program that tells a bus rider which buses to take to get from one location to another, arriving by a specified time.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd