Create a comprehensive security policy for the company

Assignment Help Basic Computer Science
Reference no: EM13531444

An infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment for which it is written. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

The last section of the project plan will present the infrastructure in accordance with the parameters set forth at the outset of the project. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. In addition, access paths for Internet access should be depicted. A narrative should be included to explain all the nodes of the network and the rationale for the design. Lastly, using the Confidentiality, Integrity and Availability (CIA) Triangle, define the organizational security policy. CIA is a widely used benchmark for evaluation of information systems security.

Infrastructure Document

1. Write a five to ten (5-10) page infrastructure document in which you:

a. Design a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.

b. Illustrate the possible placement of servers including access paths to the Internet and firewalls. Note: Facility limitations, workstations, printers, routers, switches, bridges and access points should be considered in the illustration.

c. Explain the rationale for the logical and physical topographical layout of the planned network.

d. Create a comprehensive security policy for the company that will:

i. Protect the company infrastructure and assets by applying the principals of CIA. Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three core goals of confidentiality, integrity and availability of information.

ii. Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.

Revised Gantt Chart / Project Plan

Use Microsoft Project or an open source alternative, such as Open Project, to:

2. Update the Gantt chart or project plan (summary and detail) template, from Project Deliverable 3: Database and Programming Design, with all the project tasks.

The specific course learning outcomes associated with this assignment are:

Demonstrate an understanding of existing and emerging information technologies and strategic impact on organizational operations.

Evaluate the issues and challenges associated with information technology integration.

Evaluate the ethical concerns that information technology solve or present in a global context.

Use technology and information resources to research issues in information technology.

Write clearly and concisely about strategic issues and practices in the information technology domain using proper writing mechanics and technical style conventions.

Reference no: EM13531444

Questions Cloud

Explain extracted methylene chloride : How many Mg of catfish would be obtained if the same aqueous solution is extracted once with 60 ml of methylene chloride. Come pare the two results . In both experiments we use the same amount of organic solvent. However do we isolate the same amo..
How far will the ball have rolled from its starting point : When rolling a ball down an inclined plane, the ball rolls 1 cubit in ten seconds. How far will the ball have rolled from its starting point after 20 seconds
Genetics code is atriplet code-redundant code : What is meant by the following statements: The genetics code is atriplet code, redundant code, unambiguous code, and universalcode?
Calculate at what point does the other person lift : Two people are carrying a uniform wooden board that is 3.00 m long and weights 160 N. at what point does the other person lift
Create a comprehensive security policy for the company : Demonstrate an understanding of existing and emerging information technologies and strategic impact on organizational operations and evaluate the issues and challenges associated with information technology integration.
Testes could not producetestosterone : Developmentally speaking, what would you predictwould happen to a male human fetus whose testes could not producetestosterone?
Evaluate the partition coefficient of benzoic acid : When 200 ml of an aqueous benzoic acid solution were extracted with 30 ml of ethyl acetate, 45% of the benzoic acid were extracted. Calculate the partition coefficient of benzoic acid
Find what was the tires angular acceleration : Your car tire is rotating at 3.3 rev/s when suddenly you press down hard on the accelerator. What was the tire's angular acceleration
General property of minerals-significantamount of calcium : Which of the following is a general property of the minerals? Which of the following is not a known side effect of having insufficient fat stores? Which of the following sweeteners contains a significantamount of calcium? What two major nutrients are..

Reviews

Write a Review

 

Basic Computer Science Questions & Answers

  Type of distribution students like to see to earn good grade

What type of distribution would the students like to see in order to be most likely to earn a good grade? Explain your answers.

  Imagine you are an entrepreneur starting a new business

1. assess the challenges e-business and e-commerce technologies present to the field of information technology.

  Framing rules work if stuffing rule to stuff zero changes

Will framing rules work if we change stuffing rule to stuff a zero only after 6 consecutive ones? Describe. Will protocol work if we change stuffing rule to stuff 0 only after a zero followed by 5 consecutive ones? Describe.

  The execution of the preceding two processes

Show all the possible interleaving of the execution of the preceding two processes.

  Explain how backups are taken using microsoft access

Explain how backups are taken using Microsoft Access. What are the issues that must be considered before starting the backup? When an Access database is restored from backup, what issues need to be considered regarding the data?

  Interactive java program that asks a user for some interest

Create an interactive Java program that asks a user for some text of interest and then displays the first email address found in that text. (This is the basis for one of the programs that spammers use to mine text, such as email messages, Web pages, ..

  What do the terms syntactic sugar and syntactic salt mean

What do the terms "syntactic sugar" and "syntactic salt" mean? From your knowledge of the C# programming language, list at least five syntactic sugar and salt features.

  The progress report you will describe

The progress report you will describe your progress and analysis of the unfinished solution. At this time you should be able to take stock of your skills and abilities and match them against the project requirements.

  Write a program that asks the user for names of two files

write a program that asks the user for the names of two files. the first file should be opened for reading and the second file should be opened for writing . the program should read the contents of the first file, change all characters to uppercas..

  Write down the body of method for header

Write down the body of method for the following header. Method must return the welcome message which includes the user's name and visitor number.

  Use a cluster to provide fault-tolerant computing

Describe the trade-offs between your solution and a single multiprocessor-based computer system solution.

  Perform a web search on it outsourcing and their result

Perform a web search on IT outsourcing and review the results. Select any two IT outsourcing companies and analyze their services, clients, and capabilities.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd