Create a comprehensive security policy for the company

Assignment Help Management Information Sys
Reference no: EM132240330

Assignment

This assignment consists of two (2) sections: an infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment for which it is written. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

The last section of the project plan will present the infrastructure in accordance with the parameters set forth at the outset of the project. The network solution that is chosen should support the conceived information system and allow for scalability.

The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. In addition, access paths for Internet access should be depicted. A narrative should be included to explain all the nodes of the network and the rationale for the design.

Lastly, using the Confidentiality, Integrity and Availability (CIA) Triangle, define the organizational security policy. CIA is a widely used benchmark for evaluation of information systems security.

Section 1: Infrastructure Document

1. Write a five to ten (5-10) page infrastructure document in which you:

a. Design a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.

b. Illustrate the possible placement of servers including access paths to the Internet and firewalls. Note: Facility limitations, workstations, printers, routers, switches, bridges and access points should be considered in the illustration.

c. Explain the rationale for the logical and physical topographical layout of the planned network.

d. Create a comprehensive security policy for the company that will:

i. Protect the company infrastructure and assets by applying the principals of CIA. Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three core goals of confidentiality, integrity and availability of information.

ii. Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.

Your assignment must follow these formatting requirements:

This course requires use of Strayer Writing Standards (SWS). The format is different than other Strayer University courses. Please take a moment to review the SWS documentation for details.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

Include charts or diagrams created in MS Visio or Dia as an appendix of the infrastructure document. All references to these diagrams must be included in the body of the infrastructure document.

Section 2: Revised Gantt Chart / Project Plan

Use Microsoft Project or an open source alternative, such as Open Project, to:

2. Update the Gantt chart or project plan (summary and detail) template, from Project Deliverable 3: Database and Programming Design, with all the project tasks.

The specific course learning outcomes associated with this assignment are:

Demonstrate an understanding of existing and emerging information technologies and strategic impact on organizational operations.

Evaluate the issues and challenges associated with information technology integration.

Evaluate the ethical concerns that information technology solve or present in a global context.

Use technology and information resources to research issues in information technology.

Write clearly and concisely about strategic issues and practices in the information technology domain using proper writing mechanics and technical style conventions.

Reference no: EM132240330

Questions Cloud

Examine two advantages of hardware vpns : Examine and explain the two advantages and two disadvantages for three types of protocols used in VPNs.
Write the value of the expression and the type : What is your average time per mile? What is your average speed in miles per hour?
Identify the main functions of your proposed information : Identify the main functions of your proposed information system and why they are important to the business.
Discuss the importance of user technology security education : Discuss the importance of user technology security education within organizations.
Create a comprehensive security policy for the company : Illustrate the possible placement of servers including access paths to the Internet and firewalls.
Research the different mss processes currently used : The CEO of the company would like to incorporate a management support system (MSS) into the organization to help in making business decisions.
Write a critical evaluation of the article : ISOL536-Write a critical evaluation of the article; make sure to include three to five key points that you thought were important.
What are your strenghts and weakness : AS an individual, what are your strenghts and weakness and how will they impact you as a PHD students?
Debate about the ending of capital punishment : Analyst staff at the Texas Department of Criminal Justice reporting to senior management about aspects of their operations.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Create an annotated bibliography with all of your articles

For this assignment, locate and read seven scholarly articles on a topic of interest in Information Systems. Next, create an annotated bibliography with all of your articles. Annotated bibliographies contain an alphabetical list of your references..

  Explain about metropolitan power supply

Show the arguments for and against the auditors insisting that MPS begin expensing some portion of the construction costs rather than continuing to accumulate an ever-increasing asset. Indicate the position you would take as the auditor.

  Is this a valid confession made by mayo

What will the court look at to determine if this confession will be admitted into evidence at trial?

  How you would construct at least two different networks

Specify the nodes, edges, directed or undirected, weighted or unweighted, and if there are direction/weights what does the direction or weight indicate?

  Csr and competitive advantage

This solution shows if a correlation between corporate social responsibility and a competitive advantage exists.

  Develop a presentation using visuals of the data

For this project you are going to become an educational advisor for a fictional educational institution.

  Develop a compensation and benefits package

Utilizing Compensation and Benefits , develop a compensation and benefits package that you would like to be offered from your organization.

  What is the difference between iaas and paas

Which cloud computing model allows the client to run software without purchasing servers, data center space, or network equipment?

  Find the maximum value in the designated column

Calculate the sum of the elements in that row, and output it with a label, for the user to see (2) Get user input of a column index (0 to 7).

  Develop an addressing and naming model in an environment

Discuss how you would develop an addressing and naming model in an environment that has 10 departments in a 1000 employee organization.

  List five ways to strongly authenticate a remote machine

List three distinct technologies for protecting files from tampering, and justify your answers.

  What other ways are there to address the threat

What other ways are there to address the threat?What do you think would be the most effective way to address this threat?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd