Create a comprehensive security policy for the company

Assignment Help Basic Computer Science
Reference no: EM13531444

An infrastructure document and a revised Gantt chart or project plan. You must submit both sections as separate files for the completion of this assignment. Label each file name according to the section of the assignment for which it is written. Additionally, you may create and / or assume all necessary assumptions needed for the completion of this assignment.

The last section of the project plan will present the infrastructure in accordance with the parameters set forth at the outset of the project. The network solution that is chosen should support the conceived information system and allow for scalability. The network infrastructure will support organizational operations; therefore, a pictorial view of workstations, servers, routers, bridges, gateways, and access points should be used. In addition, access paths for Internet access should be depicted. A narrative should be included to explain all the nodes of the network and the rationale for the design. Lastly, using the Confidentiality, Integrity and Availability (CIA) Triangle, define the organizational security policy. CIA is a widely used benchmark for evaluation of information systems security.

Infrastructure Document

1. Write a five to ten (5-10) page infrastructure document in which you:

a. Design a logical and physical topographical layout of the planned network through the use of graphical tools in Microsoft Word or Visio, or an open source alternative such as Dia. Note: The graphically depicted solution is not included in the required page length.

b. Illustrate the possible placement of servers including access paths to the Internet and firewalls. Note: Facility limitations, workstations, printers, routers, switches, bridges and access points should be considered in the illustration.

c. Explain the rationale for the logical and physical topographical layout of the planned network.

d. Create a comprehensive security policy for the company that will:

i. Protect the company infrastructure and assets by applying the principals of CIA. Note: CIA is a widely used benchmark for evaluation of information systems security, focusing on the three core goals of confidentiality, integrity and availability of information.

ii. Address ethical aspects related to employee behavior, contractors, password usage, and access to networked resources and information.

Revised Gantt Chart / Project Plan

Use Microsoft Project or an open source alternative, such as Open Project, to:

2. Update the Gantt chart or project plan (summary and detail) template, from Project Deliverable 3: Database and Programming Design, with all the project tasks.

The specific course learning outcomes associated with this assignment are:

Demonstrate an understanding of existing and emerging information technologies and strategic impact on organizational operations.

Evaluate the issues and challenges associated with information technology integration.

Evaluate the ethical concerns that information technology solve or present in a global context.

Use technology and information resources to research issues in information technology.

Write clearly and concisely about strategic issues and practices in the information technology domain using proper writing mechanics and technical style conventions.

Reference no: EM13531444

Questions Cloud

Explain extracted methylene chloride : How many Mg of catfish would be obtained if the same aqueous solution is extracted once with 60 ml of methylene chloride. Come pare the two results . In both experiments we use the same amount of organic solvent. However do we isolate the same amo..
How far will the ball have rolled from its starting point : When rolling a ball down an inclined plane, the ball rolls 1 cubit in ten seconds. How far will the ball have rolled from its starting point after 20 seconds
Genetics code is atriplet code-redundant code : What is meant by the following statements: The genetics code is atriplet code, redundant code, unambiguous code, and universalcode?
Calculate at what point does the other person lift : Two people are carrying a uniform wooden board that is 3.00 m long and weights 160 N. at what point does the other person lift
Create a comprehensive security policy for the company : Demonstrate an understanding of existing and emerging information technologies and strategic impact on organizational operations and evaluate the issues and challenges associated with information technology integration.
Testes could not producetestosterone : Developmentally speaking, what would you predictwould happen to a male human fetus whose testes could not producetestosterone?
Evaluate the partition coefficient of benzoic acid : When 200 ml of an aqueous benzoic acid solution were extracted with 30 ml of ethyl acetate, 45% of the benzoic acid were extracted. Calculate the partition coefficient of benzoic acid
Find what was the tires angular acceleration : Your car tire is rotating at 3.3 rev/s when suddenly you press down hard on the accelerator. What was the tire's angular acceleration
General property of minerals-significantamount of calcium : Which of the following is a general property of the minerals? Which of the following is not a known side effect of having insufficient fat stores? Which of the following sweeteners contains a significantamount of calcium? What two major nutrients are..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  What makes these pairs transitive

What I dont understand is how these pairs are considered transitive. My question is what makes these pairs transitive?

  The centroid and the cluster

Problem 1.  For the following set of points, the initial centroid, and the cutoff distance of 4, do the following operations: 1) find the clusters; 2) update the centroid value; 3) find the distance between the centroid and the cluster, and update th..

  Discuss and share rich and diverse assortment of reference

Discuss and share the rich and diverse assortment of reference sources for the Bourne Again Shell (BASH).

  Assistant author of a publishing company

You are working as the assistant author of a publishing company and are given an opportunity to become the author of a study guide for primary schools.

  Draw an erd to model this situation

The local city youth league needs a database system to help track children that sign up to play soccer. Data needs to be kept on each team and the children that will be playing on each team and their parents.

  Compare the hardware of the two devices

Compare their user interfaces and discuss major advantages and/or disadvantages of one over the other.

  0.4 of students are women and gpa for women

0.4 of students are women and gpa for women has mean of 3 and sd 0.8; Gpa for men has mean of 2.5 and sd of 1.0. a sample size of 100 students which consist 40 women and 60 men.

  Creating report by city and by product to record sales

Create a report by city and another by product, including details of the sales and sub-totals and totals for quantity.

  What is an unbreakable uml diagram

What is an "unbreakable" UML diagram. I have a Java assignment, and it's asking for this requirement, but I have never seen or heard of one. A link where I can see the definition and an example would be awesome. Thanks

  Examine and assess the main computing problems

Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

  Review the literature and examine the strengths and

cloud computing and virtualization are two relatively new technologies which have re-emerged and which are both making

  Linear programming problem using branch and bound

Solve this linear programming problem using Branch and Bound

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd