Determine the best e-mail policy for an organization

Assignment Help Basic Computer Science
Reference no: EM13998108

In this assignment, you will write a paper in which you create a network security plan for a small business.

Tasks:

You are an IT manager for a small business. You are being asked to create a network security plan both for internal IT workers and for the company in general.

You are to put together a network security plan that addresses each of the following components:

  • Create a standard procedure for adding new users to a network.
  • Explain the use of virtual private networks (VPNs) and their security benefits and drawbacks.
  • Create a summary of a network plan, including the use of a firewall, written for a business person with limited knowledge of IT.
  • Document the uses of an intrusion detection system.
  • Identify and explain whether workers should be required to report potential security violations and create a policy based on your viewpoints.
  • Determine the best e-mail policy for an organization and document it for a business owner.
  • Create a password-change policy for a networking group.
  • Provide an executive summary briefing for a non-IT manager to review the business implications for the IT policies that you are recommending.

Submission Details:

  • By Monday, March 14, 2016, prepare a 7- to 9-page report. Write in a clear, concise, and organized manner; demonstrate ethical scholarship in accurate representation and attribution of sources (i.e., use APA format); and display accurate spelling, grammar, and punctuation.
  • Save your document in a Microsoft Word document with the name M5_A1_LastName_FirstIinitial.doc, and upload it to the M5 Assignment 1 LASA 2 Dropbox.

LASA 2 Grading Criteria and Rubric

All LASAs in this course will be graded using a rubric. This assignment is worth 300 points. Download the rubric and carefully read it to understand the expectations.

Assignment 1 Grading Criteria Maximum Points
Explained the use of VPNs and their security benefits and drawbacks. 32
Created a standard procedure for adding new users to a network. 36
Created a summary of a network plan, including the use of a firewall, written for a business person with limited knowledge of IT. 36
Documented the uses of an intrusion detection system. 40
Identified and explained whether workers should be required to report potential security violations and created a policy based on your viewpoints. 36
Determined the best e-mail policy for an organization and document it for a business owner. 28
Created a password-change policy for a networking group. 28
Writing Components:
  • Organization (16)
  • Usage and Mechanics (16)
  • APA Elements (24)
  • Style (8)
64
Total: 300

Reference no: EM13998108

Questions Cloud

What is the half-life of the radium nuclei : A sample is being analyzed 5800 years after undergoing an alpha decay process. As the technician is analyzing, he observes the sample contains only 8.5% of the radium nuclei it initially contained. What is the half-life of the radium nuclei?
How can managers promote sound leadership : How can managers promote sound leadership practices and good ethical behavior?  Why are they important and how do you promote an environment where they thrive?
Calculate number of collisions per second for a given atom : In a sample of Ar gas at 24 oC and 5.00 bar, calculate the number of collisions per second for a given atom. The diameter of an atom of Ar is 194 pm.
A programmer at a bank realized : A programmer at a bank realized that he had accidentally overdrawn his checking account.  He made a small adjustment in the bank's accounting system so that his account would not have the additional service charge assessed.  As soon as he deposited f..
Determine the best e-mail policy for an organization : Explain the use of virtual private networks (VPNs) and their security benefits and drawbacks.
What is the efficiency of the cycle : From A to B, the pressure increases from 1 atmosphere to PB=3.06 atmospheres and the process is adiabatic; from B to C, it is isobaric with 335.16 kJ of energy entering the system by heat. From C to D, the process is isothermal; from D to A, it is..
When choosing a store or business : When choosing a store or business, select a medium or large operation as it will be easier to complete the assignment. Look at the information the store or business uses in their daily business operations and identity four (4) key security risks to t..
Computer security is not an issue for organizations alone : Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack. Identify all the potential security threats on a personal computer. Identify some of..
What is the equivalent resistance of the bulbs connected : What is the equivalent resistance of the bulbs connected in parallel? What peak current Imax will be supplied to the parallel combination by the 120-V rms source?

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Differences and similarities between windows 7and windows 8.

Complete steps that cover the differences and similarities between Windows 7and Windows 8.1. In your APA formatted Paper answer the questions below.1. Discuss three differences and three similarities in the configuration of a Windows 7 for a h..

  Create the following for bet charts

The Banking e-Teller system allows bank customers to perform ATM transactions from their cell or smart phones. BET will allow customers to check balances, make remote photo capture check deposits, and perform balance transfers to their checking or..

  Determining the comparison-based algorithms

a. Give an O(N log G) algorithm to solve this problem. b. Prove an 0.(N log G) lower bound to solve this problem using comparison-based algorithms.

  Write java method takes integer array and fills the array

Write a Java method which takes an integer array parameter and fills the array with random numbers between 1 and 1000, including 1 and 1000.

  Relative advantages and disadvantages of these 3 approches

How would you ensure that a web page can be understood by viewers using different browsers which may not be able to interpret all content?

  In the early days of information systems

In the early days of information systems, the IT department controlled all of the components of the system from data retrieval to processing to reporting. Today, the IT department is being directed to do the same tasks, but uses devices that are mobi..

  Define a class called fraction

Define a class called Fraction

  Competence in conceptual database design of database models

competence in conceptual database design of database models

  Design and implement your own simple class to represent

Design and implement your own simple class to represent any household item of your choice (toaster, fan, hair dryer, piano ...) Your class should have a constructor, one additional method and at least one member variable

  Demonstrate criteria of a good design and good navigation

Good Design - This second web site should demonstrate our criteria of a good design and good navigation. Prepare a self-assessment document to post to the dropbox that addresses the following

  Consider an online reservation system for a restaurants

consider an online reservation system for a restaurants patrons. analyze the type of vulnerabilities and threats that

  Find a simplified expression for function

find a simplified expression for F = A?BC?D + A?B?D + A?CD + ABD + ABC - Assuming that the inputs ABCD = 0101, BCD = 1001, ABCD = 1011 never occur,

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd