Develop a security strategy and plan

Assignment Help Computer Engineering
Reference no: EM132117652

Project : Security Strategy and Plan with Recommendation Memo

Instructions

Develop a Security Strategy and Plan ("Plan") and a separate Recommendation Memo ("Memo") addressed to the CIO. The Plan must communicate the security strategy and technologies (minimum of 3) that you are recommending be implemented to address the gaps (P1), requirements (P2), and technology evaluations (P3).

Your Plan must include a brief description for each of the technologies that you are proposing be implemented. You must also include information about associated costs, expected return on investment (ROI), mitigation of risks, barriers to success that apply to each technology.

Your Plan must also include a detailed Network Diagram illustrating how this technology fits into the infrastructure. This diagram must be constructed by you.

You can MS Word's drawing tools, Power Point, or other drawing program. You may use a screen snapshot but, this snapshot must clearly be your own work.

(You may use commercial or "free" clip-art to represent individual end point devices or network appliances such as routers, firewalls, IDPS, etc.) Clip art does not need to be cited provided that it is clip art (not screen captures from another author's work).

Putting It All Together

1. The Recommendation Memo is a one page Executive Memo to the CIO summarizing and introducing the Plan. Use a professional format for your memo (consider using one of the MS Word templates).

2. The Plan (your second deliverable for this assignment) is a 5-8 page document that includes a separate title page, your implementation plan narrative, your network diagram (with caption), and (if necessary) a reference list. Use a professional format for your document.

3. Combine your Memo and your Plan in a single delivery package formatted as an MS Word document (Memo first, plan second, reference list at the end).

Additional Information

1. Consult the grading rubric for specific content and formatting requirements for this assignment.

2. Your 5 - 8 page Plan and Memo package should be professional in appearance with consistent use of fonts, font sizes, margins, etc. You should use headings and page breaks to organize your paper. Your network diagram must have a figure caption beneath it.

3. Your paper should use standard terms and definitions for cybersecurity. See Course Content > Cybersecurity Concepts Review for recommended resources.

4. The CSIA program recommends that you follow standard APA formatting since this will give you a document that meets the "professional appearance" requirements. APA formatting guidelines and examples are found under Course Resources > APA Resources. An APA template file (MS Word format) has also been provided for your use CSIA_Basic_Paper_Template(APA_6ed,Nov2014).docx.

5. You must include a cover page with the assignment title, your name, and the due date. Your reference list must be on a separate page at the end of your file. These pages do not count towards the assignment's page count.

6. You are expected to write grammatically correct English in every assignment that you submit for grading. Do not turn in any work without (a) using spell check, (b) using grammar check, (c) verifying that your punctuation is correct and (d) reviewing your work for correct word usage and correctly structured sentences and paragraphs.

7. You are expected to credit your sources using in-text citations and reference list entries. Both your citations and your reference list entries must follow a consistent citation style (APA, MLA, etc.).

Reference no: EM132117652

Questions Cloud

What is development-economic development : What are the measurement for economic development such as Health,education.Describe different between development and growth?
Explore how it might change a particular industry : ITECH 1100 Understanding the Digital Revolution - Video and Disruption Report Assignment - explore how IT might change a particular industry in the future
Evaluate the proper accounting for transactions : Evaluate the proper accounting for transactions with respect to interim and segment reporting using the accounting codification and other accounting research.
Schedule a daily backup to an external physical storage : Configure backup settings as described below, taking screenshots to demonstrate your knowledge:Schedule a daily backup to an external physical storage device.
Develop a security strategy and plan : Develop a Security Strategy and Plan ("Plan") and a separate Recommendation Memo ("Memo") addressed to the CIO.
Briefly explain the operation of process costing : Briefly explain the operation of process costing, including the way the unit costs of finished goods are determined
Defend your position using economic principles : Should the Federal Reserve System control the nation's money supply? Defend your position using economic principles. The response must be typed.
Write the various aspects of an access control policy : Create a procedure guide that provides clear instructions that anyone with a basic technical knowledge base can follow.
Construct the extensive form : Construct the extensive form (tree diagram) to analyze this game. Label appropriately

Reviews

Write a Review

Computer Engineering Questions & Answers

  What is the function of windows active directory

What is the function of Window's Active Directory? What are the strengths of UNIX? List the reasons for Linux's popularity.

  How multiple interrupts are handled in a system

How multiple interrupts are handled in a system? Distinguish between a process that is in the waiting state and a process in the ready state.

  Create a deposit class for a checkbook

The Deposit class will be able to get a Transaction number, date, description of the transaction, the deposit amount and calculate a new balance.

  Questiongenerate a time class which holds following

questiongenerate a time class which holds following information-hourminutesecondcreate a date class which holds the

  Write an algorithm for encryption using oaep

Write an algorithm for encryption. Write an algorithm for decryption. Write an algorithm for encryption using OAEP. Write algorithm for decryption using OAEP.

  Explain what is the future of databases

What is the future of databases? Try to picture databases in the year 2050, what would they store? How will  they "look and feel"? Please be creative, yet believable.

  Determine the number of comparators needed

Show the schematic diagrams of the cache memory in Problem assuming that the data and tag areas of the cache are built out of 128-byte RAM ICs.

  Write a recursive method string reverse

Write a recursive method String reverse(String text) that reverses a string. For example, reverse(Hello!) returns the string !olleH.

  What are some of the configuration options

The servers will have static IP addresses. What should you install on one of the servers, and what are some of the configuration options?

  How various faults does windows xp have

Research shows that there are about 5 faults per 1000 lines of code in carefully made programs, that means that 1 million lines of codes will have 5000 faults. Windows XP has approximately 45 million lines of code.

  Explain the significance of each word in the acronym url

Explain the significance of each word in the acronym URL. What happens if you leave out the port number in the URL?

  Describe processes of top-down design stepwise refinement

Frank complains that defining functions to use in his programs is a lot of extra work. He says he will finish his programs much more quickly if he just writes them using basic control and operations statements.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd