Discuss each component from list and specific information

Assignment Help Computer Engineering
Reference no: EM133515192

Project Homework: Security Policy Implementation

Overview

For this homework, review information assurance policy templates via the SANS policy template site and select a template of your choice, to be used as a GUIDE ONLY. You can find this through Security Policy Templates found under Project: Security Policy Implementation Resources located on the Project: Security Policy Implementation Homework page. DO NOT format your paper in this outline format! You can look at the General / Acceptable Encryption Policy to download either the doc or pdf file, but this is NOT how you will format your paper. Utilize the downloaded template, from the SANS Policy website, and the Project Grading Rubric as a guide. However, you must still conform to the APA style of writing. I.E. DO NOT uses the 4.1.1 outline style in your paper. You must use paragraph style and provide a 5-page write-up, highlighting key components that should be included during the development of an information assurance policy. These are your mandatory Level One headers:

1) Overview
2) Purpose
3) Scope
4) Policy Compliance
5) Related Standards
6) Definitions
7) Terms

Instructions

Discuss each component from the above list and the specific information that can be included within each section of the policy. You will need at least 3 sentences under each Level One header. Support your paper with a minimum of five peer-review resources. In addition to these specified resources, other appropriate scholarly resources, including older articles, may be included. You are free to use as many other references as needed, as long as you have five peer-review sources properly included. Remember "scholarly articles" are the same as peer-review articles. Books, web sites, and blogs are not peer-review. Peer-review means a journal article that has been vetted by your peers. Books are allowed; however, they do not count as a peer-review article.

Length: 5 pages.

Your paper should demonstrate thoughtful consideration of the ideas and concepts that are presented in the course and provide new thoughts and insights relating directly to this topic. Your response should reflect scholarly writing and current APA standards.Only one set of bullet points is allowed in this paper. The bullet points can be only for your ‘Related Terms' section. No other bullet points/number points will be allowed. You must learn to phrase in sentence format.

Follow the Project: Security Policy Implementation Example. Ask your professor if there are example papers from past courses for you to review for ideas. Keep in mind that you will not have an Article Reference header at the top of the paper, but you will have a references section at the end.

Be sure to have a title page with Running head, and do not use a real company or organization name, make one up.

The purpose of this paper is to develop an information assurance policy. It should read like real guidance; you would deliver to your future or present company someday. The citations should be used to give clarity or credibility to a statement you are making. Do not just cite something because you saw them say it that way or format their paper that way. Make a statement, then back it up with a citation from a scholarly source. Be sure to cover all that is described in the instructions for the homework. It may be helpful to search the Jerry Falwell Library for scholarly sources that describe what is in an"Information Assurance Policy", or "Information Security Plan" or "Information Security Policy."

You might also want to search in the library for "Information Assurance Policy "and "Security Plan" and look for relevant examples, but be careful to not copy/paste, cite all borrowed ideas and use scholarly sources for at least 5 of those citations.

Reference no: EM133515192

Questions Cloud

Discuss a time when you had a single story about something : Discuss a time when you had a Single Story about something / someone and how this viewpoint wasexpanded. If you don't have your own story
Evaluate the telecommunication and network practices : Evaluate the telecommunication and network practices that were in place and describe what contributed to the security breach including vulnerability exploited.
Effect behind the issue of imidacloprid in apis mellifiera : What is the significance or effect behind the issue of Imidacloprid in Apis mellifiera?
Which you will pursue and fulfill this promise : deepest levels of scholarship in order to bring about meaningful social change for students with exceptionalities. As a part of this promise
Discuss each component from list and specific information : Discuss each component from the above list and the specific information that can be included within each section of the policy.
What role do they play in relating to teachers : what are the roles of the reading specialists and literacy coaches in the schools? What role do they play in relating to teachers, other professionals
Difference between a food chain and a food web : Draw a diagram of a simple food web with three trophic levels and describe the difference between a food chain and a food web.
Define species diversity : Explain how ecologists define species diversity. What data must be collected to determine the diversity of a community?
What is the contaminants source : Why is the contaminant an issue to the environment and/or human health and how does it affect humans and/or organisms?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd