Reference no: EM132243290
Assignment
Assume you have just accepted the position as CIO for a small but growing firm and are tasked with developing a plan for your organizations' existing telecommunication structures and computer networks.
The organization needs to protect the valuable information it has but be flexible enough to accommodate employees as they go about executing their jobs and getting business done. It needs to address security aspects such as remote data access, enterprise mobility, and internal communications such as email.
In a minimum five page APA formatted paper (excluding title and reference pages) using the lecture, supplemental resources, and your research, discuss the following elements.
Illustrate the general architecture (centralized or distributed) to support the goals of the organization.
Using information from the course and your research, develop an outline of your security policy and plans that address the areas identified such as remote data access, smartphone access, and internal communications. Be as specific as possible.
Examine and compare the security policy differences between users who work remotely to users who work on-site in a traditional office environment.
Evaluate the elements critical for a successful implementation of such communication systems. Are they more technical such as hardware, software, network infrastructure, security, and cloud computing or more managerial such as project management, change management, logistics, and user involvement? Your list can be different from the list above. Provide the reasons for your arguments.
Include a minimum of five resources, one of which may be the textbook. Of these sources, three must be from the Ashford Library or IT industry standard periodicals.
The Final Paper: Computer Network
Must be five to eight double-spaced pages in length (not including title and references pages) and formatted according to APA style as outlined in the Ashford Writing Center.
Must include a separate title page with the following:
Title of paper
Student's name
Course name and number
Instructor's name
Date submitted
Must use at least five scholarly, peer reviewed, and other credible sources in addition to the course text.
The Scholarly, Peer Reviewed, and Other Credible Sources table offers additional guidance on appropriate source types.
If you have questions about whether a specific source is appropriate for this assignment, please contact your instructor. Your instructor has the final say about the appropriateness of a specific source for a particular assignment.
Must document all sources in APA style as outlined in the Ashford Writing Center.
Must include a separate references page that is formatted according to APA style as outlined in the Ashford Writing Center.
Describe with examples symmetric encryption
: Describe with examples, symmetric encryption. Describe with examples asymmetric encryption.
|
How do the teams manage their team boundaries
: What are the trade-offs between internal cohesion and external ties within each type of team?
|
How can we use hash functions in real-life
: Describe in detail and with examples, how hash functions work and what they are used for? How can we use hash functions in real-life?
|
What are the total budgeted costs for each activity
: For the month, the division expects to make 11,000 deliveries to deliver 1,100,000 cartons to customers. What are the total budgeted costs for each activity
|
Illustrate the general architecture
: Examine and compare the security policy differences between users who work remotely to users who work on-site in a traditional office environment.
|
Should every threat be planned for
: In regards to information security, discuss how threat identification should be performed within your organization or university.
|
Determining the weighted graph
: Give a linear time (O(|E| + |V|)) algorithm to decide if an input edge e = (u, v) in E with weight c(e) is part of some MST of G or not.
|
What is machine learning
: Select one of the following research areas: Cloud Computing (Intranet, Extranet, and Internet), Machine Learning, Artificial Intelligence.
|
Forgotten password functionality
: How would you suggest using forgotten Password functionality in a secured manner? Illustrate with 2 real world safe practices.
|