Infrastructure and Security

 

 

 

Save your time - order a paper!

Get your paper written from scratch within the tight deadline. Our service is a reliable solution to all your troubles. Place an order on any task and we will take care of it. You won’t have to worry about the quality and deadlines

Order Paper Now

This is a two-part deliverable using MS Word and MS Visio, or their open source equivalents. You are the chief security officer (CSO) of a law office that occupies four floors of a high-rise building in downtown Washington, D.C. There are approximately 50 PCs on the first floor, 150 PCs on the second floor, and 40 PCs on both the third and fourth floors. The servers for each department reside on their respective floors. The director of the accounting department has expressed concerns about the security of his files. For this assignment, you will explain the key functions of a cybersecurity policy catalog. Note: You may create or make all necessary assumptions needed for the completion of this assignment.

Submission Requirements
Document (MS Word).
Microsoft Visio Plan (MS Visio).
Section 1
Write a 3–4 page deliverable in which you:

Explain the major cyber governance issues in an organization and examine how organizations develop communication protocols because of those issues.
Describe the security issues found on a network, and arrange them from highest to lowest, mapping out security loopholes to justify your answer.
Differentiate between intellectual property theft and cyber espionage. Determine how you, as the CSO of an organization, would deal with both cases and what standard operating procedures you would follow.
Section 2
Complete the following:

Using Microsoft Visio, or an open source alternative such as Dia, illustrate the flow of data for both input and output information in an infrastructure. The diagram must map any issues in terms of a cyber infrastructure.
Format your assignment according to the following formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcome associated with this assignment is:

Determine the major cyber governance and infrastructure security issues for an organization.
Note: Assignment will be check for plagiarism

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.
EXPLAIN THE MAJOR CYBER GOVERNANCE ISSUES IN AN ORGANIZATION, AND EXAMINE HOW ORGANIZATIONS DEVELOP COMMUNICATION PROTOCOLS BECAUSE OF THOSE ISSUES.–

Levels of Achievement:
UNACCEPTABLE 0 (0.00%) points

NEEDS IMPROVEMENT 10.5 (15.00%) points

COMPETENT 11.9 (17.00%) points

EXEMPLARY 14 (20.00%) points

Describe the security issues found on a network, and arrange them from highest to lowest, mapping out security loopholes to justify your answer.–

Levels of Achievement:
UNACCEPTABLE 0 (0.00%) points

NEEDS IMPROVEMENT 10.5 (15.00%) points

COMPETENT 11.9 (17.00%) points

EXEMPLARY 14 (20.00%) points

Differentiate between intellectual property theft and cyber espionage. Determine how you, as the CSO of an organization, would deal with both cases and what standard operating procedures you would follow.–

Levels of Achievement:
UNACCEPTABLE 0 (0.00%) points

NEEDS IMPROVEMENT 13.125 (18.75%) points

COMPETENT 14.875 (21.25%) points

EXEMPLARY 17.5 (25.00%) points

Using Microsoft Visio, or an open source alternative such as Dia, illustrate the flow of data for both input and output information in an infrastructure. The diagram must map any issues in terms of a cyber infrastructure.–

Levels of Achievement:
UNACCEPTABLE 0 (0.00%) points

NEEDS IMPROVEMENT 13.125 (18.75%) points

COMPETENT 14.875 (21.25%) points

EXEMPLARY 17.5 (25.00%) points

Clarity, writing mechanics, and formatting requirements.–

Levels of Achievement:
UNACCEPTABLE 0 (0.00%) points

NEEDS IMPROVEMENT 5.25 (7.50%) points

COMPETENT 5.95 (8.50%) points

EXEMPLARY 7 (10.00%) points

 

 

 

The post Infrastructure and Security first appeared on COMPLIANT PAPERS.