Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Computer Engineering Expert

Preparation: Choose a real or hypothetical organization, corporation (profit or non-profit), or institution that uses IT in its products, services, activities, and/or operations. If you work in an organization or field that could benefit from an information network security policy, you might wish to apply the project to it.

Assignment: Prepare a well-written security policy proposal for your organization that utilizes the concepts learned in the course as a basis for your analysis and policy.

Make sure that your proposal includes the basic elements of a good security policy including:

1. Introduction describing your organization and its mission, products/services, technical resources, and technical strategy
2. Analysis of the organization's relationships to its clients/customers, staff, management, and owners or other stakeholders
3. A vulnerability assessment
4. Your recommendation, including:
5. a. Proposed remedial measures (as appropriate to the situation; these might include firewall/gateway provisions, authentication and authorization, encryption systems, intrusion detection, virus detection, incident reporting, education/training, etc.
6. b. Proposed code of ethics or code of practice to be applied within the organization
7. c. Legal/compliance requirements and description of how they will be met
8. d. Proposed security policy statement/summary

Important: Your proposal must justify every element in ethical and legal terms. In other words, you need to state why each policy/code element (including technical elements) is good for business and why it is good/sound ethical policy (i.e., how it is good for the organization and why it is good for customers, users, or employees, or the public). Also identify any ethical/legal tensions, conflicts, and/or contradictions and justify any trade-offs being made in the recommendation.

Discuss and cite at least three credible or scholarly sources other than the course textbooks (which can be cited as well) to support your analysis and policy choices. The CSU-Global Library is a good place to find credible and scholarly sources. Your paper should be 8-10 pages long with document and citation formatting per CSU-Global Guide to Writing and APA Requirements.

Recommendation: It is recommended that students review Chapter 8 in the course textbook, which is required reading for Module 6, early in the term and apply the knowledge therein to planning and drafting the Portfolio Project. In Chapters, 8, 10, and 12, Kizza (2014) discussed the role of a security policy in the compliance of an organization. He observed that in response to public outcry in the 1990s, governments went on a binge passing laws to regulate the new Internet. But privacy advocates pushed back and by the early 2000s, the result of much politicking was a mixed system of sectoral laws (dealing with specific situations) and largely voluntary norms. These norms were adopted by organizations and enshrined in security and privacy policies regarding data and networking. Kizza (2014) made the point that, "A good, balanced and unified approach to information security compliance consists of a good security policy that effectively balances and enforces core information security and compliance elements" (p. 199).

Incremental Deliverable due by 11:59 PM on Sunday of Week 2

Submit a brief description of the "real or hypothetical organization, corporation (profit or non-profit), or institution that uses IT in its product, activities, or operations" that will serve as the scenario for your Portfolio Project. If you work or have worked for an organization could benefit from an information network security policy, consider using your place of employment as the scenario for your project.

Your description should be at least a paragraph and no more than a page in length.

Computer Engineering, Engineering

  • Category:- Computer Engineering
  • Reference No.:- M92532039
  • Price:- $10

Priced at Now at $10, Verified Solution

Have any Question?


Related Questions in Computer Engineering

Do a search for how to write a for-loop in r practice some

Do a search for how to write a for-loop in R. Practice some simple examples from the internet. Then use a for-loop to calculate the alternating sum of the first 100,000 digits of pi. That is, calculate the sum 3 - 1 + 4 ...

7 years ago crane corporation issued 20-year bonds that had

7 years ago Crane Corporation issued 20-year bonds that had a $1,000 face value, paid interest annually, and had a coupon rate of 7 percent. If the market rate of interest is 5.5 percent today, what is the current market ...

Sectools - top 125 network security toolssnort websitenmap

SecTools - Top 125 Network Security Tools SNORT website Nmap website Lynx website (for a text browser) Wget website Teleport Pro website Research one of the tools listed in the chapter or linked above. Discuss its releva ...

Describe how to discover cookies on web browsers what is a

Describe how to discover cookies on web browsers. What is a reverse DNS lookup and can it be used when attacking the network.

Sunland industries has a three-year bond outstanding that

Sunland Industries has a three-year bond outstanding that pays a 7.80 percent coupon rate and is currently priced at $938.80. What is the yield to maturity of this bond? Assume annual coupon payments.  (Round answer to 2 ...

Question a signal was acquired at 200 hz and the spectrum

Question : A signal was acquired at 200 Hz and the spectrum showed a peak at 80 Hz. No anti- Max pts aliasing filter was used. Use the folding diagram to find the lowest 5 possible frequencies that the original signal ma ...

Sub classassume super class and methods defined in question

Sub Class Assume Super Class and methods defined in question VIII Assume a Sub class named RunSomeSuper Write the Begin method Construct an instance of SomeSuper with parms of your choosing Just the Begin method, not the ...

Research one job and company that interests you one that

Research one job and company that interests you, one that you think might be a good fit for you after graduation. i.Identify why that job and company is a good fit for you Prepare a cover letter for that job. i.Include y ...

Mary kate is a project manager in the it department for a

Mary Kate is a project manager in the IT department for a university. She has been asked to manage a project to create faculty intranet. The university has multiple campuses in various locations, and professors and other ...

I am studying java for the first time and i am using a

I am studying java for the first time and I am using a program called Eclipse to build my programs. I am working with arrays and I am tasked with the following: Create a method that restores an image in which each pixel ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As