Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Project Deliverable : Infrastructure and Security

Project Deliverable is a two-part deliverable using MS Word and MS Visio, or their open source equivalents. You are the Chief Security Officer (CSO) of a law office that occupies four (4) floors of a high-rise building in downtown Washington, D.C.

There are approximately 50 PCs on the first floor, 150 PCs on the second floor, and 40 PCs on both the third and fourth floors. The servers for each department reside on their respective floors.

The director of the accounting department has expressed concerns about the security of his files. For this assignment, you will explain the key functions of a cyber-security policy catalog.

Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.

Submission Requirements

Document (MS Word)

Microsoft Visio Plan (MS Visio)

Section 1

Write a three to four (3-4) page deliverable in which you:

Explain the major cyber governance issues in an organization and, because of those issues, examine how organizations develop communication protocols.

Describe the security issues found on a network, and arrange them from highest to lowest, mapping out security loopholes to justify your answer.

Differentiate between intellectual property theft and cyber espionage. Determine how you, as the CSO of an organization, would deal with both cases and what standard operating procedures you would follow.

Section 2

4. Using Microsoft Visio, or an open source alternative such as Dia, illustrate the flow of data for both input and output information in an infrastructure. The diagram must map any issues in terms of a cyber-infrastructure.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.

Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Discuss the threats of modern technology in the workplace.

Discuss how policies play an important role in techniques adopted for cybersecurity.

Discuss the various issues related to cyber governance, cyber users, cyber management, and cyber infrastructure.

Use technology and information resources to research issues in information assurance.

Write clearly and concisely about information assurance topics using proper writing mechanics and technical style conventions.

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M93068389
  • Price:- $50

Priced at Now at $50, Verified Solution

Have any Question?


Related Questions in Management Information System

Assignment wireless technologythere are a number of

Assignment : Wireless Technology There are a number of cellular phone companies each serving their own unique geographical areas. Likewise, they each may use a different technology to transfer communication. Research the ...

Please find a total of 4 websites that are related to

Please find a total of 4 websites that are related to modeling policy with simulations. These can be and include eGovPoliNet and others that have been mentioned in the papers, readings or videos. They can be community ba ...

Your company is a dynamic organization that depends on

Your company is a dynamic organization that depends on using standard project management techniques as prescribed by PMBOK in managing series of projects to keep its IT infrastructure in alignment with its business goals ...

Read nist cybersecurity framework aims to improve critical

Read "NIST Cybersecurity Framework Aims to Improve Critical Infrastructure," by Mustard, from Power (2014). Read "Mapping to the NIST Cybersecurity Framework," by Durbin, from CIO Insight (2014). Briefly define enterpris ...

Write a 2- to 3-page paper evaluating the business

Write a 2- to 3-page paper evaluating the business operations and network design of your current organization or a previous employer. Include the following: What does the company do? Who are the customers? Types of emplo ...

Please respond to student 150-250 words do you agree or

Please respond to student 150-250 words ...do you agree or disagree One of the concepts that were interesting to me was the idea of bulletproof hosting that was mentioned in the Video "The Most Dangerous Town on the Inte ...

Assignment standards researchthe following website may be

Assignment : Standards Research The following website may be used for reference to complete this assignment. The website represents an electronic document titled "Standards Organizations," written by William Stallings (2 ...

Problem i answer each piece in 75-150 words with reference

Problem I (Answer each piece in 75-150 words with reference but do not quote) What is data mining? In your answer, address the following: - Is it another fad? - Out of the three pre-requisite data science skills (databas ...

In a three-page well-written page answer the following

In a three-page, well-written page answer the following question: You all work in or know of people who work in enterprise IT environments Maintaining the enterprise security posture, legal risk, and security is constant ...

Answer all the following 1 your organization has

Answer all the following : 1. Your organization has approximately 10TB of data, and you need to decide if your organization should have onsite or offsite tape storage. 2. You organization must easily be able to recover d ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As