Ask Question, Ask an Expert

+61-413 786 465

info@mywordsolution.com

Ask Management Information System Expert

Requirements

Word document 9-12 pages - Time New Roman 12 Font

Single Space

One-inch margin

All figures & diagrams must be labeled

All Citations & references formatted in accordance with APA 6th edition

Term Project Guidelines

Scenario

You work for a high-tech company with approximately 400 employees.

Your firm recently won a large Department of Defense (DoD) contract, which will add 30% to the revenue of your organization. It is a high-priority, high-visibility project. You will be allowed to make your own budget, project timeline, and tollgate decisions.

This project requires developing the proper DoD security policies required to meet DoD standards for delivery of technology services to the U.S. Air Force Cyber Security Center (AFCSC), a DoD agency.

To do this, you must develop DoD-approved policies and standards for your IT infrastructure (see the "Tasks" section below).

The policies you create must pass DoD-based requirements. Currently, your organization does not have any DoD contracts and thus has no DoD compliant security policies or controls in place.

Your firm's computing environment includes the following:

• 12 servers running Microsoft Server 2008 R2, providing the following:

o Active Directory (AD) o Domain Name System (DNS)

o Dynamic Host Configuration Protocol (DHCP)

o Enterprise Resource Planning (ERP) application (Oracle)

o A Research and Development (R&D) Engineering network segment for testing, separate from the production environment

o Microsoft Exchange Server for e-mail

o Symantec e-mail filter

o Websense for Internet use.

• Two Linux servers running Apache Server to host your Web site

• 390 PCs/laptops running Microsoft Windows 7, Microsoft Office 2007, Microsoft Visio, Microsoft Project, and Adobe Reader.

Tasks

• Create policies that are DoD compliant for the organization's IT infrastructure.

• Develop a list of compliance laws required for DoD contracts.

• List controls placed on domains in the IT infrastructure.

• List required standards for all devices, categorized by IT domain.

• Develop a deployment plan for implementation of these polices, standards, and controls.

• List all applicable DoD frameworks in the final delivery document.

• Write a professional report that includes all of the above content-related items

Internet Sites

DoD instructions or directives

Department of Defense Information Assurance Certification and Accreditation Process (DIACAP) Instruction-DoDI 8510.01

Department of Defense Information Security Program

Department of Defense Internet Services and Internet-Based Capabilities

Department of Defense Proposes New Information Security Requirements for Contractors

Management Information System, Management Studies

  • Category:- Management Information System
  • Reference No.:- M92860256

Have any Question?


Related Questions in Management Information System

Software engineeringsuppose you are writing software for a

Software Engineering: Suppose you are writing software for a radio station that manages its playlists. The program will generate candidate playlists from a record library automatically and station personnel can then chec ...

Descriptionrefer to this resource when completing the its

Description: Refer to this resource when completing the It's All About the HAT assignment. In this assignment, students will learn to use and identify tools that may be helpful in their navigation of security related eve ...

Instructions develop a policy paper based on the scenario

INSTRUCTIONS: Develop a policy paper based on the scenario presented below. The product should be a minimum of 5 and a maximum of 12 pages (excluding cover page, appendices, charts, and references), double spaced,conform ...

Answer the following question what are the basic reasons

Answer the following Question : What are the basic reasons that people resist change? How can this resistance be overcome? Write 300 Words. Include in-text citations and references in APA style formatting. Must have two ...

Part a the university would like to encourage students to

Part A: The university would like to encourage students to pick up their tickets at the will call window to reduce mail costs. Revise the website program to reflect the following changes: Ask the student how many events ...

1 write a report at least 400 words on how to use data

1. Write a report (at least 400 words) on how to use data mining to help marketing managers specifically. Give a title to your report an interesting title to reflect the theme(s) of your report. You must use a specific b ...

Recently a terminated employee used his mobile device to

Recently, a terminated employee used his mobile device to log in to the company network and steal sensitive data. As the manager of the information technology (IT) security department, you were asked by your boss to pres ...

Question onea identify six major components of a computer

QUESTION ONE a) Identify six major components of a computer system. b) Describe the following with reference to systems development. 1. Structured analysis 2. Structured design c) The current trend in database systems de ...

Discussion1 adapting best practices for specific solutions

Discussion 1. "Adapting Best Practices for Specific Solutions" Please respond to the following: • Interpret how context, scope, and feasibility influence the development of a security process, and provide an example of a ...

Question research the fire at the federal aviation

Question : Research the fire at the Federal Aviation Administration (FAA) facility in Chicago, Illinois (2014). Provide insight into the following: What went wrong? What went right? Would a risk assessment strategy if em ...

  • 4,153,160 Questions Asked
  • 13,132 Experts
  • 2,558,936 Questions Answered

Ask Experts for help!!

Looking for Assignment Help?

Start excelling in your Courses, Get help with Assignment

Write us your full requirement for evaluation and you will receive response within 20 minutes turnaround time.

Ask Now Help with Problems, Get a Best Answer

Why might a bank avoid the use of interest rate swaps even

Why might a bank avoid the use of interest rate swaps, even when the institution is exposed to significant interest rate

Describe the difference between zero coupon bonds and

Describe the difference between zero coupon bonds and coupon bonds. Under what conditions will a coupon bond sell at a p

Compute the present value of an annuity of 880 per year

Compute the present value of an annuity of $ 880 per year for 16 years, given a discount rate of 6 percent per annum. As

Compute the present value of an 1150 payment made in ten

Compute the present value of an $1,150 payment made in ten years when the discount rate is 12 percent. (Do not round int

Compute the present value of an annuity of 699 per year

Compute the present value of an annuity of $ 699 per year for 19 years, given a discount rate of 6 percent per annum. As