Infrastructure and Security – Essaylink

Get your Assignment in a Minimum of 3 hours

Our academic experts are ready and waiting to assist with any writing project you may have. From simple essay plans, through to full dissertations, you can guarantee we have a service perfectly matched to your needs.

Don't use plagiarized sources. Get Your Custom Essay on
Need an answer from similar question? You have just landed to the most confidential, trustful essay writing service to order the paper from.
Just from $13/Page
Order Now
Free Inquiry Order A Paper Now Cost Estimate

 

 

 

 

 

This is a two-part deliverable using MS Word and MS Visio, or their open source equivalents. You are the chief security officer (CSO) of a law office that occupies four floors of a high-rise building in downtown Washington, D.C. There are approximately 50 PCs on the first floor, 150 PCs on the second floor, and 40 PCs on both the third and fourth floors. The servers for each department reside on their respective floors. The director of the accounting department has expressed concerns about the security of his files. For this assignment, you will explain the key functions of a cybersecurity policy catalog. Note: You may create or make all necessary assumptions needed for the completion of this assignment.

Submission Requirements
Document (MS Word).
Microsoft Visio Plan (MS Visio).
Section 1
Write a 3–4 page deliverable in which you:

Explain the major cyber governance issues in an organization and examine how organizations develop communication protocols because of those issues.
Describe the security issues found on a network, and arrange them from highest to lowest, mapping out security loopholes to justify your answer.
Differentiate between intellectual property theft and cyber espionage. Determine how you, as the CSO of an organization, would deal with both cases and what standard operating procedures you would follow.
Section 2
Complete the following:

Using Microsoft Visio, or an open source alternative such as Dia, illustrate the flow of data for both input and output information in an infrastructure. The diagram must map any issues in terms of a cyber infrastructure.
Format your assignment according to the following formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcome associated with this assignment is:

Determine the major cyber governance and infrastructure security issues for an organization.
Note: Assignment will be check for plagiarism

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.
EXPLAIN THE MAJOR CYBER GOVERNANCE ISSUES IN AN ORGANIZATION, AND EXAMINE HOW ORGANIZATIONS DEVELOP COMMUNICATION PROTOCOLS BECAUSE OF THOSE ISSUES.–

Levels of Achievement:
UNACCEPTABLE 0 (0.00%) points

NEEDS IMPROVEMENT 10.5 (15.00%) points

COMPETENT 11.9 (17.00%) points

EXEMPLARY 14 (20.00%) points

Describe the security issues found on a network, and arrange them from highest to lowest, mapping out security loopholes to justify your answer.–

Levels of Achievement:
UNACCEPTABLE 0 (0.00%) points

NEEDS IMPROVEMENT 10.5 (15.00%) points

COMPETENT 11.9 (17.00%) points

EXEMPLARY 14 (20.00%) points

Differentiate between intellectual property theft and cyber espionage. Determine how you, as the CSO of an organization, would deal with both cases and what standard operating procedures you would follow.–

Levels of Achievement:
UNACCEPTABLE 0 (0.00%) points

NEEDS IMPROVEMENT 13.125 (18.75%) points

COMPETENT 14.875 (21.25%) points

EXEMPLARY 17.5 (25.00%) points

Using Microsoft Visio, or an open source alternative such as Dia, illustrate the flow of data for both input and output information in an infrastructure. The diagram must map any issues in terms of a cyber infrastructure.–

Levels of Achievement:
UNACCEPTABLE 0 (0.00%) points

NEEDS IMPROVEMENT 13.125 (18.75%) points

COMPETENT 14.875 (21.25%) points

EXEMPLARY 17.5 (25.00%) points

Clarity, writing mechanics, and formatting requirements.–

Levels of Achievement:
UNACCEPTABLE 0 (0.00%) points

NEEDS IMPROVEMENT 5.25 (7.50%) points

COMPETENT 5.95 (8.50%) points

EXEMPLARY 7 (10.00%) points

The post Infrastructure and Security first appeared on COMPLIANT PAPERS.

"Is this question part of your assignment? We Can Help!"

"Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!""Our Prices Start at $11.99. As Our First Client, Use Coupon Code GET15 to claim 15% Discount This Month!!"

Get A Price Estimate