SmartExpert

(118)

$30/per page/Negotiable

About SmartExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Accounting,Business & Finance See all
Accounting,Business & Finance,Economics,English,HR Management,Math Hide all
Teaching Since: Apr 2017
Last Sign in: 56 Weeks Ago, 4 Days Ago
Questions Answered: 7570
Tutorials Posted: 7352

Education

  • BS,MBA, PHD
    Adelphi University/Devry
    Apr-2000 - Mar-2005

Experience

  • HOD ,Professor
    Adelphi University
    Sep-2007 - Apr-2017

Category > Information Systems Posted 12 Dec 2017 My Price 14.00

CIS 333 Week 6 Final Assignment 1 Creating and Communicating a Security Strategy

Assignment 1: Creating and Communicating a Security Strategy

 

First Draft Due Week 4

 

Final Due Week 6, worth 80 points

As an IT professional, you’ll often be required to communicate policies, standards, and practices in the workplace. For this assignment, you’ll practice this important task by taking on the role of an IT professional charged with creating a memo to communicate your company’s new security strategy.

 

The specific course learning outcomes associated with this assignment are:

 

         Analyze the importance of network architecture to security operations.

 

         Apply information security standards to real-world implementation.

 

         Communicate how problem-solving concepts are applied in a business environment.

 

         Use information resources to research issues in information systems security.

 

         Write clearly about network security topics using proper writing mechanics and business formats.

Preparation

1.   Review the essential elements of a security strategy

 

A successful IT administration strategy requires the continuous enforcement of policies, standards, and practices (procedures) within the organization. Review these elements to see how they compare:

Policy          The general statements that direct the organization’s internal and external communication and goals.

 

Standards  Describe the requirements of a given activity related to the policy. They are more detailed and specific than policies. In effect, standards are rules that evaluate the quality of the activity. For example, standards define the structure of the password and the numbers, letters, and special characters that must be used in order to create a password.

 

Practices     The written instructions that describe a series of steps to be followed during the performance of a given activity. Practices must support and enhance the work environment. Also referred to as procedures.

2.   Describe the business environment

You are the IT professional in charge of security for a company that has recently opened within a shopping mall. Describe the current IT environment at this business. You can draw details from a company you work for now or for which you have worked in the past. You’ll need to get creative and identify the details about this business that will influence the policies you’ll create. For example, does the company allow cell phone email apps? Does the company allow web mail? If so, how will this affect the mobile computing policy? Describe all the details about this business environment that will be necessary to support your strategy.

3.   Research sample policies

 

Familiarize yourself with various templates and sample policies used in the IT field. Do not just copy another company’s security policy, but rather learn from the best practices of other companies and apply them to yours. Use these resources to help structure your policies:

 

       Information Security Policy Templates

 

       Sample Data Security Policies

 

       Additional Examples and Tips

 

 

Instructions

 

With the description of the business environment (the fictional company that has opened in a shopping mall) in mind and your policy review and research complete, create a new security strategy in the format of a company memo (no less than three to five pages) in which you do the following:

 

1.      Describe the business environment and identify the risk and reasoning

 

Provide a brief description of all the important areas of the business environment that you’ve discovered in your research. Be sure to identify the reasons that prompted the need to create a security policy.

 

2.      Assemble a security policy

 

Assemble a security policy or policies for this business. Using the memo outline as a guide, collect industry-specific and quality best practices. In your own words, formulate your fictional company’s security policy or policies. You may use online resources, the Strayer Library, or other industry-related resources such as the National Security Agency (NSA) and Network World. In a few brief sentences, provide specific information on how your policy will support the business' goal.

 

3.      Develop standards

 

Develop the standards that will describe the requirements of a given activity related to the policy. Standards are the in-depth details of the security policy or policies for a business.

 

4.      Develop practices

 

Develop the practices that will be used to ensure the business enforces what is stated in the security policy or policies and standards.

 

Format your assignment according to the following formatting requirements:

 

         This course is designed to prepare you for a career in IT. While most Strayer University courses require APA (essay) format, this course focuses on writing in a business format. Review this resource to learn more about the important features of business writing: The One Unbreakable Rule in Business Writing.

 

       You may use the provided memo outline as a guide for this assignment, or you may use your own. Get creative and be original! (You should not just copy a memo from another source.) Adapt the strategy you create to your “company” specifically. In the workplace, it will be important to use company standard documents for this type of communication.

                   Rubric

                    

                   Grading for this assignment will be based on answer quality, logic/organization of the memo, and language and writing skills, using the following rubric.

                    

 

Points: 80

 

 

Assignment 1: Creating and Communicating a Security Strategy

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Meets

 

 

 

 

 

 

 

 

 

 

 

Criteria

 

 

Unacceptable

 

 

Minimum

 

 

Fair

 

 

Proficient

 

 

Exemplary

 

 

 

 

Below 60% F

 

 

Expectations

 

 

70-79% C

 

 

80-89% B

 

 

90-100% A

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

60-69% D

 

 

 

 

 

 

 

 

 

 

 

1. Describe

 

Does not

 

Insufficiently

 

Partially

 

Satisfactorily

 

Thoroughly

 

the

 

describe the

 

describes the

 

describes the

 

describes the

 

describes the

 

business

 

business and

 

business.

 

business.

 

business.

 

business.

 

and identify

 

does not

 

 

 

 

 

 

 

 

 

 

 

 

 

the risk and

 

submit or

 

The risk is

 

The risk is

 

The risk is

 

The risk is

 

reasoning

 

incompletely

 

unclear and

 

stated but the

 

identified and the

 

clearly

 

 

 

 

identifies the

 

there is not a

 

reasoning needs

 

reasoning has

 

identified and

 

Weight:

 

risk and

 

clear

 

more supporting

 

some supporting

 

the reasoning

20%

 

 

reasoning.

 

connection to

 

details.

 

details.

 

has well-

 

 

 

 

 

 

 

a reason.

 

 

 

 

 

 

 

supported

 

 

 

 

 

 

 

 

 

 

More details and

 

 

 

 

detail to

 

 

 

 

 

 

 

 

 

 

a clear

 

 

 

 

connect the

 

 

 

 

 

 

 

 

 

 

connection to

 

 

 

 

risk to the

 

 

 

 

 

 

 

 

 

 

the risk would

 

 

 

 

reasoning.

 

 

 

 

 

 

 

 

 

 

improve this

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

section.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

2.

 

 

Does not

 

The policy is

 

The policy

 

The policy

 

The policy

 

Assemble a

 

submit or

 

missing major

 

includes some

 

includes most

 

includes all

 

security

 

incompletely

 

elements and

 

elements and

 

elements and

 

the necessary

 

policy or

 

assembles a

 

does not

 

partially

 

satisfactorily

 

elements and

 

policies for

 

security policy

 

communicate

 

indicates how it

 

indicates how it

 

clearly

 

the

 

or policies for

 

how it would

 

would support

 

would support the

 

indicates how

 

business

 

the business.

 

support the

 

the business’

 

business’ goal,

 

it will support

 

 

 

 

 

 

 

business goal.

 

goal, but was

 

but was lacking

 

the business’

 

Weight:

 

 

 

 

 

 

 

lacking

 

supporting

 

goal.

25%

 

 

 

 

 

 

 

 

supporting

 

details.

 

 

 

 

 

 

 

 

 

 

 

 

 

details.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

3. Develop

 

Does not

 

The standards

 

The standards

 

The standards

 

The standards

 

standards

 

submit or

 

are not fully

 

partially

 

satisfactorily

 

thoroughly

 

 

 

 

incompletely

 

developed and

 

describe some

 

describe many of

 

describe all

 

Weight:

 

develops

 

do not

 

of the

 

the requirements

 

the

25%

 

 

standards.

 

describe the

 

requirements of

 

of the activity but

 

requirements

 

 

 

 

 

 

 

requirements

 

the activity but

 

could use more

 

of the activity

 

 

 

 

 

 

 

of the activity.

 

lack the details

 

details.

 

and include

 

 

 

 

 

 

 

 

 

 

necessary to

 

 

 

 

sound, in-

 

 

 

 

 

 

 

 

 

 

make them

 

 

 

 

depth details.

 

 

 

 

 

 

 

 

 

 

complete.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

                  

                    

                    

                   CIS333 – Networking Security Fundamentals

                  

                    

 

Points: 80

 

 

Assignment 1: Creating and Communicating a Security Strategy

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Meets

 

 

 

 

 

 

 

 

 

 

 

Criteria

 

 

Unacceptable

 

 

Minimum

 

 

Fair

 

 

Proficient

 

 

Exemplary

 

 

 

 

Below 60% F

 

 

Expectations

 

 

70-79% C

 

 

80-89% B

 

 

90-100% A

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

60-69% D

 

 

 

 

 

 

 

 

 

 

 

4. Develop

 

Does not

 

The practices

 

The practices

 

The practices

 

The practices

 

practices

 

submit or

 

do not include

 

partially

 

satisfactorily

 

thoroughly

 

 

 

 

incompletely

 

enough

 

describe how to

 

address how to

 

address how

 

Weight:

 

develops

 

description to

 

ensure the

 

ensure the

 

to ensure the

25%

 

 

practices.

 

ensure the

 

business can

 

business can

 

business can

 

 

 

 

 

 

 

business can

 

enforce what is

 

enforce what is

 

enforce what

 

 

 

 

 

 

 

enforce what

 

stated in the

 

stated in the

 

is stated in the

 

 

 

 

 

 

 

is stated in the

 

policies and

 

policies and

 

policies and

 

 

 

 

 

 

 

policies and

 

standards.

 

standards.

 

standards.

 

 

 

 

 

 

 

standards.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

The written

 

The written

 

The written

 

 

 

 

 

 

 

The written

 

instructions

 

instructions

 

instructions

 

 

 

 

 

 

 

instructions do

 

include some

 

include many of

 

include all the

 

 

 

 

 

 

 

not include

 

steps, but they

 

the necessary

 

necessary

 

 

 

 

 

 

 

steps or

 

could be

 

steps, but

 

steps and

 

 

 

 

 

 

 

enough steps

 

expanded to

 

additional steps

 

have well-

 

 

 

 

 

 

 

to make them

 

make them

 

and details would

 

supporting

 

 

 

 

 

 

 

complete.

 

complete.

 

improve the

 

details.

 

 

 

 

 

 

 

 

 

 

 

 

 

instructions.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

5. Clarity,

 

The writing

 

The writing

 

The writing is

 

The writing is

 

The writing is

 

 

lacks clarity.

 

lacks some

 

beginning to

 

mostly clear and

 

professional

 

writing

 

 

 

 

 

 

 

 

 

 

clarity.

 

show clarity.

 

business

 

and clear.

 

mechanics,

 

 

 

 

 

 

 

 

 

Formatting is

 

 

 

 

 

 

 

formatting is

 

 

 

 

and

 

 

 

 

 

 

 

 

 

 

 

 

 

not

 

Formatting is

 

Business

 

apparent.

 

The formatting

 

business

 

 

 

 

 

 

 

appropriate

 

not

 

formatting is

 

 

 

 

is excellent

 

formatting

 

 

 

 

 

 

 

 

 

for business.

 

appropriate for

 

partially applied.

 

Some minor

 

and aligned

 

require-

 

 

 

 

 

 

 

 

 

 

business.

 

 

 

 

adjustments

 

with business

 

ments

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

would improve

 

requirements.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

Weight: 5%

 

 

 

 

 

 

 

 

 

 

the overall

 

 

 

 

 

 

 

 

 

 

 

 

 

 

format.

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

 

                  

Additional Examples and Tips

 

Example 1: XYZ Inc. Company-Wide Employee Password Strategy

 

Policies

 

         All users must have a password.

 

         Passwords must be changed every six months.

 

Standards

 

         A password must have a minimum of six characters.

 

         A password must have a maximum of 12 characters.

 

         A password must contain letters, numbers, and special characters other than $.

 

Practices-Employee

 

         Create a password. The UserID should be an EmployeeID already generated by HR.

 

         Send a request to create the account to the Information Technology (IT) department.

 

         User receives a temporary password.

 

         Users must change their temporary password the first time they log in.

 

Example 2: Security Policy and Standards

 

Password Policy: Passwords are an important part of computer security at your organization. They often serve as the first line of defense in preventing unauthorized access to the organization’s computers and data.

 

In order to define the password policy, it is important to identify the standards.

 

1.  Multi-factor authentication

 

2.  Password strength standard

 

3.  Password security standards; how to keep the password secure

 

Tips and Points to Consider When Identifying Risks or Security Vulnerabilities

 

         Flaws in operating systems due to constant attack by malware

 

         Denial of services attacks

 

         Employees data theft

 

         User set a weak password or password that is easy to guess, such as a birthday or child’s name.

 

         User leaves sensitive data on an unlocked, unattended computer

 

         Organization allows sensitive data on a laptop that leaves the building

 

         Data can be accessed remotely without using proper security

                     Memo Outline

                    

                      

                      

                      

                      

                      

                      

                      

                      

                     Network Security Associates of Atlantis, Inc.

                      

                     123 Watery Lane

                      

                     Atlantis, USVI 91199

                      

                     From: IT Security Dept.

                      

                     Re: Security Policy

                      

                     Date:

                      

                     Section 1: General Policies and Motivation

                      

                     Section 2: Passwords

                      

                     Section 3: Biometrics

                      

                     Section 4: Tokens

                      

                     Section 5: Physical Security

                      

                     Section 6: Email Policies

                      

                     Section 7: Breach Reporting Responsibilities

                      

                     Section 8: Mobile Policy and BYOD (Bring Your Own Device)

                  

Answers

(118)
Status NEW Posted 12 Dec 2017 11:12 AM My Price 14.00

CIS----------- 33-----------3 W-----------eek----------- 6 -----------Fin-----------al -----------Ass-----------ign-----------men-----------t 1----------- Cr-----------eat-----------ing----------- an-----------d C-----------omm-----------uni-----------cat-----------ing----------- a -----------Sec-----------uri-----------ty -----------Str-----------ate-----------gy-----------

Attachments

file 1513078192-CIS 333 Week 6 Final Assignment 1 Creating and Communicating a Security Strategy.docx preview (1453 words )
A-----------ssi-----------gnm-----------ent-----------#1:-----------Cre-----------ati-----------ng -----------and----------- Co-----------mmu-----------nic-----------ati-----------on -----------a S-----------ecu-----------rit-----------y S-----------tra-----------teg-----------y -----------Nam-----------e -----------Pro-----------fes-----------sor----------- C-----------IS -----------333-----------: N-----------etw-----------ork----------- Se-----------rve-----------r F-----------und-----------ame-----------nta-----------lsD-----------ate----------- M-----------emo-----------ran-----------dum----------- T-----------o: -----------Emp-----------loy-----------ees----------- of----------- th-----------e c-----------omp-----------any----------- -----------Fro-----------m: -----------Inf-----------orm-----------ati-----------on -----------Tec-----------hno-----------log-----------y A-----------dmi-----------nis-----------tra-----------tor----------- -----------Dat-----------e: -----------Oct-----------obe-----------r 2-----------8th-----------, 2-----------017----------- -----------Sub-----------jec-----------t: -----------New----------- da-----------ta -----------sec-----------uri-----------ty -----------pol-----------icy----------- -----------In -----------the----------- pr-----------ese-----------nt -----------era-----------, t-----------he -----------glo-----------bal-----------iza-----------tio-----------n i-----------s c-----------ont-----------inu-----------ous-----------ly -----------inc-----------rea-----------sin-----------g a-----------nd -----------it -----------fur-----------the-----------r r-----------esu-----------lts----------- in-----------to -----------a r-----------ise----------- in----------- th-----------e c-----------omp-----------eti-----------tio-----------n. -----------In -----------ord-----------er -----------to -----------sur-----------viv-----------e a-----------nd -----------com-----------pet-----------e i-----------n t-----------he -----------exi-----------sti-----------ng
Not Rated(0)