The world’s Largest Sharp Brain Virtual Experts Marketplace Just a click Away
Levels Tought:
Elementary,Middle School,High School,College,University,PHD
| Teaching Since: | Jul 2017 |
| Last Sign in: | 305 Weeks Ago, 1 Day Ago |
| Questions Answered: | 15833 |
| Tutorials Posted: | 15827 |
MBA,PHD, Juris Doctor
Strayer,Devery,Harvard University
Mar-1995 - Mar-2002
Manager Planning
WalMart
Mar-2001 - Feb-2009
Review the security policy template by Ctrl + click to follow the link. The assignment instruction is the attached file.
Â
IT 241: Case Study Two Guidelines and Rubric
Â
Overview: This case study analysis is the second of two formative tasks that will support your understanding of the key course concepts of human behaviors that could potentially cause a security threat.
Â
Prompt: Review the security policy template (https://cdt.ca.gov/ )on the California Department of Technology website. For each of the six sections, summarize the content for the organization you have selected for the final project.
Â
Specifically, the following critical elements must be addressed:
Â
·        Introduction:Provideabriefdescriptionofwhatthispolicywill stateandwhyitisneeded. Statethesecuritystanceofyourorganization.
·        RolesandResponsibilities:Detailthespecificresponsibilitiesofeachidentifiableuserpopulation,includingmanagement,employees,andresidual parties.
·        Policy Directives: Describe the specifics of the securitypolicy.
·        Enforcement, Auditing, and Reporting: State what is considered a violation and the penalties for noncompliance. The violation of a policy usually implies an adverse action that needs to beenforced.
·        References:Listallreferencesmentionedinthepolicy,includingorganizationstandards,procedures,andgovernmentcodes.
·        ControlandMaintenance:Statetheauthorandownerofthepolicy.Describetheconditionsandprocessinwhichthepolicywillbereviewed.Apolicy reviewshouldbeperformedonatleastanannualbasistoensurethatthepolicyiscurrent.
Â
Guidelines for Submission: Your case study should be submitted as a FIVE - to SIX -page Word document (in addition to the title page and references). Use double spacing, 12-point Times New Roman font, one-inch margins, and APA citation format.
Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center.
Â
|
Critical Elements |
Proficient (100%) |
Needs Improvement (75%) |
Not Evident (0%) |
Value |
|
Introduction |
Accurately describes the policy |
Does not sufficiently describe the policy |
Does not describe the policy |
10 |
|
Roles and Responsibilities |
Accurately details the specific responsibilities |
Does not sufficiently detail the specific responsibilities |
Does not provide the specific responsibilities |
20 |
|
Policy Directives |
Sufficiently describes the specifics of the security policy |
Does not sufficiently describe the specifics of the security policy |
Does not describe the specifics of the security policy |
20 |
|
Enforcement, Auditing, and Reporting |
Sufficiently states what is considered a violation and the penalties for noncompliance |
Does not sufficiently state what is considered a violation and the penalties for noncompliance |
Does not state what is considered a violation and the penalties for noncompliance |
20 |
|
References |
Sufficiently lists all references |
Does not sufficiently list all references |
Does not list all references |
10 |
Â
|
Control and Maintenance |
Sufficiently describes the conditions and process in which the policy will be reviewed |
Does not sufficiently describe the conditions and process in which the policy will be reviewed |
Does not describe the conditions and process in which the policy will be reviewed |
15 |
|
Articulation of Response |
Submission has no major errors related to citations, grammar, spelling, syntax, or organization |
Submission has major errors related to citations, grammar, spelling, syntax, or organization that negatively impact readability and articulation of main ideas |
Submission has critical errors related to citations, grammar, spelling, syntax, or organization that prevent understanding of ideas |
5 |
|
Earned Total |
100% |
|||
Â
----------- Â ----------- H-----------ell-----------o S-----------ir/-----------Mad-----------am ----------- Th-----------ank----------- yo-----------u f-----------or -----------you-----------r i-----------nte-----------res-----------t a-----------nd -----------buy-----------ing----------- my----------- po-----------ste-----------d s-----------olu-----------tio-----------n. -----------Ple-----------ase----------- pi-----------ng -----------me -----------on -----------cha-----------t I----------- am----------- on-----------lin-----------e o-----------r i-----------nbo-----------x m-----------e a----------- me-----------ssa-----------ge -----------I w-----------ill----------- be----------- qu-----------ick-----------ly