Levels Tought:
Elementary,Middle School,High School,College,University,PHD
Teaching Since: | Apr 2017 |
Last Sign in: | 10 Weeks Ago |
Questions Answered: | 4870 |
Tutorials Posted: | 4863 |
MBA IT, Mater in Science and Technology
Devry
Jul-1996 - Jul-2000
Professor
Devry University
Mar-2010 - Oct-2016
Assignment 3: Outline a New IT Security Policy
Due Week 9 and worth 250 points
You have been hired by the Board of Directors of RollinOn, Inc as the new IT Security Manager. RollinOn is a designer of premade and custom designed skates and skateboards. Â RollinOn has had some extreme growth in the area of e-Commerce over the past couple of years due to the addition of their custom design tools on their website. However, RollinOn has had some internal security issues. Â RollinOn hs had some very lax policies allowing employees to bring their own tablets and laptops, also known as bring your own device or BYOD, and access social media on the intranet. The Web application development team has increased in size and is also in need of sound security practices. There have been several instances of downloaded malware and the company website has been hacked on at least one (1) occasion.
Your main objective is to create an outline of a new IT security policy regarding the company’s web presence and lack of access control. Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.
Part I: Written Section
Write a three to five (3-5) page paper in which you:
Part II: PowerPoint Presentation
Create an eight to ten (8-10) slide PowerPoint presentation for the Board of Directors in which you:
8, Outline the major components of your new IT security Policy. Be sure to associate each policy with specific risks.Â
The specific course learning outcomes associated with this assignment are:
Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.
Â
9/1/16, 11:49 PMPage 1 of 2https://blackboard.strayer.edu/bbcswebdav/institution/CIS/542/1166/Week9/Week%209%20Assignment%203%20Rubric.htmlPoints: 250Assignment 3: TitleCriteriaUnacceptableBelow 70% FFair70-79% CProficient80-89% BExemplary90-100% A1. Briefly explain thecurrent state of Webapplication security tothe Board of Directors.Weight: 15%Did not submit orincompletelyexplained thecurrent state of Webapplication securityto the Board ofDirectors.Partially explainedthe current state ofWeb applicationsecurity to theBoard of Directors.Satisfactorilyexplained thecurrent state of Webapplication securityto the Board ofDirectors.Thoroughlyexplained thecurrent state of Webapplication securityto the Board ofDirectors.2. Describe the majorpotential security risksassociated withmaintaining theorganization’s Webpresence, protecting itsassets, and promotinge-Commerce.Weight: 15%Did not submit orincompletelydescribed the majorpotential securityrisks associated withmaintaining theorganization’s Webpresence, protectingits assets, andpromoting e-Commerce.Partially describedthe major potentialsecurity risksassociated withmaintaining theorganization’s Webpresence,protecting itsassets, andpromoting e-Commerce.Satisfactorilydescribed the majorpotential securityrisks associatedwith maintaining theorganization’s Webpresence,protecting itsassets, andpromoting e-Commerce.Thoroughlydescribed the majorpotential securityrisks associatedwith maintaining theorganization’s Webpresence,protecting itsassets, andpromoting e-Commerce.3. Assess anytechniques andtechnologies that youmay need to use tomitigate those potentialsecurity risks.Weight: 15%Did not submit orincompletelyassessed anytechniques andtechnologies thatyou may need touse to mitigate thosepotential securityrisks.Partially anytechniques andtechnologies thatyou may need touse to mitigatethose potentialsecurity risks.Satisfactorily anytechniques andtechnologies thatyou may need touse to mitigatethose potentialsecurity risks.Thoroughly anytechniques andtechnologies thatyou may need touse to mitigatethose potentialsecurity risks.4. Create an outline ofyour new IT securitypolicies for RollinOn.Be sure to relate yourpolicies to the potentialrisks.Weight: 15%Did not submit orincompletely createdan outline of yournew IT securitypolicies for RollinOn.Did not submit orincompletely relatedyour policies to thepotential risks.Partially created anoutline of your newIT security policiesfor RollinOn.Partially relatedyour policies to thepotential risks.Satisfactorilycreated an outlineof your new ITsecurity policies forRollinOn.Satisfactorilyrelated your policiesto the potentialrisks.Thoroughly createdan outline of yournew IT securitypolicies forRollinOn.Thoroughly relatedyour policies to thepotential risks.5. Speculate on themost common types ofresistance that youmight encounter fromemployees whenimplementing your newIT policy.Weight: 15%Did not submit orincompletelyspeculated on themost common typesof resistance thatyou might encounterfrom employeeswhen implementingyour new IT policy.Partially speculatedon the mostcommon types ofresistance that youmight encounterfrom employeeswhen implementingyour new IT policy.Satisfactorilyspeculated on themost common typesof resistance thatyou mightencounter fromemployees whenimplementing yournew IT policy.Thoroughlyspeculated on themost common typesof resistance thatyou mightencounter fromemployees whenimplementing yournew IT policy.6. Four (4) qualityreferencesWeight: 15%No referencesprovided.Does not meet therequired number ofreferences; some orall references poorquality choices.Meets number ofrequired references;all references highquality choices.Exceeds number ofrequired references;all references highquality choices.7. Clarity, writingMore than 6 errors5-6 errors present3-4 errors present0-2 errors present
Attachments:-----------