ComputerScienceExpert

(11)

$18/per page/

About ComputerScienceExpert

Levels Tought:
Elementary,Middle School,High School,College,University,PHD

Expertise:
Applied Sciences,Calculus See all
Applied Sciences,Calculus,Chemistry,Computer Science,Environmental science,Information Systems,Science Hide all
Teaching Since: Apr 2017
Last Sign in: 10 Weeks Ago, 4 Days Ago
Questions Answered: 4870
Tutorials Posted: 4863

Education

  • MBA IT, Mater in Science and Technology
    Devry
    Jul-1996 - Jul-2000

Experience

  • Professor
    Devry University
    Mar-2010 - Oct-2016

Category > Programming Posted 28 Apr 2017 My Price 8.00

Describe the specifics of the security policy

I need help with this BAD. This Paper is due today. Please HELP. I have attached the rubrics with this to show what needs to be done. I will set the pay high as I need it completed today. Thanks

Please follow the steps in the rubric and include references

 

 

IT 241: Case Study Two Guidelines and Rubric
Overview: This case study analysis is the second of two formative tasks that will support your understanding of the key course concepts of human behaviors that
could potentially cause a security threat. These case study analyses will inform your approach for the milestone tasks and the final project.
Prompt: Review the security policy template on the California Department of Technology website. For each of the six sections, summarize the content for the
organization you have selected for the final project.
Specifically, the following critical elements must be addressed: Introduction: Provide a brief description of what this policy will state and why it is needed. State the security stance of your organization.
Roles and Responsibilities: Detail the specific responsibilities of each identifiable user population, including management, employees, and residual
parties.
Policy Directives: Describe the specifics of the security policy.
Enforcement, Auditing, and Reporting: State what is considered a violation and the penalties for noncompliance. The violation of a policy usually implies
an adverse action that needs to be enforced.
References: List all references mentioned in the policy, including organization standards, procedures, and government codes.
Control and Maintenance: State the author and owner of the policy. Describe the conditions and process in which the policy will be reviewed. A policy
review should be performed on at least an annual basis to ensure that the policy is current. Guidelines for Submission: Your case study should be submitted as a three- to four-page Word document (in addition to the title page and references). Use
double spacing, 12-point Times New Roman font, one-inch margins, and APA citation format.
Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more information,
review these instructions.
Critical Elements
Introduction
Roles and Responsibilities
Policy Directives
Enforcement, Auditing,
and Reporting
References Proficient (100%)
Accurately describes the policy
Accurately details the specific
responsibilities
Sufficiently describes the specifics of the
security policy
Sufficiently states what is considered a
violation and the penalties for
noncompliance
Sufficiently lists all references Needs Improvement (75%)
Does not sufficiently describe the policy
Does not sufficiently detail the specific
responsibilities
Does not sufficiently describe the
specifics of the security policy
Does not sufficiently state what is
considered a violation and the penalties
for noncompliance
Does not sufficiently list all references Not Evident (0%)
Does not describe the policy
Does not provide the specific
responsibilities
Does not describe the specifics of the
security policy
Does not state what is considered a
violation and the penalties for
noncompliance
Does not list all references Value
10
20
20
20 10 Control and Maintenance Articulation of Response Sufficiently describes the conditions and
process in which the policy will be
reviewed
Submission has no major errors related to
citations, grammar, spelling, syntax, or
organization Does not sufficiently describe the
conditions and process in which the
policy will be reviewed
Submission has major errors related to
citations, grammar, spelling, syntax, or
organization that negatively impact
readability and articulation of main ideas Does not describe the conditions and
process in which the policy will be
reviewed
Submission has critical errors related to
citations, grammar, spelling, syntax, or
organization that prevent understanding
of ideas
Earned Total 15 5 100%

Attachments:

Answers

(11)
Status NEW Posted 28 Apr 2017 08:04 AM My Price 8.00

IT -----------241----------- Ca-----------se -----------Stu-----------dy -----------Two----------- Se-----------cur-----------ity----------- Po-----------lic-----------y-----------

Attachments

file 1502626714-IT 241 Case Study Two Security Policy.docx preview (450 words )
I-----------T 2-----------41 -----------Cas-----------e S-----------tud-----------y T-----------wo -----------Sec-----------uri-----------ty -----------Pol-----------icy----------- S-----------ecu-----------rit-----------y P-----------oli-----------cy ----------- Na-----------me ----------- In-----------sti-----------tut-----------ion----------- ----------- In-----------tro-----------duc-----------tio-----------n -----------The----------- ex-----------pre-----------ssi-----------on -----------&qu-----------ot;-----------app-----------roa-----------ch&-----------quo-----------t; -----------is -----------app-----------lie-----------d w-----------ith-----------in -----------the----------- ad-----------min-----------ist-----------rat-----------ion----------- wr-----------iti-----------ng -----------in -----------two----------- re-----------lat-----------ed -----------yet----------- pa-----------rti-----------cul-----------ar -----------way-----------s. -----------Gen-----------era-----------lly-----------, s-----------tra-----------teg-----------y a-----------llu-----------des----------- fo-----------r a-----------n a-----------sso-----------cia-----------tio-----------n's----------- st-----------upe-----------ndo-----------us -----------dea-----------l o-----------r t-----------ech-----------niq-----------ue -----------whi-----------ch -----------cha-----------rac-----------ter-----------ize-----------s i-----------ts -----------sta-----------nda-----------rd -----------goa-----------ls -----------fur-----------the-----------rmo-----------re,----------- fo-----------cus-----------es -----------on.----------- Mo-----------re -----------fou-----------nd -----------eve-----------n s-----------car-----------cel-----------y, -----------str-----------ate-----------gy -----------ide-----------nti-----------fie-----------s p-----------art-----------icu-----------lar----------- ar-----------tic-----------ula-----------tio-----------ns -----------tha-----------t f-----------urt-----------her-----------mor-----------e
Not Rated(0)