CIS 598 Project Deliverable 6 – Information Assurance Compliance with Government Regulations

CIS 598 (NEW) WK 10 Project Deliverable 6 – Information Assurance Compliance with Government Regulations

To buy this assignment, click below link:

https://www.homeworkfortune.com/CIS-598-Project-Deliverable-6-Information-Assurance-Compliance-CIS598N18-006.htm

 

Review the “Audit Program for Application Systems for Auditing” presented in Appendix B of the Cascarino text. Also, read the following articles, located in the course shell:

Submission Requirements

  • Case Study Plan (MS Word)

Write a six to ten (6-10) page paper in which you:

  1. Discuss which employees and organizations have a deeper-level of information assurance (IA) policy compliance.
  2. Examine the factors that increased the individual’s level of propensity for compliance.
  3. Determine the internal and external factors affecting IA policy compliance.
  4. Ascertain which of the organizational requirements poses difficulty in adopting technical features to enhance security policy.
  5. Discuss factors related to IA and policy compliance that are affected by government regulations.
  6. Suggest a framework that could be used to address the issues described in the “Five Most Common Cybersecurity Mistakes” article, based on the “Audit Program for Application Systems for Auditing”.
  7. Use at least three (3) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

CIS 598 Project Deliverable 5 – Cybersecurity Policy Catalog

CIS 598 (NEW) WK 8 Project Deliverable 5 – Cybersecurity Policy Catalog (BOTH SECTIONS INCLUDED)

To buy this assignment, click below link:

https://www.homeworkfortune.com/CIS-598-Project-Deliverable-5-Cybersecurity-Policy-Catalog-BO-CIS598N18-005.htm

 

Project Deliverable 5 is a two-part deliverable using MS Word and MS Project, or their open source equivalents. This assignment focuses on information as an asset and logical security techniques for a hypothetical law firm. The goal of this deliverable is to secure an information security policy, suggesting the fundamental guidelines should an untoward event occur. It can be seen that information assets security management can be reduced down to three (3) basic principles: integrity, confidentiality, and availability. Structure a policy around and within computers and associated equipment, as well as the people using it. Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.

Submission Requirements

  • Infrastructure Document (MS Word)
  • Security Project Plan (MS Project)

Section 1

Write a three to five (3-5) page paper in which you:

  1. Create a cyber-security policy describing the principle, the objective, and policy statement for the law firm’s company network.
  2. Describe the roles and responsibilities by groups (e.g., position director of network security, the network security manager, network security engineers, IT area), defining roles and responsibilities.
  3. Suggest the cyber-security policy statement, an explanation of the policy statement, and the reasons why the policy statement may be controversial.
  4. Determine the security testing methodology you would use to facilitate the assessment of technical controls.

Section 2

  1. Use Microsoft Project, or an open source alternative such as OpenProj, to create a security project plan for the law firm. The project plan should include:
    1. Tasks, subtasks, resources, and predecessors.
    2. An outline of the planning, analysis, design, and implementation phases.
    3. The use of cyber-security in the information systems development life cycle.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

CIS 598 (NEW) Project Deliverable 4 – Infrastructure and Security

CIS 598 (NEW) WK 7 Project Deliverable 4 – Infrastructure and Security (BOTH SECTIONS INCLUDED)

To buy this assignment, click below link:

https://www.homeworkfortune.com/CIS-598-Project-Deliverable-4-Infrastructure-and-Security-BOT-CIS598N18-004.htm

 

Project Deliverable 4 is a two-part deliverable using MS Word and MS Visio, or their open source equivalents. You are the Chief Security Officer (CSO) of a law office that occupies four (4) floors of a high-rise building in downtown Washington, D.C. There are approximately 50 PCs on the first floor, 150 PCs on the second floor, and 40 PCs on both the third and fourth floors. The servers for each department reside on their respective floors. The director of the accounting department has expressed concerns about the security of his files. For this assignment, you will explain the key functions of a cyber-security policy catalog. Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.

Submission Requirements

  • Document (MS Word)
  • Microsoft Visio Plan (MS Visio)

Section 1

Write a three to four (3-4) page deliverable in which you:

  1. Explain the major cyber governance issues in an organization and, because of those issues, examine how organizations develop communication protocols.
  2. Describe the security issues found on a network, and arrange them from highest to lowest, mapping out security loopholes to justify your answer.
  3. Differentiate between intellectual property theft and cyber espionage. Determine how you, as the CSO of an organization, would deal with both cases and what standard operating procedures you would follow.

Section 2

  1.  Using Microsoft Visio, or an open source alternative such as Dia, illustrate the flow of data for both input and output information in an infrastructure. The diagram must map any issues in terms of a cyber-infrastructure.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

CIS 598 Project Deliverable 3 – Security Policy Documentation

CIS 598 (NEW) WK 6 Project Deliverable 3 – Security Policy Documentation (BOTH SECTIONS INCLUDED)

To buy this assignment, click below link:

https://www.homeworkfortune.com/CIS-598-Project-Deliverable-3-Security-Policy-Documentation-B-CIS598N18-003.htm

 

Project Deliverable 3 is a two-part deliverable using MS Word and MS Project, or their open source equivalents. Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.

Research the Internet for a large organization, reviewing its cybersecurity policy.

From your textbook, examine the phrase “policy as a project” from the Cyber Security Policy Guidebook, taking into account the security cycle.

Submission Requirements

  • Document (MS Word)
  • Microsoft Project (MS Project)

Section 1

Write a three to four (3-4) page paper in which you:

  1. Analyze the strategy used to protect the large organization you researched from hackers, fraud, and theft.
  2. Describe how your researched large organization uses “policy as a project” in its program.
  3. Analyze the general consequences of not having a policy for cybersecurity. Justify your thoughts with real-world examples.
  4. Cover the basic needs should there be a lack of cybersecurity policy in an organization. Decide what can be done to provide a base for security needs.  

Section 2

Using Microsoft Project, or an open source alternative such as OpenProj, to:

  1.  Record all tasks, subtasks, resources, and time related to the security cycle.
  2.  Outline the organization’s business, the systems, mission, and / or risk management phases in your design.
  3.  Your milestones should show how you are reducing cybersecurity risk rather than compliance and best practices.

 

CIS 598 Project Deliverable 2 – Security Needs and Objectives

CIS 598 (NEW) WK 4 Project Deliverable 2 – Security Needs and Objectives

To buy this assignment, click below link:

https://www.homeworkfortune.com/CIS-598-Project-Deliverable-2-Security-Needs-and-Objectives-CIS598N18-002.htm

 

For Project Deliverable 2, you are a newly appointed Security Officer (SO). The Chief Information Security Officer (CISO) has given you sixty days (60) days to deliver a security policy plan to address the organizational growth that the company is anticipating. Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.

Use the Internet to research the process that leads to the identification of security needs in an organization. Also, research an organization with a security policy in place, and review how this organization laid down the foundation for its security policy. Review the business requirements for the security project plan. You will be asked to describe the detailed project including the scope of the project; possible security risks, constraints, and assumptions; integration with other systems and infrastructure; and relevant terms that were used throughout the security project.

Submission Requirements

  • Document (MS Word)

Write a three to four (3-4) page paper in which you:

  1. Explain the process that leads to the identification of security needs and how those needs lay down a foundation for a policy.
  2. Describe the details regarding the type of business in which the company you researched is engaged.

……………..

Further details are hidden…..

CIS 598 Project Deliverable 1 – Evolution of Cyberspace

CIS 598 (NEW) WK 2 Project Deliverable 1 – Evolution of Cyberspace

To buy this assignment, click below link:

https://www.homeworkfortune.com/CIS-598-Project-Deliverable-1-Evolution-of-Cyberspace-CIS598N18-001.htm

 

Capstone Project Overview

The purpose of this Capstone Project is for students to examine and solve real world information assurance problems and apply associated techniques to create practical solutions. The course takes an integrative and senior security officer approach to address the policy, risk, and control opportunities within cyberspace and IT environments. Deliverables 1 through 5 focus on preparing students toward the final Capstone Project. Skills, experience, and knowledge gained through the completion of prerequisite courses will be used throughout each deliverable. The project contents to be addressed are as follows:

Project Deliverable 1 – Evolution of Cyberspace

Project Deliverable 1 consists of using Microsoft Word. Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.

In this deliverable, you will examine the evolution of cyberspace through time and discuss some of the biggest developments that have changed the face of cyberspace. You will also examine the advent of e-Commerce and its impact on cybersecurity, and determine the challenges and countermeasures needed to back up the security-related incidents.

Submission Requirements

  • Document (MS Word)

Write a two to three (2-3) page introduction in which you:

  1. Explain the evolution of cyberspace through time.
  2. Identify one (1) of the biggest developments that have changed the face of cyberspace.

………………

Further details are hidden….