Term Paper: Security Administrator HandbookDue Week 10 and worth 200 points One of the responsibilities of a Security Administrator is to create and document policies that protect the organization and guide users to making smart decisions. In this assignment you will build a handbook that can be used for such a purpose. The NIST’s Special Publications Website, a government operated Website, provides several documents for you to review in order to see examples that may be helpful to start this assignment (http://csrc.nist.gov/publications/PubsSPs.html). Other helpful Websites for this assignment include:DISA.mil (http://iase.disa.mil/)TechRepublic (http://www.techrepublic.com/search?q=Security+Administrator+handbook&e=1)ACM (http://www.acm.org/search?SearchableText=security+administration)Publications from the Strayer Learning Resource Center are also available. Additional resources should be used when necessary. Write a twelve to eighteen (12-18) page Security Administrator’s handbook including policies tailored to your work environment or for a business environment with which you are familiar. You may select a fictitious name for your organization for the purpose of this paper. Do not duplicate your company’s existing handbook. Create your own unique work based on what you have learned in this course. There will be two (2) major sections of the handbook: Main Body and Policies. Section 1: Main BodyIn four to six (4-6) pages total, develop the basic procedures and guidelines that the organization must address to properly secure its corporate network and information assets in the followings seven (7) items:Network Architecture and Security ConsiderationsWireless SecurityRemote Access SecurityLaptop and Removable Media SecurityVulnerability and Penetration TestingPhysical SecurityGuidelines for Reviewing and Changing PoliciesSection 2: PoliciesDevelop the policies section of the handbook and include two to three (2-3) pages for each policy in which you define the policies used by the organization identifying the unique requirements of your industry. It must include, at a minimum, the following four (4) security policies:Acceptable Use PolicyPassword PolicyIncident Response PolicyUser Awareness and Training PolicyTo organize your policies and to give your policies structure, follow this sequential format:Policy StatementPurposeObjectivesStandardsProcedures and GuidelinesResponsibilitiesReview and Change Management Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources.Your assignment must follow these formatting requirements:Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; references must follow APA or school-specific format. Check with your professor for any additional instructions.Include a cover page containing the title of the assignment, the title of the company and industry, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required page length.The specific course learning outcomes associated with this assignment are:Formulate a security planning model that addresses and solves a security problem at an agency or corporate entity.Explain the process of developing and implementing an enterprise-wide information security policy.Summarize the methods and practices related to perimeter security.Use technology and information resources to research issues in security assessment and solutions.Write clearly and concisely about topics related to security assessment and solutions using proper writing mechanics and technical style conventions.
by admin | Sep 23, 2022 | Information Systems | 0 comments
Term Paper: Security Administrator HandbookDue Week 10 and worth 200 points One of the responsibilities…
A professional Academic Service Provider
Distinguished Writers Ensure Accountability, Confidentiality, High-Quality, and Timely Execution
Distinguished Writers comprises of well-trained professionals striving to give our clients an awesome experience. We engage with our customers throughout the learning process to ensure they are comfortable with both their classwork and homework in order to achieve excellent grades. The team is well-balanced across different fields to suit our clients. Our diversified fields include article writing, thesis proposals, project management, coursework, essay writing, and dissertations among others.Fundamental Values
1. Accountability: The company values professionalism in all our undertakings. As such, we interact transparently with our customers.
2. Confidentiality: The company does not disclose anything to third-parties, and our interactions with customers remain confidential.
3. High-Quality The products are thoroughly proofread and counter-checked to ensure they meet the expected quality levels.
Guarantees
4. Quality is a Guarantee: Our writers are accurately matched with their area of expertise to ensure proper quality is maintained. We are also equipped with adequate software to guarantee error-free products.
5. Money Back Policy: As a client-oriented service, we offer 100% refund for the following: if we received a double payment from you; if you placed similar orders twice (or more) and paid for all of them; the writer has not been assigned; you asked to cancel the order within 20 minutes after placing it; an e-Check payment has been sent (the Dispute Manager will contact you accordingly). Other cases involve a comprehensive investigation by the Dispute Department and feedback given within 24 hours. We value our customers; therefore, the process will be fair, fast, and precise.
5 .Free Revisions: You can request for revisions at no additional cost. Nonetheless, this does not include complete change of the initial order instructions and if it is not past ten days upon your approval.
6. 24/7 Customer Support: Our support staff are always online to provide any assistance when needed
Ordering Process
NOTE: If you have any question, always contact our support team before the commencement of your project. ALL THE BEST”:
Recent Comments