Infrastructure and Security

 

 

 

 

 

This is a two-part deliverable using MS Word and MS Visio, or their open source equivalents. You are the chief security officer (CSO) of a law office that occupies four floors of a high-rise building in downtown Washington, D.C. There are approximately 50 PCs on the first floor, 150 PCs on the second floor, and 40 PCs on both the third and fourth floors. The servers for each department reside on their respective floors. The director of the accounting department has expressed concerns about the security of his files. For this assignment, you will explain the key functions of a cybersecurity policy catalog. Note: You may create or make all necessary assumptions needed for the completion of this assignment.

Submission Requirements
Document (MS Word).
Microsoft Visio Plan (MS Visio).
Section 1
Write a 3–4 page deliverable in which you:

Explain the major cyber governance issues in an organization and examine how organizations develop communication protocols because of those issues.
Describe the security issues found on a network, and arrange them from highest to lowest, mapping out security loopholes to justify your answer.
Differentiate between intellectual property theft and cyber espionage. Determine how you, as the CSO of an organization, would deal with both cases and what standard operating procedures you would follow.
Section 2
Complete the following:

Using Microsoft Visio, or an open source alternative such as Dia, illustrate the flow of data for both input and output information in an infrastructure. The diagram must map any issues in terms of a cyber infrastructure.
Format your assignment according to the following formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.
The specific course learning outcome associated with this assignment is:

Determine the major cyber governance and infrastructure security issues for an organization.
Note: Assignment will be check for plagiarism

Grading for this assignment will be based on answer quality, logic / organization of the paper, and language and writing skills, using the following rubric.
EXPLAIN THE MAJOR CYBER GOVERNANCE ISSUES IN AN ORGANIZATION, AND EXAMINE HOW ORGANIZATIONS DEVELOP COMMUNICATION PROTOCOLS BECAUSE OF THOSE ISSUES.–

Levels of Achievement:
UNACCEPTABLE 0 (0.00%) points

NEEDS IMPROVEMENT 10.5 (15.00%) points

COMPETENT 11.9 (17.00%) points

EXEMPLARY 14 (20.00%) points

Describe the security issues found on a network, and arrange them from highest to lowest, mapping out security loopholes to justify your answer.–

Levels of Achievement:
UNACCEPTABLE 0 (0.00%) points

NEEDS IMPROVEMENT 10.5 (15.00%) points

COMPETENT 11.9 (17.00%) points

EXEMPLARY 14 (20.00%) points

Differentiate between intellectual property theft and cyber espionage. Determine how you, as the CSO of an organization, would deal with both cases and what standard operating procedures you would follow.–

Levels of Achievement:
UNACCEPTABLE 0 (0.00%) points

NEEDS IMPROVEMENT 13.125 (18.75%) points

COMPETENT 14.875 (21.25%) points

EXEMPLARY 17.5 (25.00%) points

Using Microsoft Visio, or an open source alternative such as Dia, illustrate the flow of data for both input and output information in an infrastructure. The diagram must map any issues in terms of a cyber infrastructure.–

Levels of Achievement:
UNACCEPTABLE 0 (0.00%) points

NEEDS IMPROVEMENT 13.125 (18.75%) points

COMPETENT 14.875 (21.25%) points

EXEMPLARY 17.5 (25.00%) points

Clarity, writing mechanics, and formatting requirements.–

Levels of Achievement:
UNACCEPTABLE 0 (0.00%) points

NEEDS IMPROVEMENT 5.25 (7.50%) points

COMPETENT 5.95 (8.50%) points

EXEMPLARY 7 (10.00%) points

Sample Solution

from classes. All things considered, the monetary motivating force to complete what you begin has been expelled.
Not withstanding the projections for understudy credit default increments and constancy diminishes there are likewise monetary and “decision” contemplations. As of now, forthcoming understudies select an establishment of their decision and afterward finance educational cost with gifts, grants, advances, and reserve funds. This enables private schools and open universities to seek a similar understudy, and understudies audit money related guide grants and at last settle on choices dependent on funds – as well as fit.
For a few understudies, being a piece of an entering first year recruit class of 8,000 understudies might overpower, and sitting in an address lobby with 200 may not be their favored method for learning. These are the sorts of understudies who are as of now pulled in to littler private establishments where swarms are littler and educator connection is increasingly close to home. What’s more, most much of the time, these are private schools and colleges that don’t get immediate help from the state or government.
So what happens when a secondary school senior and his or her folks look at a private school in New York with the yearly educational cost of $50,000, or even one where educational cost is only $14,000, with Binghamton University– SUNY, where educational cost is zero? Will the little private school merit any thought? Presumably not. In any case, pause, where will the understudy prosper? What condition will fuel their prosperity? What’s best for the understudy? Will any of that be considered once they have the c

This question has been answered.

Get Answer
WeCreativez WhatsApp Support
Our customer support team is here to answer your questions. Ask us anything!
👋 Hi, Welcome to Compliant Papers.