capella IT3358: Information Security project

Question # 00222709 Posted By: neil2103 Updated on: 03/15/2016 03:24 PM Due on: 03/29/2016
Subject Computer Science Topic General Computer Science Tutorials:
Question
Dot Image

Course Project


Enterprise Security

Throughout this course, you will learn about best network security practices and strategies for building an effective, efficient Enterprise Security for your organization. These include methods for analyzing critical components and integrating these components with one another to ensure that they are interoperable and configured for optimum security. You will use these strategies to create a plan and strategic decision supporting documentation for an effective Enterprise Network Security course project.

The project includes the following:

    • Executive summary and cover sheet.
    • Scope and requirements rationale.
    • Role of Availability, Confidentiality, Authentication, and Integrity in identifying a security solution.
    • Global challenges to security.
    • Types of Cryptography.
    • Strategies for supporting the AAA framework.
    • Physical security strategies for protecting the networks and data.
    • Intrusion Detection System strategy.
    • Basic strategies for hardening an Operating System.
    • Ethical standards and implications of sharing network resources externally.
    • Screen shots of your diagram supporting the project components.
    • A list of references.

You are to choose the organization that fits your background and easily integrate the project required components. Specific detailed instructions for each project component are located in the assignment activity in the unit in which the component is due.

Project Objectives

To successfully complete this project, you will be expected to:

13. Identify security standards that must be addressed in a security solution.

14. Discuss legal issues that must be considered in relation to the management of information assets.

15. Combine all previous submitted assignments and submit the final project.

16. Follow APA style and formatting guidelines for resources and citations and create a document that is clearly written and generally free of grammatical errors.

Toggle Drawer

Project Requirements

To achieve a successful project experience and outcome, you are expected to meet the following requirements.

To achieve a successful project experience and outcome, you are expected to meet the following requirements:

o Written communication: Written communication is free of errors that detract from the overall message.

o Paper components:

§ Title page or cover sheet.

§ Table of contents.

§ Executive summary.

§ Body of paper.

§ Diagram or diagrams created in a network simulation tool.

§ Reference page.

o APA formatting: Resources and citations are formatted according to APA (6th Edition) Style and Formatting.

o List of references: A list of properly-cited references, including books, Web sites, articles, and other resources.

o Length of paper: There are no page length requirements. The architecture will dictate the number of pages required to convey your design.

o Font and font size: Arial, 10 point.

Toggle Drawer

Project Grading Criteria

12:01 AM 06/20/2014 Project Scoring Guide Grading Rubric

Criteria

Non-performance

Basic

Proficient

Distinguished

Describe security vulnerabilities and threats found in an IT infrastructure.
16%

Does not describe security vulnerabilities and threats found in an IT infrastructure.

Lists partially, security vulnerabilities and threats found in an IT infrastructure.

Describes security vulnerabilities and threats found in an IT infrastructure.

Describes security vulnerabilities and threats found in an IT infrastructure and provides supporting rationale or examples. Displaying great insight into legal IT infrastructure threats.

Describe security standards that must be addressed in a security solution.
16%

Does not describe security standards that must be addressed in a security solution.

Lists partially, the security standards that must be addressed in a security solution, or the discussion is inaccurate.

Describes security standards that must be addressed in a security solution.

Describes accurately, a comprehensive list of the security standards present in a security solution. Displaying great insight into the role of security standards.

Discuss legal issues that must be considered in relation to the management of information assets.
17%

Does not discuss legal issues that must be considered in relation to the management of information assets.

Lists partially, the legal issues that must be considered in relation to the management of information assets, or the discussion is inaccurate.

Discusses legal issues that must be considered in relation to the management of information assets.

Discusses legal issues that must be considered in relation to the management of information assets and provides supporting rationale or examples. Displaying great insight into legal issues related to security.

Discuss globalization concerns associated with security.
17%

Does not discuss globalization concerns associated with security.

Lists partially, the globalization concerns associated with security, or the concerns do not apply to international issues.

Discusses globalization concerns associated with security.

Discusses globalization concerns associated with security. Showing great insight into international security concerns.

Design a comprehensive security solution that meets need of an organization.
17%

Does not design a comprehensive security solution that meets need of an organization.

Designs a security solution that partially meets need of an organization, or the security solution is not complete.

Designs a comprehensive security solution that meets need of an organization.

Designs a comprehensive security solution that meets need of an organization. Including solutions that show insight into securing and organization's data, physical environments, people, and operating systems.

Follow APA style and formatting guidelines for resources and citations and create a document that is clearly written and generally free of grammatical errors.
17%

Does not follow APA style and formatting guidelines for resources and citations or create a document that is clearly written and generally free of grammatical errors.

Either follows the APA style and formatting guidelines for resources and citations or creates a document that is clearly written or generally free of grammatical errors.

Follows APA style and formatting guidelines for resources and citations and creates a document that is clearly written and generally free of grammatical errors

Follows APA style and formatting guidelines for resources and citations and creates a document that is clearly written, well organized, and completely free of grammatical errors.

Dot Image
Tutorials for this Question
  1. Tutorial # 00217835 Posted By: neil2103 Posted on: 03/15/2016 03:25 PM
    Puchased By: 3
    Tutorial Preview
    The solution of capella IT3358: Information Security project...
    Attachments
    Project_compilation_and.__._(1)__.doc (127.5 KB)
    Recent Feedback
    Rated By Feedback Comments Rated On
    j...r01 Rating Precise work with excellent services 04/15/2016

Great! We have found the solution of this question!

Whatsapp Lisa