capella IT3358: Information Security project
Course Project
Enterprise Security
Throughout this course, you will learn about best network security practices and strategies for building an effective, efficient Enterprise Security for your organization. These include methods for analyzing critical components and integrating these components with one another to ensure that they are interoperable and configured for optimum security. You will use these strategies to create a plan and strategic decision supporting documentation for an effective Enterprise Network Security course project.
The project includes the following:
- Executive summary and cover sheet.
- Scope and requirements rationale.
- Role of Availability, Confidentiality, Authentication, and Integrity in identifying a security solution.
- Global challenges to security.
- Types of Cryptography.
- Strategies for supporting the AAA framework.
- Physical security strategies for protecting the networks and data.
- Intrusion Detection System strategy.
- Basic strategies for hardening an Operating System.
- Ethical standards and implications of sharing network resources externally.
- Screen shots of your diagram supporting the project components.
- A list of references.
You are to choose the organization that fits your background and easily integrate the project required components. Specific detailed instructions for each project component are located in the assignment activity in the unit in which the component is due.
Project Objectives
To successfully complete this project, you will be expected to:
13. Identify security standards that must be addressed in a security solution.
14. Discuss legal issues that must be considered in relation to the management of information assets.
15. Combine all previous submitted assignments and submit the final project.
16. Follow APA style and formatting guidelines for resources and citations and create a document that is clearly written and generally free of grammatical errors.
Toggle Drawer
Project Requirements
To achieve a successful project experience and outcome, you are expected to meet the following requirements.
To achieve a successful project experience and outcome, you are expected to meet the following requirements:
o Written communication: Written communication is free of errors that detract from the overall message.
o Paper components:
§ Title page or cover sheet.
§ Table of contents.
§ Executive summary.
§ Body of paper.
§ Diagram or diagrams created in a network simulation tool.
§ Reference page.
o APA formatting: Resources and citations are formatted according to APA (6th Edition) Style and Formatting.
o List of references: A list of properly-cited references, including books, Web sites, articles, and other resources.
o Length of paper: There are no page length requirements. The architecture will dictate the number of pages required to convey your design.
o Font and font size: Arial, 10 point.
Toggle Drawer
Project Grading Criteria
|
12:01 AM 06/20/2014 Project Scoring Guide Grading Rubric |
||||
|
Criteria |
Non-performance |
Basic |
Proficient |
Distinguished |
|
Describe
security vulnerabilities and threats found in an IT infrastructure. |
Does not describe security vulnerabilities and threats found in an IT infrastructure. |
Lists partially, security vulnerabilities and threats found in an IT infrastructure. |
Describes security vulnerabilities and threats found in an IT infrastructure. |
Describes security vulnerabilities and threats found in an IT infrastructure and provides supporting rationale or examples. Displaying great insight into legal IT infrastructure threats. |
|
Describe
security standards that must be addressed in a security solution. |
Does not describe security standards that must be addressed in a security solution. |
Lists partially, the security standards that must be addressed in a security solution, or the discussion is inaccurate. |
Describes security standards that must be addressed in a security solution. |
Describes accurately, a comprehensive list of the security standards present in a security solution. Displaying great insight into the role of security standards. |
|
Discuss
legal issues that must be considered in relation to the management of
information assets. |
Does not discuss legal issues that must be considered in relation to the management of information assets. |
Lists partially, the legal issues that must be considered in relation to the management of information assets, or the discussion is inaccurate. |
Discusses legal issues that must be considered in relation to the management of information assets. |
Discusses legal issues that must be considered in relation to the management of information assets and provides supporting rationale or examples. Displaying great insight into legal issues related to security. |
|
Discuss
globalization concerns associated with security. |
Does not discuss globalization concerns associated with security. |
Lists partially, the globalization concerns associated with security, or the concerns do not apply to international issues. |
Discusses globalization concerns associated with security. |
Discusses globalization concerns associated with security. Showing great insight into international security concerns. |
|
Design
a comprehensive security solution that meets need of an organization. |
Does not design a comprehensive security solution that meets need of an organization. |
Designs a security solution that partially meets need of an organization, or the security solution is not complete. |
Designs a comprehensive security solution that meets need of an organization. |
Designs a comprehensive security solution that meets need of an organization. Including solutions that show insight into securing and organization's data, physical environments, people, and operating systems. |
|
Follow
APA style and formatting guidelines for resources and citations and create a
document that is clearly written and generally free of grammatical errors. |
Does not follow APA style and formatting guidelines for resources and citations or create a document that is clearly written and generally free of grammatical errors. |
Either follows the APA style and formatting guidelines for resources and citations or creates a document that is clearly written or generally free of grammatical errors. |
Follows APA style and formatting guidelines for resources and citations and creates a document that is clearly written and generally free of grammatical errors |
Follows APA style and formatting guidelines for resources and citations and creates a document that is clearly written, well organized, and completely free of grammatical errors. |
-
Rating:
/5
Solution: capella IT3358: Information Security project