DEVRY SEC360 WEEK 2 you decide assignment,week 6 you decide and WEEK 5 Physical Security Simulation Report Question # 00037612 Posted By: spqr Updated on: 12/18/2014 02:04 PM Due on: 01/21/2015 Subject Business Topic General Business Tutorials: 1 See full Answer Question week 2 you decideYou DecideInformation Systems Use Security Policy: Write a paper consisting of 500-1,000 words (double spaced) about your experience in the Week 1 You Decide exercise. Briefly explain some of the issues that a company may face as it experiences growth, and begin to address the proper use of their information systems.Students should see Appendix C of the textbook for examples of policies that address the issues that companies may face.View Grading RubricSubmit your assignment to the Dropbox located on the silver tab at the top of this page. For instructions on how to use the Dropbox, read thesestep-by-step instructions or watch thisweek 5 and 6YOUDECIDEScenario, Your Role, Key PlayersInformation Systems Use Security PolicyScenarioScenario descriptionRoleWhat is Your Role in this scenario?PlayersLearn more about the Key Players in this scenario.DeliverableWhat would you to resolve this scenario?ScenarioSunshine Machine Works, who recently expanded its infrastructure, now needs to ensure that any authorized employee can access the intranet. Sales people and management staff frequently travel to remote locations, and often require access to documents stored on the intranet file server.Play00:00MuteRoleYou are the IT Services manager for Sunshine Machine Works. You are to assess the information presented and provide a response to management on how remote access may be handled for Sunshine Machine Works.Play00:00MutePlayers StoneChief Executive Officer Margie NelsonChief Financial Officer GarThomasGeneral ManagerDeliverableGiven the scenario, your role and the information provided by the key players involved, it is time for you to make a decision.<br><br>If you are finished reviewing this scenario, close this window and return to this Week's You Decide tab, in eCollege, to complete the activity for this scenario.<br><br>You can return and review this scenario again at any time.YOUDECIDEActivityAssignmentSince you are responsible for IT Services and want to keep the systems and network functioning effectively, you will want to provide technical guidance and leadership on this issue.Follow the instructions provided in the You Decide Exercise: Cryptographic Tunneling and the OSI Model.Write a paper consisting of 500-1,000 words (double-spaced) on the security effects of cryptographic tunneling based on an understanding of the OSI (Open Systems Interconnect) model.Review the OSI Simulation in the week 3 lecture.Provide input on the type of cryptographic tunneling protocols (e.g., L2TP, IPSEC, SSL, etc.) which may be used, the layer(s) of the OSI at which each operates, and also recommend how they may be implemented. Cryptographic tunneling is inherent in building any common virtual private network (VPN).Grading Rubric:CategoryPointsDescriptionUnderstanding20Demonstrate a strong grasp of the problem at hand. Demonstrate understanding of how the course concepts apply to the problem.Analysis20Apply original thought to solving the business problem. Apply concepts from the course material correctly toward solving the business problem.Execution10Write your answer clearly and succinctly using strong organization and proper grammar. Use citations correctly.Total50A quality paper will meet or exceed all of the above requirements.Note!Submit your assignment to the Dropbox located on the silver tab at the top of this page. For instructions on how to use the DropboxCryptographic Tunneling and the OSI ModelWrite a paper consisting of 500-1,000 words (double-spaced) on the security effects of cryptographic tunneling based on an understanding of the OSI (Open Systems Interconnect) model (Review the OSI Simulation in the Week 3 Lecture).Provide input on the type of cryptographic tunneling protocols (e.g., L2TP, IPSEC, SSL, etc.) that may be used, the layer(s) of the OSI at which each operates, and also recommend how they may be implemented. Cryptographic tunneling is inherent in building any common virtual private network (VPN).View Grading RubricSubmit your assignment to the Dropbox located on the silver tab at the top of this page. For instructions on how to use the Dropbox, read these step-by-step instructionsPhysical Security Simulation ReportCompose a report on the experience of performing the Physical Security survey. Students will write a report consisting of 250-500 words (double-spaced) on experiences in the Physical Security Simulation (see tab under Week 4).View Grading RubricSubmit your assignment to the Dropbox located on the silver tab at the top of this page. For instructions on how to use the Dropbox, read thesestep-by-step instructionsPhysical Security Simulation ReportCompose a report on student experience in performing the Physical Security survey. Students will write a 250--500 word report (double-spaced) on experiences in the Physical Security Simulation.Note: The correct information for the physical security survey is provided at the end of the simulation. The people who were interviewed were aware ahead of time that the survey was to take place and were also aware of the problems of concern to management.Students should focus on the problems of acquiring good information through a physical security survey. Did the people you interviewed mislead you (either intentionally or unintentionally)? How did you go about obtaining good or correct information?The purpose of this project is to make students aware of some important issues that arise in a facility security survey. Rating: 4.9/5
Solution: DEVRY SEC360 WEEK 2 you decide assignment,week 6 you decide and DEVRY SEC360 WEEK 5 Physical Security Simulation Report