DEVRY SEC360 WEEK 2 you decide assignment,week 6 you decide and WEEK 5 Physical Security Simulation Report

Question # 00037612 Posted By: spqr Updated on: 12/18/2014 02:04 PM Due on: 01/21/2015
Subject Business Topic General Business Tutorials:
Question
Dot Image
week 2 you decide


You Decide

Information Systems Use Security Policy: Write a paper consisting of 500-1,000 words (double spaced) about your experience in the Week 1 You Decide exercise. Briefly explain some of the issues that a company may face as it experiences growth, and begin to address the proper use of their information systems.

Students should see Appendix C of the textbook for examples of policies that address the issues that companies may face.

View Grading Rubric

Submit your assignment to the Dropbox located on the silver tab at the top of this page. For instructions on how to use the Dropbox, read thesestep-by-step instructions or watch this








week 5 and 6


YOUDECIDE

Scenario, Your Role, Key Players


Information Systems Use Security Policy

ScenarioScenario descriptionRoleWhat is Your Role in this scenario?PlayersLearn more about the Key Players in this scenario.DeliverableWhat would you to resolve this scenario?

Scenario

Sunshine Machine Works, who recently expanded its infrastructure, now needs to ensure that any authorized employee can access the intranet. Sales people and management staff frequently travel to remote locations, and often require access to documents stored on the intranet file server.00:00

Role

You are the IT Services manager for Sunshine Machine Works. You are to assess the information presented and provide a response to management on how remote access may be handled for Sunshine Machine Works.00:00

Players

StoneChief Executive Officer Margie NelsonChief Financial Officer GarThomasGeneral Manager

Deliverable

Given the scenario, your role and the information provided by the key players involved, it is time for you to make a decision.<br><br>If you are finished reviewing this scenario, close this window and return to this Week's You Decide tab, in eCollege, to complete the activity for this scenario.<br><br>You can return and review this scenario again at any time.

YOUDECIDE

Activity

Assignment

Since you are responsible for IT Services and want to keep the systems and network functioning effectively, you will want to provide technical guidance and leadership on this issue.

Follow the instructions provided in the You Decide Exercise: Cryptographic Tunneling and the OSI Model.

  • Write a paper consisting of 500-1,000 words (double-spaced) on the security effects of cryptographic tunneling based on an understanding of the OSI (Open Systems Interconnect) model.
  • Review the OSI Simulation in the week 3 lecture.
  • Provide input on the type of cryptographic tunneling protocols (e.g., L2TP, IPSEC, SSL, etc.) which may be used, the layer(s) of the OSI at which each operates, and also recommend how they may be implemented. Cryptographic tunneling is inherent in building any common virtual private network (VPN).

Grading Rubric:

CategoryPointsDescription
Understanding20Demonstrate a strong grasp of the problem at hand. Demonstrate understanding of how the course concepts apply to the problem.
Analysis20Apply original thought to solving the business problem. Apply concepts from the course material correctly toward solving the business problem.
Execution10Write your answer clearly and succinctly using strong organization and proper grammar. Use citations correctly.
Total50A quality paper will meet or exceed all of the above requirements.
Note!

Submit your assignment to the Dropbox located on the silver tab at the top of this page. For instructions on how to use the Dropbox





Cryptographic Tunneling and the OSI Model

Write a paper consisting of 500-1,000 words (double-spaced) on the security effects of cryptographic tunneling based on an understanding of the OSI (Open Systems Interconnect) model (Review the OSI Simulation in the Week 3 Lecture).

Provide input on the type of cryptographic tunneling protocols (e.g., L2TP, IPSEC, SSL, etc.) that may be used, the layer(s) of the OSI at which each operates, and also recommend how they may be implemented. Cryptographic tunneling is inherent in building any common virtual private network (VPN).

View Grading Rubric

Submit your assignment to the Dropbox located on the silver tab at the top of this page. For instructions on how to use the Dropbox, read these step-by-step instructions


Physical Security Simulation Report

Compose a report on the experience of performing the Physical Security survey. Students will write a report consisting of 250-500 words (double-spaced) on experiences in the Physical Security Simulation (see tab under Week 4).

View Grading Rubric

Submit your assignment to the Dropbox located on the silver tab at the top of this page. For instructions on how to use the Dropbox, read thesestep-by-step instructions



Physical Security Simulation Report

Compose a report on student experience in performing the Physical Security survey. Students will write a 250--500 word report (double-spaced) on experiences in the Physical Security Simulation.

Note: The correct information for the physical security survey is provided at the end of the simulation. The people who were interviewed were aware ahead of time that the survey was to take place and were also aware of the problems of concern to management.

Students should focus on the problems of acquiring good information through a physical security survey. Did the people you interviewed mislead you (either intentionally or unintentionally)? How did you go about obtaining good or correct information?

The purpose of this project is to make students aware of some important issues that arise in a facility security survey.


Dot Image
Tutorials for this Question
  1. Tutorial # 00036869 Posted By: spqr Posted on: 12/18/2014 02:05 PM
    Puchased By: 3
    Tutorial Preview
    The solution of DEVRY SEC360 WEEK 2 you decide assignment,week 6 you decide and DEVRY SEC360 WEEK 5 Physical Security Simulation Report...
    Attachments
    DEVRY_SEC360_WEEK_2_you_decide_assignment.docx (18.52 KB)
    DEVRY_SEC360_WEEK_6_you_decide_assignment.docx (24.71 KB)
    Physical_Security_Survey_Sec360_week_5.docx (19.57 KB)
    Recent Feedback
    Rated By Feedback Comments Rated On
    fa...unga Rating Tutorials helped secure A+ grade 08/19/2015

Great! We have found the solution of this question!

Whatsapp Lisa