Project: Department of Defense (DoD) Ready

[ad_1]
Purpose This course project is intended to assess your ability to identify, design, and organize information technology (IT) security policies. Learning Objectives and Outcomes You will be able to develop draft IT security policies for an organization and apply learning constructs from the course. Required Source Information and Tools The following tools and resources will be needed to complete this project: Course textbookDoD instructions or directives http://www.dtic.mil/whs/directives/Risk Management Framework (RF) for Department of Defense Information Technology (IT) http://www.dtic.mil/whs/directives/corres/pdf/8510… and http://www.rmf.org/images/stories/rmf_documents/85…Department of Defense Information Security Program http://www.fas.org/irp/doddir/dod/5200-1r/ Department of Defense Internet Services and Internet-Based Capabilities http://www.dtic.mil/whs/directives/corres/pdf/8550…Department of Defense Proposes New Information Security Requirements for Contractors: http://www.hldataprotection.com/2010/03/articles/c…School/public library (optional)12 servers running Microsoft Server 2012 R2, providing the following:Active Directory (AD)Domain Name System (DNS)Dynamic Host Configuration Protocol (DHCP)Enterprise Resource Planning (ERP) application (Oracle)A Research and Development (R&D) Engineering network segment for testing, separate from the production environmentMicrosoft Exchange Server for e-mailSymantec e-mail filterWebsense for Internet useTwo Linux servers running Apache Server to host your Web site390 PCs/laptops running Microsoft Windows 7 or Windows 8, Microsoft Office 2013, Microsoft Visio, Microsoft Project, and Adobe ReaderSelect a team leader for your project group.Create policies that are DoD compliant for the organization’s IT infrastructure.Develop a list of compliance laws required for DoD contracts.List controls placed on domains in the IT infrastructure.List required standards for all devices, categorized by IT domain.Develop a deployment plan for implementation of these polices, standards, and controls.List all applicable DoD frameworks in the final delivery document.Write a professional report that includes all of the above content-related items.I developed a list of compliance laws required for DoD contracts.I listed controls placed on domains in the IT infrastructure.I listed required standards for all devices, categorized by IT domain.I developed DoD policies and standards for our organization’s IT infrastructure.I developed a deployment plan for implementation of these polices, standards, and controls.I listed all applicable DoD frameworks in the final report.I found additional references/resources than those provided.I created an academic paper describing the policies, standards, and controls that would make our organization DoD compliant.I submitted my work by the due date including the PPT slides. Scenario You work for a high-tech company with approximately 390 employees. Your firm recently won a large DoD contract, which will add 30% to the revenue of your organization. It is a high-priority, high-visibility project. You will be allowed to make your own budget, project timeline, and tollgate decisions. This course project will require you to form a team and develop the proper DoD security policies required to meet DoD standards for delivery of technology services to the U.S. Air Force Cyber Security Center (AFCSC), a DoD agency. To do this, you must develop DoD-approved policies and standards for your IT infrastructure (see the “Tasks” section below). The policies you create must pass DoD-based requirements. Currently, your organization does not have any DoD contracts and thus has no DoD-compliant security policies or controls in place. Your firm’s computing environment includes the following: Tasks You should: Submission Requirements Format: Microsoft Word Font: Times New Roman, Size 12, Double-Space Citation Style: APA format At least 10 references (including the book) Length10-12 pages (not including title page and references pages) Self-Assessment Checklist Your paper should not be in list format. It should be in proper paper format with paragraphs, section headings, and properly formatted sentences. Lists can be used, but kept to a minimum throughout the document.
[ad_2]Source link
 
“Looking for a Similar Assignment? Get Expert Help at an Amazing Discount!”

What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but splendidwritings.com proved they are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 14***| Rating: ⭐⭐⭐⭐⭐
"The company has some nice prices and good content. I ordered a term paper here and got a very good one. I'll keep ordering from this website."

"Order a Custom Paper on Similar Assignment! No Plagiarism! Enjoy 20% Discount"