CIS 598 Week 7 Infrastructure and Security
Week 7 Infrastructure and Security
Instructions
This is a two-part deliverable using MS Word and MS Visio, or their open source
equivalents. You are the chief security officer (CSO) of a law office that occupies four
floors of a high-rise building in downtown Washington, D.C. There are approximately 50
PCs on the first floor, 150 PCs on the second floor, and 40 PCs on both the third and
fourth floors. The servers for each department reside on their respective floors. The
director of the accounting department has expressed concerns about the security of his
files. For this assignment, you will explain the key functions of a cybersecurity policy
catalog. Note: You may create or make all necessary assumptions needed for the
completion of this assignment.
https://hwacer.com/Tutorial/cis-598-week-7-infrastructure-and-security/
Submission Requirements
Document (MS Word).
Microsoft Visio Plan (MS Visio).
Section 1
Write a 3–4 page deliverable in which you:
Explain the major cyber governance issues in an organization, and examine how organizations
develop communication protocols because of those issues.
Describe the security issues found on a network, and arrange them from highest to lowest,
mapping out security loopholes to justify your answer.
Differentiate between intellectual property theft and cyber espionage. Determine how you, as the
CSO of an organization, would deal with both cases and what standard operating procedures you
would follow.
Section 2
Complete the following:
Using Microsoft Visio, or an open source alternative such as Dia, illustrate the flow of data for
both input and output information in an infrastructure. The diagram must map any issues in terms
of a cyber infrastructure.
This course requires the use of Strayer Writing Standards. For assistance and
information, please refer to the Strayer Writing Standards link in the left-hand menu of
your course.
The specific course learning outcome associated with this assignment is:
Determine the major cyber governance and infrastructure security issues for an organization.
No comments:
Post a Comment
Note: only a member of this blog may post a comment.