Principles of Information Assurance

This is not a “two page paper.” This is a comprehensive Major Summative Assessment that measures your understanding of the Butler assessed outcomes. You should include in your assignment information that shows your understanding of the assessed outcomes. Part of this document should be formatted as a technical paper, and part of the document should be formatted as instructor led training. I would recommend performing your security assessment and writing that as a technical document.
Scenario:
You have been hired as an Information Security Consultant for a small computer research company.
The company expects to grow twice its size over the next 3 years. Management has set Information Security as the number one priority in its growth plan.
The company’s campus environment includes two buildings in an industrial park and 50 users including a Trusted Partner located in a different State.
The workstations are of the Windows variety (Windows 7, Windows 8, and XP – hint keep security in mind). Static IP addresses are assigned to common resources (Application Servers, Web Servers and e-mail server) and DHCP is used for the workstations. The company has designed and assigned its IP subnets to different offices and departments. However, this may be more difficult to maintain as the company grows.
The Challenge: What can you recommend to improve the security footprint of this company? As you do your security review, keep in mind the elements listed in Part A and Part B as well as the 4 Butler assessed outcomes. Grading will be based upon inclusion of assessed outcomes along with depth and detail of assignment elements..
Butler assessed outcomes:

  1. Integrate basic security devices.
  2. Prevent network devices against cyber-attack.
  3. Identify the ethical and legal environment in which security is implemented.
  4. Explain current attack techniques and cyber threats.
    Part A
    Develop an Information Security Plan in writing, outlining security applications that you recommend to insure Information Security now and for the expected growth. Your document should be divided into two parts, the security assessment, and the employee training applicable to each element. The security assessment will be formatted as a technical document and the training material will be formatted and submitted in the form of a instructor led training event
    Include in your assessment:
  5. Work station / server protection
  6. Protection from the Internet
  7. Safeguards from employee errors or attacks
  8. Include Security Technologies (Firewalls, VPNs, Intrusion Detection and Other Security Tools
  9. Describe the Encryption method you would recommend, if any.
  10. Risk and Recovery Analysis comprehensive outline.
  11. Physical security requirements

Part B:
Develop an employee training class that includes:

  1. Current Attack Techniques used by adversaries
  2. Current cyber threats
  3. Basic security measures employees should follow. (address assessed security concerns listed in Part A.)
  4. Reporting process for employees to follow when they observe security anomalies.

Requirements:

Show Web Site URLs on a resource page(do not use the text book or Wikipedia as a reference)
No plagiarism (do not cut and paste any information from the Web, do your own work)
Your paper should include a Resource page. I am not listing a minimum number of pages because I do not want you to focus on the number of pages, but rather the content

Do you need urgent help with this or a similar assignment? We got you. Simply place your order and leave the rest to our experts.

Order Now

Quality Guaranteed!

Written From Scratch.

We Keep Time!

Scroll to Top