Home » Uncategorized » Term Project Guidelines Scenario

No More Worries!

image Our orders are delivered strictly on time without delay

Paper Formatting

  • Double or single-spaced
  • 1-inch margin
  • 12 Font Arial or Times New Roman
  • 300 words per page

Our Guarantees

image

  • Free Unlimited revisions
  • Guaranteed Privacy
  • Money Return guarantee
  • Plagiarism Free Writing

Coupon Code

Term Project Guidelines Scenario

Paper , Order, or Assignment Requirements

Scenario
You work for a high-tech company with approximately 400 employees. Your firm recently won a large Department of Defense (DoD) contract, which will add 30% to the revenue of your organization. It is a high-priority, high-visibility project. You will be allowed to make your own budget, project timeline, and tollgate decisions.
This project requires developing the proper DoD security policies required to meet DoD standards for delivery of technology services to the U.S. Air Force Cyber Security Center (AFCSC), a DoD agency. To do this, you must develop DoD-approved policies and standards for your IT infrastructure (see the “Tasks” section below). The policies you create must pass DoD-based requirements. Currently, your organization does not have any DoD contracts and thus has no DoD compliant security policies or controls in place.
Your firm’s computing environment includes the following:
• 12 servers running Microsoft Server 2008 R2, providing the following:
o Active Directory (AD) o Domain Name System (DNS)
o Dynamic Host Configuration Protocol (DHCP)
o Enterprise Resource Planning (ERP) application (Oracle)
o A Research and Development (R&D) Engineering network segment for testing, separate from the production environment
o Microsoft Exchange Server for e-mail
o Symantec e-mail filter
o Websense for Internet use.
• Two Linux servers running Apache Server to host your Web site
• 390 PCs/laptops running Microsoft Windows 7, Microsoft Office 2007, Microsoft Visio, Microsoft Project, and Adobe Reader.
Tasks
• Create policies that are DoD compliant for the organization’s IT infrastructure.
• Develop a list of compliance laws required for DoD contracts.
• List controls placed on domains in the IT infrastructure.
• List required standards for all devices, categorized by IT domain.
• Develop a deployment plan for implementation of these polices, standards, and controls.
• List all applicable DoD frameworks in the final delivery document.
• Write a professional report that includes all of the above content-related items

Internet Sites
DoD instructions or directives
http://www.dtic.mil/whs/directives/
Department of Defense Information Assurance Certification and Accreditation Process (DIACAP) Instruction—DoDI 8510.01
www.dtic.mil/whs/directives/corres/pdf/851001_2014.pdf
Department of Defense Information Security Program
http://www.fas.org/irp/doddir/dod/5200-1r/
Department of Defense Internet Services and Internet-Based Capabilities http://www.dtic.mil/whs/directives/corres/pdf/855001p.pdf
Department of Defense Proposes New Information Security Requirements for Contractors: http://www.hldataprotection.com/2010/03/articles/cybersecurity-data-breaches/department-ofdefense-proposes-new-information-security-requirements-for-contractors/

findout

Follow Us

Facebook
Twitter
Google+

Free Price Quote

Subject:
Type:
Pages/Words:
Single spaced
approx 275 words per page
Urgency:
Level:
Currency:
Total Cost:

Why Choose Us

image

  • Money Return guarantee
  • Guaranteed Privacy
  • Written by Professionals
  • Paper Written from Scratch
  • Timely Deliveries
  • Free Amendments