e Server for e-mail

This course project is intended to assess your ability to identify, design, and organize information technology (IT) security policies.

Learning Objectives and Outcomes

You will be able to develop draft IT security policies for an organization and apply learning constructs from the course.

Required Source Information and Tools

Web References: Links to Web references in this document and related materials are subject to change without prior notice. These links were last verified on June 16, 2014.

The following tools and resources will be needed to complete this project:

§  Course textbook

§  Internet access

§  DoD instructions or directiveshttp://www.dtic.mil/whs/directives/

§  Risk Management Framework (RF) for Department of Defense Information Technology (IT) https://csrc.nist.gov/projects/risk-management/risk-management-framework-(RMF)-Overview

§  Department of Defense Information Security Programhttps://www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodm/520001_vol3.pdf

§  Department of Defense Internet Services and Internet-Based Capabilitieshttps://www.hsdl.org/?view&did=722997

§  Department of Defense Proposes New Information Security Requirements for Contractors: https://www.hldataprotection.com/2010/03/articles/cybersecurity-data-breaches/department-of-defense-proposes-new-information-security-requirements-for-contractors/

§  School/public library (optional)

Deliverables

Scenario

You work for a high-tech company with approximately 390 employees. Your firm recently won a large DoD contract, which will add 30% to the revenue of your organization. It is a high-priority, high-visibility project. You will be allowed to make your own budget, project timeline, and tollgate decisions.

This course project will require you to form a team of 4 coworkers (fellow students) and develop the proper DoD security policies required to meet DoD standards for delivery of technology services to the U.S. Air Force Cyber Security Center (AFCSC), a DoD agency. To do this, you must develop DoD-approved policies and standards for your IT infrastructure (see the “Tasks” section below). The policies you create must pass DoD-based requirements. Currently, your organization does not have any DoD contracts and thus has no DoD-compliant security policies or controls in place.

Your firm’s computing environment includes the following:

§  12 servers running Microsoft Server 2012 R2, providing the following:

o   Active Directory (AD)

o   Domain Name System (DNS)

o   Dynamic Host Configuration Protocol (DHCP)

o   Enterprise Resource Planning (ERP) application (Oracle)

o   A Research and Development (R&D) Engineering network segment for testing, separate from the production environment

o   Microsoft Exchange Server for e-mail

o   Symantec e-mail filter

o   Websense for Internet use

§  Two Linux servers running Apache Server to host your Web site

§  390 PCs/laptops running Microsoft Windows 7 or Windows 8, Microsoft Office 2013, Microsoft Visio, Microsoft Project, and Adobe Reader

Tasks

You should:

§  Select a team leader for your project group.

§  Create policies that are DoD compliant for the organization’s IT infrastructure.

§  Develop a list of compliance laws required for DoD contracts.

§  List controls placed on domains in the IT infrastructure.

§  List required standards for all devices, categorized by IT domain.

§  Develop a deployment plan for implementation of these polices, standards, and controls.

§  List all applicable DoD frameworks in the final delivery document.

§  Write a professional report that includes all of the above content-related items.

Submission Requirements

  • Format: Microsoft Word
  • Font: Arial, Size 12, Double-Space
  • Citation Style: APA
  • Length: 4–6 pages

Self-Assessment Checklist

§  I developed a list of compliance laws required for DoD contracts.

§  I listed controls placed on domains in the IT infrastructure.

§  I listed required standards for all devices, categorized by IT domain.

§  I developed DoD policies and standards for our organization’s IT infrastructure.I developed a deployment plan for implementation of these polices, standards, and controls.

§  I listed all applicable DoD frameworks in the final report.

§  I involved myself in each of the lessons and asked my instructor questions.

§  I found additional references/resources than those provided.

§  I created an academic paper describing the policies, standards, and controls that would make our organization DoD compliant.

§  I submitted my work per the deliverable timeline to the instructor for monitoring and comment.

Hide 

Calculate the price of your order

Simple Order Process

Fill in the Order Form

Share all the assignment information. Including the instructions, provided reading materials, grading rubric, number of pages, the required formatting, deadline, and your academic level. Provide any information and announcements shared by the professor. Choose your preferred writer if you have one.

Get Your Order Assigned

Once we receive your order form, we will select the best writer from our pool of experts to fit your assignment.

Share More Data if Needed

You will receive a confirmation email when a writer has been assigned your task. The writer may contact you if they need any additional information or clarifications regarding your task

Let Our Essay Writer Do Their Job

Once you entrust us with your academic task, our skilled writers embark on creating your paper entirely from the ground up. Through rigorous research and unwavering commitment to your guidelines, our experts meticulously craft every aspect of your paper. Our process ensures that your essay is not only original but also aligned with your specific requirements, making certain that the final piece surpasses your expectations.

Quality Checks and Proofreading

Upon the completion of your paper, it undergoes a meticulous review by our dedicated Quality and Proofreading department. This crucial step ensures not only the originality of the content but also its alignment with the highest academic standards. Our seasoned experts conduct thorough checks, meticulously examining every facet of your paper, including grammar, structure, coherence, and proper citation. This comprehensive review process guarantees that the final product you receive not only meets our stringent quality benchmarks but also reflects your dedication to academic excellence.

Review and Download the Final Draft

If you find that any part of the paper does not meet the initial instructions, send it back to us with your feedback, and we will make the necessary adjustments.