SlideShare a Scribd company logo
1 of 8
I need 10 pages of report and 10 slides
Purpose
This course project is intended to assess your ability to
comprehend and apply the basic concepts related to information
security management, such as the following:
The ability to discern when a risk assessment should be
performed and carrying out the task
Understanding user or customer access requirements, whether
remote or local
Using a layered security approach to establish and maintain
access controls
Working with other departments, such as the human resources
department, to identify and implement methods to prevent
unwarranted exposure to information by inappropriate personnel
Your ability to execute the tasks within these information
security domains and others will be evaluated against the
learning objectives as identified and described in previous
lessons of instruction for this course.
Required Source Information and Tools
The following tools and resources will be needed to complete
this project:
Course textbook
Access to the Internet
Access to the library
Text sheet: Integrated Distributors Incorporated
(access_project_ts_integrateddistributors)
Learning Objectives and Outcomes
Successful completion of this project will ensure that you are
capable of supporting the implementation and management of an
information systems security framework. To be able to do so,
you need to be able to do the following:
Relate how an access control policy framework is used to define
authorization and access to an information technology (IT)
infrastructure for compliance.
Mitigate risks to an IT infrastructure’s confidentiality, integrity,
and availability with sound access controls.
Relate how a data classification standard influences an IT
infrastructure’s access control requirements and
implementation.
Develop an access control policy framework consisting of best
practices for policies, standards, procedures, and guidelines to
mitigate unauthorized access.
Define proper security controls within the User Domain to
mitigate risks and threats caused by human nature and behavior.
Implement appropriate access controls for information systems
within IT infrastructures.
Mitigate risks from unauthorized access to IT systems through
proper testing and reporting.
Project Checkpoints
The course project has a checkpoint strategy. Checkpoint
deliverables allow you to receive valuable feedback on your
interim work. In this project, you have four ungraded
checkpoint deliverables. (See the syllabus for the schedule.)
You may discuss project questions with the instructor, and you
should receive feedback from the instructor on previously
submitted work. The checkpoint deliverable ensures refinement
of the final deliverables, if incorporated effectively. The final
deliverable for this project is a professional report and a
PowerPoint presentation.
Checkpoint
Purpose of the Checkpoint
Expected Deliverables
1
Understanding requirements
Clarification on project deliverables
Discussion on project concerns and progress up to this
checkpoint
A review of the course project’s outline and schedule for
completion
Prepare an initial outline of issues and potential solutions and
discuss with your instructor, the chief information officer
(CIO).
2
Clarification on project deliverables
Discussion on project concerns and progress up to this
checkpoint
A review of the course project’s outline and schedule for
completion
Prepare an extended outline of issues and potential solutions
and discuss with your instructor, the CIO.
3
Clarification on project deliverables
Discussion on project concerns and progress up to this
checkpoint
A review of the course project’s outline and schedule for
completion
Draft the report and the PowerPoint presentation to discuss with
your instructor, the CIO.
4
Clarification on project deliverables
Discussion on project concerns and progress up to this
checkpoint
A review of the course project’s outline and schedule for
completion
Modify the report and the PowerPoint presentation based on
feedback from your instructor, the CIO.
Deliverables
Introduction
User identification, authentication, and authorization are
essential in developing, implementing, and maintaining a
framework for information system security. The basic function
of an information system security framework is to ensure the
confidentiality and the integrity, as well as the availability of
systems, applications, and data. Certain information security
implementation and management knowledge is required of
network administrators, IT service personnel, management, and
IT security practitioners, such as information security officers,
security analysts, and domain administrators.
Scenario
You are provided with the text sheet entitled Integrated
Distributors Incorporated
(access_project_ts_integrateddistributors.docx) to complete this
project. You play the dual role of an IT architect and IT security
specialist working for Integrated Distributors Incorporated
(IDI), a multi-national organization with offices in several
countries. Your instructor for this course plays the role of the
chief information officer (CIO). Your peers play the role of
selected technology staff. Each of the organization’s locations
is operating with different information technologies and
infrastructure—IT systems, applications, and databases. Various
levels of IT security and access management have been
implemented and embedded within their respective locations.
Tasks
Your goals as the IT architect and IT security specialist are to:
Develop solutions to the issues that the specified location of IDI
is facing.
Develop plans to implement corporate-wide information access
methods to ensure confidentiality, integrity, and availability.
Assess risks and vulnerabilities with operating IT facilities in
the disparate locations where IDI now functions and develop
mitigation plans and implementation methods.
Analyze the strengths and weaknesses in the current systems of
IDI.
Address remote user and Web site user’s secure access
requirements.
Develop a proposed budget for the project—consider hardware,
software, upgrades/replacements, and consulting services.
Prepare detailed network and configuration diagrams outlining
the proposed change to be able to present it to the management.
Develop and submit a comprehensive report addressing the
learning objectives and your solutions to the issues within the
scenario.
Prepare a 10- to 15-slide PowerPoint presentation that addresses
important access control, infrastructure, and management
aspects from each location.
Self-Assessment Checklist
I have considered an access control policy framework to define
authorization and access to an IT infrastructure for compliance
within the course project.
I have considered the influence of the data classification
standard in an IT infrastructure’s access control requirements
and implementation.
I have defined proper security controls within the User Domain
to mitigate risk and threats caused by human nature and
behavior.
I have developed and implemented an effective plan to mitigate
risks to an IT infrastructure’s confidentiality, integrity, and
availability with sound access controls.
I have developed an access control policy framework consisting
of best practices for policies, standards, procedures, and
guidelines to mitigate unauthorized access.
I have implemented appropriate access controls for information
systems within IT infrastructures.
I have followed the submission requirements and necessary
details for writing the report.

More Related Content

Similar to I need 10 pages of report and 10 slides PurposeThis course p

Running Header 1SYSTEM ARCHITECTURE24Gr.docx
Running Header  1SYSTEM ARCHITECTURE24Gr.docxRunning Header  1SYSTEM ARCHITECTURE24Gr.docx
Running Header 1SYSTEM ARCHITECTURE24Gr.docxrtodd599
 
Notes On Intranet Implementation And Roadmap
Notes On Intranet Implementation And RoadmapNotes On Intranet Implementation And Roadmap
Notes On Intranet Implementation And RoadmapAlan McSweeney
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woeleanorabarrington
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYShivananda Rai
 
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
Running Header  1SYSTEM ARCHITECTURE2Unit .docxRunning Header  1SYSTEM ARCHITECTURE2Unit .docx
Running Header 1SYSTEM ARCHITECTURE2Unit .docxrtodd599
 
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
Running Header  1APPLICATION DEVELOPMENT METHODS2.docxRunning Header  1APPLICATION DEVELOPMENT METHODS2.docx
Running Header 1APPLICATION DEVELOPMENT METHODS2.docxrtodd599
 
DIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxDIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxcuddietheresa
 
Lecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptxLecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptxYaseenNazir3
 
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docxoswald1horne84988
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxbradburgess22840
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxdeanmtaylor1545
 
Lecture 2 introduction to Software Engineering 1
Lecture 2   introduction to Software Engineering 1Lecture 2   introduction to Software Engineering 1
Lecture 2 introduction to Software Engineering 1IIUI
 
Software For Software Development Life Cycle
Software For Software Development Life CycleSoftware For Software Development Life Cycle
Software For Software Development Life CycleChristina Padilla
 
CIS 599 – Student Notes(Prerequisite To be taken last or ne.docx
CIS 599 – Student Notes(Prerequisite To be taken last or ne.docxCIS 599 – Student Notes(Prerequisite To be taken last or ne.docx
CIS 599 – Student Notes(Prerequisite To be taken last or ne.docxclarebernice
 
Week Four JournalObjectiveYou will identify key ethical proble.docx
Week Four JournalObjectiveYou will identify key ethical proble.docxWeek Four JournalObjectiveYou will identify key ethical proble.docx
Week Four JournalObjectiveYou will identify key ethical proble.docxalanfhall8953
 
Software engg. pressman_ch-21
Software engg. pressman_ch-21Software engg. pressman_ch-21
Software engg. pressman_ch-21Dhairya Joshi
 
Managing Software Project
Managing Software ProjectManaging Software Project
Managing Software ProjectAnas Bilal
 
Pmw2 k3ni 1-1a
Pmw2 k3ni 1-1aPmw2 k3ni 1-1a
Pmw2 k3ni 1-1ahariclant1
 

Similar to I need 10 pages of report and 10 slides PurposeThis course p (20)

Running Header 1SYSTEM ARCHITECTURE24Gr.docx
Running Header  1SYSTEM ARCHITECTURE24Gr.docxRunning Header  1SYSTEM ARCHITECTURE24Gr.docx
Running Header 1SYSTEM ARCHITECTURE24Gr.docx
 
Notes On Intranet Implementation And Roadmap
Notes On Intranet Implementation And RoadmapNotes On Intranet Implementation And Roadmap
Notes On Intranet Implementation And Roadmap
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
 
CLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITYCLOUD CPOMPUTING SECURITY
CLOUD CPOMPUTING SECURITY
 
An Introduction to Project management(project management tutorials)
An Introduction to Project management(project management tutorials)An Introduction to Project management(project management tutorials)
An Introduction to Project management(project management tutorials)
 
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
Running Header  1SYSTEM ARCHITECTURE2Unit .docxRunning Header  1SYSTEM ARCHITECTURE2Unit .docx
Running Header 1SYSTEM ARCHITECTURE2Unit .docx
 
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
Running Header  1APPLICATION DEVELOPMENT METHODS2.docxRunning Header  1APPLICATION DEVELOPMENT METHODS2.docx
Running Header 1APPLICATION DEVELOPMENT METHODS2.docx
 
DIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docxDIRECTIONSRate each statement by how well the behavior describe.docx
DIRECTIONSRate each statement by how well the behavior describe.docx
 
Lecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptxLecture-1,2-Introduction to SE.pptx
Lecture-1,2-Introduction to SE.pptx
 
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
· THE INDUSTRY AND THE COMPANY AND ITS PRODUCT(S) OR SERVICE(S)A.docx
 
Object oriented analysis and design unit- i
Object oriented analysis and design unit- iObject oriented analysis and design unit- i
Object oriented analysis and design unit- i
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docx
 
TaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docxTaskYou are required to prepare for this Assessment Item by1..docx
TaskYou are required to prepare for this Assessment Item by1..docx
 
Lecture 2 introduction to Software Engineering 1
Lecture 2   introduction to Software Engineering 1Lecture 2   introduction to Software Engineering 1
Lecture 2 introduction to Software Engineering 1
 
Software For Software Development Life Cycle
Software For Software Development Life CycleSoftware For Software Development Life Cycle
Software For Software Development Life Cycle
 
CIS 599 – Student Notes(Prerequisite To be taken last or ne.docx
CIS 599 – Student Notes(Prerequisite To be taken last or ne.docxCIS 599 – Student Notes(Prerequisite To be taken last or ne.docx
CIS 599 – Student Notes(Prerequisite To be taken last or ne.docx
 
Week Four JournalObjectiveYou will identify key ethical proble.docx
Week Four JournalObjectiveYou will identify key ethical proble.docxWeek Four JournalObjectiveYou will identify key ethical proble.docx
Week Four JournalObjectiveYou will identify key ethical proble.docx
 
Software engg. pressman_ch-21
Software engg. pressman_ch-21Software engg. pressman_ch-21
Software engg. pressman_ch-21
 
Managing Software Project
Managing Software ProjectManaging Software Project
Managing Software Project
 
Pmw2 k3ni 1-1a
Pmw2 k3ni 1-1aPmw2 k3ni 1-1a
Pmw2 k3ni 1-1a
 

More from doylymaura

Inventory Management Homework Set  You work in the administrat.docx
Inventory Management Homework Set  You work in the administrat.docxInventory Management Homework Set  You work in the administrat.docx
Inventory Management Homework Set  You work in the administrat.docxdoylymaura
 
Inventory Costing Methods Please respond to the followingUse.docx
Inventory Costing Methods Please respond to the followingUse.docxInventory Costing Methods Please respond to the followingUse.docx
Inventory Costing Methods Please respond to the followingUse.docxdoylymaura
 
Inventory Costing Methods Please respond to the followingUse th.docx
Inventory Costing Methods Please respond to the followingUse th.docxInventory Costing Methods Please respond to the followingUse th.docx
Inventory Costing Methods Please respond to the followingUse th.docxdoylymaura
 
Intrusion Detection Systems Objectives In this lab, st.docx
Intrusion Detection Systems Objectives In this lab, st.docxIntrusion Detection Systems Objectives In this lab, st.docx
Intrusion Detection Systems Objectives In this lab, st.docxdoylymaura
 
Introduction Understanding culture is essential for effectively ex.docx
Introduction Understanding culture is essential for effectively ex.docxIntroduction Understanding culture is essential for effectively ex.docx
Introduction Understanding culture is essential for effectively ex.docxdoylymaura
 
Inventory Management Homework Set You work in the .docx
Inventory Management Homework Set You work in the .docxInventory Management Homework Set You work in the .docx
Inventory Management Homework Set You work in the .docxdoylymaura
 
IntroductionI am 43 years old and married with three childre.docx
IntroductionI am 43 years old and married with three childre.docxIntroductionI am 43 years old and married with three childre.docx
IntroductionI am 43 years old and married with three childre.docxdoylymaura
 
IntroductionThroughout this course, the breadth and depth of you.docx
IntroductionThroughout this course, the breadth and depth of you.docxIntroductionThroughout this course, the breadth and depth of you.docx
IntroductionThroughout this course, the breadth and depth of you.docxdoylymaura
 
IntroductionPg. 2The Arrival Of Violence As A Key Component Of T.docx
IntroductionPg. 2The Arrival Of Violence As A Key Component Of T.docxIntroductionPg. 2The Arrival Of Violence As A Key Component Of T.docx
IntroductionPg. 2The Arrival Of Violence As A Key Component Of T.docxdoylymaura
 
IntroductionPatients usually go through a lot and in most inst.docx
IntroductionPatients usually go through a lot and in most inst.docxIntroductionPatients usually go through a lot and in most inst.docx
IntroductionPatients usually go through a lot and in most inst.docxdoylymaura
 
INTRODUCTION TO TERRORISMONLY ONE PARAGRAPH FOR THIS DISCUSSION ON.docx
INTRODUCTION TO TERRORISMONLY ONE PARAGRAPH FOR THIS DISCUSSION ON.docxINTRODUCTION TO TERRORISMONLY ONE PARAGRAPH FOR THIS DISCUSSION ON.docx
INTRODUCTION TO TERRORISMONLY ONE PARAGRAPH FOR THIS DISCUSSION ON.docxdoylymaura
 
IntroductionIn this module, you have learned about the intention.docx
IntroductionIn this module, you have learned about the intention.docxIntroductionIn this module, you have learned about the intention.docx
IntroductionIn this module, you have learned about the intention.docxdoylymaura
 
IntroductionBody part (literature review) which includesT.docx
IntroductionBody part (literature review) which includesT.docxIntroductionBody part (literature review) which includesT.docx
IntroductionBody part (literature review) which includesT.docxdoylymaura
 
Introduction to SociologyAll work must be original in APA Format, .docx
Introduction to SociologyAll work must be original in APA Format, .docxIntroduction to SociologyAll work must be original in APA Format, .docx
Introduction to SociologyAll work must be original in APA Format, .docxdoylymaura
 
Introduction to Sociology Unit 5 ProjectTextbook Help Macio.docx
Introduction to Sociology Unit 5 ProjectTextbook Help Macio.docxIntroduction to Sociology Unit 5 ProjectTextbook Help Macio.docx
Introduction to Sociology Unit 5 ProjectTextbook Help Macio.docxdoylymaura
 
INTRODUCTION TO CORRECTIONS  ONLY ONE PARAGRAPH AND A HALFInstruct.docx
INTRODUCTION TO CORRECTIONS  ONLY ONE PARAGRAPH AND A HALFInstruct.docxINTRODUCTION TO CORRECTIONS  ONLY ONE PARAGRAPH AND A HALFInstruct.docx
INTRODUCTION TO CORRECTIONS  ONLY ONE PARAGRAPH AND A HALFInstruct.docxdoylymaura
 
Introduction One or two pages to introduce the issue, group, or.docx
Introduction One or two pages to introduce the issue, group, or.docxIntroduction One or two pages to introduce the issue, group, or.docx
Introduction One or two pages to introduce the issue, group, or.docxdoylymaura
 
Introduction on Islamic philosophy In order to write about evolut.docx
Introduction on Islamic philosophy In order to write about evolut.docxIntroduction on Islamic philosophy In order to write about evolut.docx
Introduction on Islamic philosophy In order to write about evolut.docxdoylymaura
 
Introduction to Assignment This assignment contains a number of s.docx
Introduction to Assignment This assignment contains a number of s.docxIntroduction to Assignment This assignment contains a number of s.docx
Introduction to Assignment This assignment contains a number of s.docxdoylymaura
 
Introduction to Assignment This assignment contains a number .docx
Introduction to Assignment This assignment contains a number .docxIntroduction to Assignment This assignment contains a number .docx
Introduction to Assignment This assignment contains a number .docxdoylymaura
 

More from doylymaura (20)

Inventory Management Homework Set  You work in the administrat.docx
Inventory Management Homework Set  You work in the administrat.docxInventory Management Homework Set  You work in the administrat.docx
Inventory Management Homework Set  You work in the administrat.docx
 
Inventory Costing Methods Please respond to the followingUse.docx
Inventory Costing Methods Please respond to the followingUse.docxInventory Costing Methods Please respond to the followingUse.docx
Inventory Costing Methods Please respond to the followingUse.docx
 
Inventory Costing Methods Please respond to the followingUse th.docx
Inventory Costing Methods Please respond to the followingUse th.docxInventory Costing Methods Please respond to the followingUse th.docx
Inventory Costing Methods Please respond to the followingUse th.docx
 
Intrusion Detection Systems Objectives In this lab, st.docx
Intrusion Detection Systems Objectives In this lab, st.docxIntrusion Detection Systems Objectives In this lab, st.docx
Intrusion Detection Systems Objectives In this lab, st.docx
 
Introduction Understanding culture is essential for effectively ex.docx
Introduction Understanding culture is essential for effectively ex.docxIntroduction Understanding culture is essential for effectively ex.docx
Introduction Understanding culture is essential for effectively ex.docx
 
Inventory Management Homework Set You work in the .docx
Inventory Management Homework Set You work in the .docxInventory Management Homework Set You work in the .docx
Inventory Management Homework Set You work in the .docx
 
IntroductionI am 43 years old and married with three childre.docx
IntroductionI am 43 years old and married with three childre.docxIntroductionI am 43 years old and married with three childre.docx
IntroductionI am 43 years old and married with three childre.docx
 
IntroductionThroughout this course, the breadth and depth of you.docx
IntroductionThroughout this course, the breadth and depth of you.docxIntroductionThroughout this course, the breadth and depth of you.docx
IntroductionThroughout this course, the breadth and depth of you.docx
 
IntroductionPg. 2The Arrival Of Violence As A Key Component Of T.docx
IntroductionPg. 2The Arrival Of Violence As A Key Component Of T.docxIntroductionPg. 2The Arrival Of Violence As A Key Component Of T.docx
IntroductionPg. 2The Arrival Of Violence As A Key Component Of T.docx
 
IntroductionPatients usually go through a lot and in most inst.docx
IntroductionPatients usually go through a lot and in most inst.docxIntroductionPatients usually go through a lot and in most inst.docx
IntroductionPatients usually go through a lot and in most inst.docx
 
INTRODUCTION TO TERRORISMONLY ONE PARAGRAPH FOR THIS DISCUSSION ON.docx
INTRODUCTION TO TERRORISMONLY ONE PARAGRAPH FOR THIS DISCUSSION ON.docxINTRODUCTION TO TERRORISMONLY ONE PARAGRAPH FOR THIS DISCUSSION ON.docx
INTRODUCTION TO TERRORISMONLY ONE PARAGRAPH FOR THIS DISCUSSION ON.docx
 
IntroductionIn this module, you have learned about the intention.docx
IntroductionIn this module, you have learned about the intention.docxIntroductionIn this module, you have learned about the intention.docx
IntroductionIn this module, you have learned about the intention.docx
 
IntroductionBody part (literature review) which includesT.docx
IntroductionBody part (literature review) which includesT.docxIntroductionBody part (literature review) which includesT.docx
IntroductionBody part (literature review) which includesT.docx
 
Introduction to SociologyAll work must be original in APA Format, .docx
Introduction to SociologyAll work must be original in APA Format, .docxIntroduction to SociologyAll work must be original in APA Format, .docx
Introduction to SociologyAll work must be original in APA Format, .docx
 
Introduction to Sociology Unit 5 ProjectTextbook Help Macio.docx
Introduction to Sociology Unit 5 ProjectTextbook Help Macio.docxIntroduction to Sociology Unit 5 ProjectTextbook Help Macio.docx
Introduction to Sociology Unit 5 ProjectTextbook Help Macio.docx
 
INTRODUCTION TO CORRECTIONS  ONLY ONE PARAGRAPH AND A HALFInstruct.docx
INTRODUCTION TO CORRECTIONS  ONLY ONE PARAGRAPH AND A HALFInstruct.docxINTRODUCTION TO CORRECTIONS  ONLY ONE PARAGRAPH AND A HALFInstruct.docx
INTRODUCTION TO CORRECTIONS  ONLY ONE PARAGRAPH AND A HALFInstruct.docx
 
Introduction One or two pages to introduce the issue, group, or.docx
Introduction One or two pages to introduce the issue, group, or.docxIntroduction One or two pages to introduce the issue, group, or.docx
Introduction One or two pages to introduce the issue, group, or.docx
 
Introduction on Islamic philosophy In order to write about evolut.docx
Introduction on Islamic philosophy In order to write about evolut.docxIntroduction on Islamic philosophy In order to write about evolut.docx
Introduction on Islamic philosophy In order to write about evolut.docx
 
Introduction to Assignment This assignment contains a number of s.docx
Introduction to Assignment This assignment contains a number of s.docxIntroduction to Assignment This assignment contains a number of s.docx
Introduction to Assignment This assignment contains a number of s.docx
 
Introduction to Assignment This assignment contains a number .docx
Introduction to Assignment This assignment contains a number .docxIntroduction to Assignment This assignment contains a number .docx
Introduction to Assignment This assignment contains a number .docx
 

Recently uploaded

Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Celine George
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxUnboundStockton
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaVirag Sontakke
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxDr.Ibrahim Hassaan
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdfssuser54595a
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitolTechU
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxiammrhaywood
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementmkooblal
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.arsicmarija21
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfUjwalaBharambe
 

Recently uploaded (20)

Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17Difference Between Search & Browse Methods in Odoo 17
Difference Between Search & Browse Methods in Odoo 17
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Blooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docxBlooming Together_ Growing a Community Garden Worksheet.docx
Blooming Together_ Growing a Community Garden Worksheet.docx
 
Painted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of IndiaPainted Grey Ware.pptx, PGW Culture of India
Painted Grey Ware.pptx, PGW Culture of India
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Gas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptxGas measurement O2,Co2,& ph) 04/2024.pptx
Gas measurement O2,Co2,& ph) 04/2024.pptx
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
18-04-UA_REPORT_MEDIALITERAСY_INDEX-DM_23-1-final-eng.pdf
 
Capitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptxCapitol Tech U Doctoral Presentation - April 2024.pptx
Capitol Tech U Doctoral Presentation - April 2024.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptxECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
ECONOMIC CONTEXT - PAPER 1 Q3: NEWSPAPERS.pptx
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Hierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of managementHierarchy of management that covers different levels of management
Hierarchy of management that covers different levels of management
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.AmericanHighSchoolsprezentacijaoskolama.
AmericanHighSchoolsprezentacijaoskolama.
 
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdfFraming an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
Framing an Appropriate Research Question 6b9b26d93da94caf993c038d9efcdedb.pdf
 

I need 10 pages of report and 10 slides PurposeThis course p

  • 1. I need 10 pages of report and 10 slides Purpose This course project is intended to assess your ability to comprehend and apply the basic concepts related to information security management, such as the following: The ability to discern when a risk assessment should be performed and carrying out the task Understanding user or customer access requirements, whether remote or local Using a layered security approach to establish and maintain access controls Working with other departments, such as the human resources department, to identify and implement methods to prevent unwarranted exposure to information by inappropriate personnel Your ability to execute the tasks within these information security domains and others will be evaluated against the learning objectives as identified and described in previous lessons of instruction for this course. Required Source Information and Tools The following tools and resources will be needed to complete this project: Course textbook
  • 2. Access to the Internet Access to the library Text sheet: Integrated Distributors Incorporated (access_project_ts_integrateddistributors) Learning Objectives and Outcomes Successful completion of this project will ensure that you are capable of supporting the implementation and management of an information systems security framework. To be able to do so, you need to be able to do the following: Relate how an access control policy framework is used to define authorization and access to an information technology (IT) infrastructure for compliance. Mitigate risks to an IT infrastructure’s confidentiality, integrity, and availability with sound access controls. Relate how a data classification standard influences an IT infrastructure’s access control requirements and implementation. Develop an access control policy framework consisting of best practices for policies, standards, procedures, and guidelines to mitigate unauthorized access. Define proper security controls within the User Domain to mitigate risks and threats caused by human nature and behavior. Implement appropriate access controls for information systems
  • 3. within IT infrastructures. Mitigate risks from unauthorized access to IT systems through proper testing and reporting. Project Checkpoints The course project has a checkpoint strategy. Checkpoint deliverables allow you to receive valuable feedback on your interim work. In this project, you have four ungraded checkpoint deliverables. (See the syllabus for the schedule.) You may discuss project questions with the instructor, and you should receive feedback from the instructor on previously submitted work. The checkpoint deliverable ensures refinement of the final deliverables, if incorporated effectively. The final deliverable for this project is a professional report and a PowerPoint presentation. Checkpoint Purpose of the Checkpoint Expected Deliverables 1 Understanding requirements Clarification on project deliverables Discussion on project concerns and progress up to this checkpoint A review of the course project’s outline and schedule for
  • 4. completion Prepare an initial outline of issues and potential solutions and discuss with your instructor, the chief information officer (CIO). 2 Clarification on project deliverables Discussion on project concerns and progress up to this checkpoint A review of the course project’s outline and schedule for completion Prepare an extended outline of issues and potential solutions and discuss with your instructor, the CIO. 3 Clarification on project deliverables Discussion on project concerns and progress up to this checkpoint A review of the course project’s outline and schedule for completion Draft the report and the PowerPoint presentation to discuss with your instructor, the CIO.
  • 5. 4 Clarification on project deliverables Discussion on project concerns and progress up to this checkpoint A review of the course project’s outline and schedule for completion Modify the report and the PowerPoint presentation based on feedback from your instructor, the CIO. Deliverables Introduction User identification, authentication, and authorization are essential in developing, implementing, and maintaining a framework for information system security. The basic function of an information system security framework is to ensure the confidentiality and the integrity, as well as the availability of systems, applications, and data. Certain information security implementation and management knowledge is required of network administrators, IT service personnel, management, and IT security practitioners, such as information security officers, security analysts, and domain administrators. Scenario You are provided with the text sheet entitled Integrated Distributors Incorporated (access_project_ts_integrateddistributors.docx) to complete this
  • 6. project. You play the dual role of an IT architect and IT security specialist working for Integrated Distributors Incorporated (IDI), a multi-national organization with offices in several countries. Your instructor for this course plays the role of the chief information officer (CIO). Your peers play the role of selected technology staff. Each of the organization’s locations is operating with different information technologies and infrastructure—IT systems, applications, and databases. Various levels of IT security and access management have been implemented and embedded within their respective locations. Tasks Your goals as the IT architect and IT security specialist are to: Develop solutions to the issues that the specified location of IDI is facing. Develop plans to implement corporate-wide information access methods to ensure confidentiality, integrity, and availability. Assess risks and vulnerabilities with operating IT facilities in the disparate locations where IDI now functions and develop mitigation plans and implementation methods. Analyze the strengths and weaknesses in the current systems of IDI. Address remote user and Web site user’s secure access requirements. Develop a proposed budget for the project—consider hardware, software, upgrades/replacements, and consulting services. Prepare detailed network and configuration diagrams outlining
  • 7. the proposed change to be able to present it to the management. Develop and submit a comprehensive report addressing the learning objectives and your solutions to the issues within the scenario. Prepare a 10- to 15-slide PowerPoint presentation that addresses important access control, infrastructure, and management aspects from each location. Self-Assessment Checklist I have considered an access control policy framework to define authorization and access to an IT infrastructure for compliance within the course project. I have considered the influence of the data classification standard in an IT infrastructure’s access control requirements and implementation. I have defined proper security controls within the User Domain to mitigate risk and threats caused by human nature and behavior. I have developed and implemented an effective plan to mitigate risks to an IT infrastructure’s confidentiality, integrity, and availability with sound access controls. I have developed an access control policy framework consisting of best practices for policies, standards, procedures, and guidelines to mitigate unauthorized access. I have implemented appropriate access controls for information systems within IT infrastructures.
  • 8. I have followed the submission requirements and necessary details for writing the report.