SlideShare a Scribd company logo
1 of 3
Key Assignment Draft
This is Part 1 of the Key Assignment. Your draft will cover all
of the objectives from Weeks 1–3 along with the new topics and
objectives for Week 4.
Great progress has been made on the information technology
(IT) Planning Strategy Design document in the previous
assignment. This week, you will add an analysis of the
Information Security Strategy of your chosen organization,
along with recommendations on improving it.
The project deliverables are as follows:
Update the IT Planning Strategy Design document title page
with a new date and project name.
Update your previously completed sections based on instructor
feedback.
Add a new section “Information Security Strategy for
Company”
Discuss your company’s business critical information
Discuss your company’s cyber, physical, cultural, and
procedural vulnerabilities.
Does your company have appropriate HR and IT security
policies and practices?
What sort of physical security policies and practices are in
place?
How is your security ecosystem?
Antivirus on all systems?
Network monitoring and intruder detection?
Network access security: logins, access control lists, firewalls,
DMZs, etc., in place?
How much is automated and how much manual?
Recommend what your company needs to do to address its
security strategy gaps.
Recommendations should be actionable and linked directly to
the Technology Road Map in Week 3.
Ensure that your recommendations are focused on root causes.
Provide at least 2 references to support your research paper
Be sure to update your table of contents before submission.
Key Assignment DraftThis is Part 1 of the Key Assignment. Yo.docx

More Related Content

Similar to Key Assignment DraftThis is Part 1 of the Key Assignment. Yo.docx

The Rookie Chief Information Security OfficerWorth 200 poi
The Rookie Chief Information Security OfficerWorth 200 poiThe Rookie Chief Information Security OfficerWorth 200 poi
The Rookie Chief Information Security OfficerWorth 200 poijacvzpline
 
This assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docxThis assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docxgasciognecaren
 
Term Paper The Rookie Chief Information Security OfficerD
Term Paper The Rookie Chief Information Security OfficerDTerm Paper The Rookie Chief Information Security OfficerD
Term Paper The Rookie Chief Information Security OfficerDalehosickg3
 
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...GrapesTech Solutions
 
CSIA 413 Cybersecurity Policy, Plans, and ProgramsProject #4 IT .docx
CSIA 413 Cybersecurity Policy, Plans, and ProgramsProject #4 IT .docxCSIA 413 Cybersecurity Policy, Plans, and ProgramsProject #4 IT .docx
CSIA 413 Cybersecurity Policy, Plans, and ProgramsProject #4 IT .docxmydrynan
 
Cmgt 400 week 1 it security report
Cmgt 400 week 1 it security reportCmgt 400 week 1 it security report
Cmgt 400 week 1 it security reportpayderingdros1974
 
Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseGeorge Goodall
 
IT 549 Final Project Guidelines and Rubric Overview .docx
IT 549 Final Project Guidelines and Rubric  Overview .docxIT 549 Final Project Guidelines and Rubric  Overview .docx
IT 549 Final Project Guidelines and Rubric Overview .docxchristiandean12115
 
ISE 510 Final Project Guidelines and Rubric Overview The fi.docx
 ISE 510 Final Project Guidelines and Rubric Overview The fi.docx ISE 510 Final Project Guidelines and Rubric Overview The fi.docx
ISE 510 Final Project Guidelines and Rubric Overview The fi.docxaryan532920
 
Cmgt 400 week 4 team assignment security policy and training
Cmgt 400 week 4 team assignment security policy and trainingCmgt 400 week 4 team assignment security policy and training
Cmgt 400 week 4 team assignment security policy and trainingcordnesslacge1978
 
The Rookie Chief Information Security OfficerThis assignment c.docx
The Rookie Chief Information Security OfficerThis assignment c.docxThe Rookie Chief Information Security OfficerThis assignment c.docx
The Rookie Chief Information Security OfficerThis assignment c.docxoreo10
 
ISE 620 Final Project Guidelines and Rubric Overview .docx
ISE 620 Final Project Guidelines and Rubric  Overview .docxISE 620 Final Project Guidelines and Rubric  Overview .docx
ISE 620 Final Project Guidelines and Rubric Overview .docxchristiandean12115
 
Nine HIPAA Compliance Questions to ask Yourself
Nine HIPAA Compliance Questions to ask YourselfNine HIPAA Compliance Questions to ask Yourself
Nine HIPAA Compliance Questions to ask YourselfLERNER Consulting
 
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docx
Running Head STATEMENT OF WORKSTATEMENT OF WORK                .docxRunning Head STATEMENT OF WORKSTATEMENT OF WORK                .docx
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docxtoltonkendal
 
Fldn resource -_impact_of_the_use_of_it_on_business_systems_18
Fldn resource -_impact_of_the_use_of_it_on_business_systems_18Fldn resource -_impact_of_the_use_of_it_on_business_systems_18
Fldn resource -_impact_of_the_use_of_it_on_business_systems_18Natasha Ali
 
How to assess your it needs and implement technology at your nonprofit
How to assess your it needs and implement technology at your nonprofitHow to assess your it needs and implement technology at your nonprofit
How to assess your it needs and implement technology at your nonprofitTechSoup Canada
 

Similar to Key Assignment DraftThis is Part 1 of the Key Assignment. Yo.docx (20)

The Rookie Chief Information Security OfficerWorth 200 poi
The Rookie Chief Information Security OfficerWorth 200 poiThe Rookie Chief Information Security OfficerWorth 200 poi
The Rookie Chief Information Security OfficerWorth 200 poi
 
This assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docxThis assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docx
 
We Bought Some Tools
We Bought Some ToolsWe Bought Some Tools
We Bought Some Tools
 
Term Paper The Rookie Chief Information Security OfficerD
Term Paper The Rookie Chief Information Security OfficerDTerm Paper The Rookie Chief Information Security OfficerD
Term Paper The Rookie Chief Information Security OfficerD
 
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...IT Governance and Compliance: Its Importance and the Best Practices to Follow...
IT Governance and Compliance: Its Importance and the Best Practices to Follow...
 
CSIA 413 Cybersecurity Policy, Plans, and ProgramsProject #4 IT .docx
CSIA 413 Cybersecurity Policy, Plans, and ProgramsProject #4 IT .docxCSIA 413 Cybersecurity Policy, Plans, and ProgramsProject #4 IT .docx
CSIA 413 Cybersecurity Policy, Plans, and ProgramsProject #4 IT .docx
 
Build and Information Security Strategy
Build and Information Security StrategyBuild and Information Security Strategy
Build and Information Security Strategy
 
Cmgt 400 week 1 it security report
Cmgt 400 week 1 it security reportCmgt 400 week 1 it security report
Cmgt 400 week 1 it security report
 
Cmgt 400 entire course
Cmgt 400 entire courseCmgt 400 entire course
Cmgt 400 entire course
 
Improve Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small EnterpriseImprove Information Security Practices in the Small Enterprise
Improve Information Security Practices in the Small Enterprise
 
IT 549 Final Project Guidelines and Rubric Overview .docx
IT 549 Final Project Guidelines and Rubric  Overview .docxIT 549 Final Project Guidelines and Rubric  Overview .docx
IT 549 Final Project Guidelines and Rubric Overview .docx
 
ISE 510 Final Project Guidelines and Rubric Overview The fi.docx
 ISE 510 Final Project Guidelines and Rubric Overview The fi.docx ISE 510 Final Project Guidelines and Rubric Overview The fi.docx
ISE 510 Final Project Guidelines and Rubric Overview The fi.docx
 
Cmgt 400 week 4 team assignment security policy and training
Cmgt 400 week 4 team assignment security policy and trainingCmgt 400 week 4 team assignment security policy and training
Cmgt 400 week 4 team assignment security policy and training
 
The Rookie Chief Information Security OfficerThis assignment c.docx
The Rookie Chief Information Security OfficerThis assignment c.docxThe Rookie Chief Information Security OfficerThis assignment c.docx
The Rookie Chief Information Security OfficerThis assignment c.docx
 
ISE 620 Final Project Guidelines and Rubric Overview .docx
ISE 620 Final Project Guidelines and Rubric  Overview .docxISE 620 Final Project Guidelines and Rubric  Overview .docx
ISE 620 Final Project Guidelines and Rubric Overview .docx
 
Nine HIPAA Compliance Questions to ask Yourself
Nine HIPAA Compliance Questions to ask YourselfNine HIPAA Compliance Questions to ask Yourself
Nine HIPAA Compliance Questions to ask Yourself
 
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docx
Running Head STATEMENT OF WORKSTATEMENT OF WORK                .docxRunning Head STATEMENT OF WORKSTATEMENT OF WORK                .docx
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docx
 
Cobit 41 framework
Cobit 41 frameworkCobit 41 framework
Cobit 41 framework
 
Fldn resource -_impact_of_the_use_of_it_on_business_systems_18
Fldn resource -_impact_of_the_use_of_it_on_business_systems_18Fldn resource -_impact_of_the_use_of_it_on_business_systems_18
Fldn resource -_impact_of_the_use_of_it_on_business_systems_18
 
How to assess your it needs and implement technology at your nonprofit
How to assess your it needs and implement technology at your nonprofitHow to assess your it needs and implement technology at your nonprofit
How to assess your it needs and implement technology at your nonprofit
 

More from jesssueann

Major Benefits and Drivers of IoT.Background According to T.docx
Major Benefits and Drivers of IoT.Background According to T.docxMajor Benefits and Drivers of IoT.Background According to T.docx
Major Benefits and Drivers of IoT.Background According to T.docxjesssueann
 
Major Assessment 2 The Educated Person” For educators to be ef.docx
Major Assessment 2 The Educated Person” For educators to be ef.docxMajor Assessment 2 The Educated Person” For educators to be ef.docx
Major Assessment 2 The Educated Person” For educators to be ef.docxjesssueann
 
Major Assessment 4 Cultural Bias Investigation Most educators agree.docx
Major Assessment 4 Cultural Bias Investigation Most educators agree.docxMajor Assessment 4 Cultural Bias Investigation Most educators agree.docx
Major Assessment 4 Cultural Bias Investigation Most educators agree.docxjesssueann
 
Maintaining privacy and confidentiality always is also vital. Nurses.docx
Maintaining privacy and confidentiality always is also vital. Nurses.docxMaintaining privacy and confidentiality always is also vital. Nurses.docx
Maintaining privacy and confidentiality always is also vital. Nurses.docxjesssueann
 
Main content15-2aHow Identity Theft OccursPerpetrators of iden.docx
Main content15-2aHow Identity Theft OccursPerpetrators of iden.docxMain content15-2aHow Identity Theft OccursPerpetrators of iden.docx
Main content15-2aHow Identity Theft OccursPerpetrators of iden.docxjesssueann
 
Macro Presentation – Australia Table of ContentOver.docx
Macro Presentation – Australia Table of ContentOver.docxMacro Presentation – Australia Table of ContentOver.docx
Macro Presentation – Australia Table of ContentOver.docxjesssueann
 
M.S Aviation Pty Ltd TA Australian School of Commerce RTO N.docx
M.S Aviation Pty Ltd TA Australian School of Commerce RTO N.docxM.S Aviation Pty Ltd TA Australian School of Commerce RTO N.docx
M.S Aviation Pty Ltd TA Australian School of Commerce RTO N.docxjesssueann
 
M4.3 Case StudyCase Study ExampleJennifer S. is an Army veter.docx
M4.3 Case StudyCase Study ExampleJennifer S. is an Army veter.docxM4.3 Case StudyCase Study ExampleJennifer S. is an Army veter.docx
M4.3 Case StudyCase Study ExampleJennifer S. is an Army veter.docxjesssueann
 
make a histogram out of this information Earthquake Frequency .docx
make a histogram out of this information Earthquake Frequency   .docxmake a histogram out of this information Earthquake Frequency   .docx
make a histogram out of this information Earthquake Frequency .docxjesssueann
 
Love Language Project FINAL PAPERLove Language Project Part .docx
Love Language Project FINAL PAPERLove Language Project Part .docxLove Language Project FINAL PAPERLove Language Project Part .docx
Love Language Project FINAL PAPERLove Language Project Part .docxjesssueann
 
Major Computer Science What are the core skills and knowledge y.docx
Major Computer Science What are the core skills and knowledge y.docxMajor Computer Science What are the core skills and knowledge y.docx
Major Computer Science What are the core skills and knowledge y.docxjesssueann
 
Major Crime in Your CommunityUse the Internet to search for .docx
Major Crime in Your CommunityUse the Internet to search for .docxMajor Crime in Your CommunityUse the Internet to search for .docx
Major Crime in Your CommunityUse the Internet to search for .docxjesssueann
 
Major Assignment - Learning NarrativeWrite a learning narr.docx
Major Assignment - Learning NarrativeWrite a learning narr.docxMajor Assignment - Learning NarrativeWrite a learning narr.docx
Major Assignment - Learning NarrativeWrite a learning narr.docxjesssueann
 
Looking to have this work done AGAIN. It was submitted several times.docx
Looking to have this work done AGAIN. It was submitted several times.docxLooking to have this work done AGAIN. It was submitted several times.docx
Looking to have this work done AGAIN. It was submitted several times.docxjesssueann
 
Major Assessment 1 Develop a Platform of Beliefs The following .docx
Major Assessment 1 Develop a Platform of Beliefs The following .docxMajor Assessment 1 Develop a Platform of Beliefs The following .docx
Major Assessment 1 Develop a Platform of Beliefs The following .docxjesssueann
 
Macroeconomics PaperThere are currently three major political ap.docx
Macroeconomics PaperThere are currently three major political ap.docxMacroeconomics PaperThere are currently three major political ap.docx
Macroeconomics PaperThere are currently three major political ap.docxjesssueann
 
M A T T D O N O V A NThings in the Form o f a Prayer in.docx
M A T T  D O N O V A NThings in the Form o f a Prayer in.docxM A T T  D O N O V A NThings in the Form o f a Prayer in.docx
M A T T D O N O V A NThings in the Form o f a Prayer in.docxjesssueann
 
M A R C H 2 0 1 5F O R W A R D ❚ E N G A G E D ❚ .docx
M A R C H  2 0 1 5F O R W A R D   ❚   E N G A G E D   ❚   .docxM A R C H  2 0 1 5F O R W A R D   ❚   E N G A G E D   ❚   .docx
M A R C H 2 0 1 5F O R W A R D ❚ E N G A G E D ❚ .docxjesssueann
 
Lymphedema following breast cancer The importance of surgic.docx
Lymphedema following breast cancer The importance of surgic.docxLymphedema following breast cancer The importance of surgic.docx
Lymphedema following breast cancer The importance of surgic.docxjesssueann
 
Lukas Nelson and his wife Anne and their three daughters had been li.docx
Lukas Nelson and his wife Anne and their three daughters had been li.docxLukas Nelson and his wife Anne and their three daughters had been li.docx
Lukas Nelson and his wife Anne and their three daughters had been li.docxjesssueann
 

More from jesssueann (20)

Major Benefits and Drivers of IoT.Background According to T.docx
Major Benefits and Drivers of IoT.Background According to T.docxMajor Benefits and Drivers of IoT.Background According to T.docx
Major Benefits and Drivers of IoT.Background According to T.docx
 
Major Assessment 2 The Educated Person” For educators to be ef.docx
Major Assessment 2 The Educated Person” For educators to be ef.docxMajor Assessment 2 The Educated Person” For educators to be ef.docx
Major Assessment 2 The Educated Person” For educators to be ef.docx
 
Major Assessment 4 Cultural Bias Investigation Most educators agree.docx
Major Assessment 4 Cultural Bias Investigation Most educators agree.docxMajor Assessment 4 Cultural Bias Investigation Most educators agree.docx
Major Assessment 4 Cultural Bias Investigation Most educators agree.docx
 
Maintaining privacy and confidentiality always is also vital. Nurses.docx
Maintaining privacy and confidentiality always is also vital. Nurses.docxMaintaining privacy and confidentiality always is also vital. Nurses.docx
Maintaining privacy and confidentiality always is also vital. Nurses.docx
 
Main content15-2aHow Identity Theft OccursPerpetrators of iden.docx
Main content15-2aHow Identity Theft OccursPerpetrators of iden.docxMain content15-2aHow Identity Theft OccursPerpetrators of iden.docx
Main content15-2aHow Identity Theft OccursPerpetrators of iden.docx
 
Macro Presentation – Australia Table of ContentOver.docx
Macro Presentation – Australia Table of ContentOver.docxMacro Presentation – Australia Table of ContentOver.docx
Macro Presentation – Australia Table of ContentOver.docx
 
M.S Aviation Pty Ltd TA Australian School of Commerce RTO N.docx
M.S Aviation Pty Ltd TA Australian School of Commerce RTO N.docxM.S Aviation Pty Ltd TA Australian School of Commerce RTO N.docx
M.S Aviation Pty Ltd TA Australian School of Commerce RTO N.docx
 
M4.3 Case StudyCase Study ExampleJennifer S. is an Army veter.docx
M4.3 Case StudyCase Study ExampleJennifer S. is an Army veter.docxM4.3 Case StudyCase Study ExampleJennifer S. is an Army veter.docx
M4.3 Case StudyCase Study ExampleJennifer S. is an Army veter.docx
 
make a histogram out of this information Earthquake Frequency .docx
make a histogram out of this information Earthquake Frequency   .docxmake a histogram out of this information Earthquake Frequency   .docx
make a histogram out of this information Earthquake Frequency .docx
 
Love Language Project FINAL PAPERLove Language Project Part .docx
Love Language Project FINAL PAPERLove Language Project Part .docxLove Language Project FINAL PAPERLove Language Project Part .docx
Love Language Project FINAL PAPERLove Language Project Part .docx
 
Major Computer Science What are the core skills and knowledge y.docx
Major Computer Science What are the core skills and knowledge y.docxMajor Computer Science What are the core skills and knowledge y.docx
Major Computer Science What are the core skills and knowledge y.docx
 
Major Crime in Your CommunityUse the Internet to search for .docx
Major Crime in Your CommunityUse the Internet to search for .docxMajor Crime in Your CommunityUse the Internet to search for .docx
Major Crime in Your CommunityUse the Internet to search for .docx
 
Major Assignment - Learning NarrativeWrite a learning narr.docx
Major Assignment - Learning NarrativeWrite a learning narr.docxMajor Assignment - Learning NarrativeWrite a learning narr.docx
Major Assignment - Learning NarrativeWrite a learning narr.docx
 
Looking to have this work done AGAIN. It was submitted several times.docx
Looking to have this work done AGAIN. It was submitted several times.docxLooking to have this work done AGAIN. It was submitted several times.docx
Looking to have this work done AGAIN. It was submitted several times.docx
 
Major Assessment 1 Develop a Platform of Beliefs The following .docx
Major Assessment 1 Develop a Platform of Beliefs The following .docxMajor Assessment 1 Develop a Platform of Beliefs The following .docx
Major Assessment 1 Develop a Platform of Beliefs The following .docx
 
Macroeconomics PaperThere are currently three major political ap.docx
Macroeconomics PaperThere are currently three major political ap.docxMacroeconomics PaperThere are currently three major political ap.docx
Macroeconomics PaperThere are currently three major political ap.docx
 
M A T T D O N O V A NThings in the Form o f a Prayer in.docx
M A T T  D O N O V A NThings in the Form o f a Prayer in.docxM A T T  D O N O V A NThings in the Form o f a Prayer in.docx
M A T T D O N O V A NThings in the Form o f a Prayer in.docx
 
M A R C H 2 0 1 5F O R W A R D ❚ E N G A G E D ❚ .docx
M A R C H  2 0 1 5F O R W A R D   ❚   E N G A G E D   ❚   .docxM A R C H  2 0 1 5F O R W A R D   ❚   E N G A G E D   ❚   .docx
M A R C H 2 0 1 5F O R W A R D ❚ E N G A G E D ❚ .docx
 
Lymphedema following breast cancer The importance of surgic.docx
Lymphedema following breast cancer The importance of surgic.docxLymphedema following breast cancer The importance of surgic.docx
Lymphedema following breast cancer The importance of surgic.docx
 
Lukas Nelson and his wife Anne and their three daughters had been li.docx
Lukas Nelson and his wife Anne and their three daughters had been li.docxLukas Nelson and his wife Anne and their three daughters had been li.docx
Lukas Nelson and his wife Anne and their three daughters had been li.docx
 

Recently uploaded

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Educationpboyjonauth
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfSumit Tiwari
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...Marc Dusseiller Dusjagr
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerunnathinaik
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxpboyjonauth
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentInMediaRes1
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17Celine George
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxNirmalaLoungPoorunde1
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentInMediaRes1
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Celine George
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxAvyJaneVismanos
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxEyham Joco
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfadityarao40181
 

Recently uploaded (20)

Introduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher EducationIntroduction to ArtificiaI Intelligence in Higher Education
Introduction to ArtificiaI Intelligence in Higher Education
 
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdfEnzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
Enzyme, Pharmaceutical Aids, Miscellaneous Last Part of Chapter no 5th.pdf
 
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
“Oh GOSH! Reflecting on Hackteria's Collaborative Practices in a Global Do-It...
 
internship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developerinternship ppt on smartinternz platform as salesforce developer
internship ppt on smartinternz platform as salesforce developer
 
Introduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptxIntroduction to AI in Higher Education_draft.pptx
Introduction to AI in Higher Education_draft.pptx
 
OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...OS-operating systems- ch04 (Threads) ...
OS-operating systems- ch04 (Threads) ...
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Alper Gobel In Media Res Media Component
Alper Gobel In Media Res Media ComponentAlper Gobel In Media Res Media Component
Alper Gobel In Media Res Media Component
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17How to Configure Email Server in Odoo 17
How to Configure Email Server in Odoo 17
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
Employee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptxEmployee wellbeing at the workplace.pptx
Employee wellbeing at the workplace.pptx
 
Meghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media ComponentMeghan Sutherland In Media Res Media Component
Meghan Sutherland In Media Res Media Component
 
ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)ESSENTIAL of (CS/IT/IS) class 06 (database)
ESSENTIAL of (CS/IT/IS) class 06 (database)
 
Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17Computed Fields and api Depends in the Odoo 17
Computed Fields and api Depends in the Odoo 17
 
Final demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptxFinal demo Grade 9 for demo Plan dessert.pptx
Final demo Grade 9 for demo Plan dessert.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
Types of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptxTypes of Journalistic Writing Grade 8.pptx
Types of Journalistic Writing Grade 8.pptx
 
Biting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdfBiting mechanism of poisonous snakes.pdf
Biting mechanism of poisonous snakes.pdf
 
9953330565 Low Rate Call Girls In Rohini Delhi NCR
9953330565 Low Rate Call Girls In Rohini  Delhi NCR9953330565 Low Rate Call Girls In Rohini  Delhi NCR
9953330565 Low Rate Call Girls In Rohini Delhi NCR
 

Key Assignment DraftThis is Part 1 of the Key Assignment. Yo.docx

  • 1. Key Assignment Draft This is Part 1 of the Key Assignment. Your draft will cover all of the objectives from Weeks 1–3 along with the new topics and objectives for Week 4. Great progress has been made on the information technology (IT) Planning Strategy Design document in the previous assignment. This week, you will add an analysis of the Information Security Strategy of your chosen organization, along with recommendations on improving it. The project deliverables are as follows: Update the IT Planning Strategy Design document title page with a new date and project name. Update your previously completed sections based on instructor feedback. Add a new section “Information Security Strategy for Company” Discuss your company’s business critical information Discuss your company’s cyber, physical, cultural, and procedural vulnerabilities. Does your company have appropriate HR and IT security policies and practices?
  • 2. What sort of physical security policies and practices are in place? How is your security ecosystem? Antivirus on all systems? Network monitoring and intruder detection? Network access security: logins, access control lists, firewalls, DMZs, etc., in place? How much is automated and how much manual? Recommend what your company needs to do to address its security strategy gaps. Recommendations should be actionable and linked directly to the Technology Road Map in Week 3. Ensure that your recommendations are focused on root causes. Provide at least 2 references to support your research paper Be sure to update your table of contents before submission.