15 Pages (3pages-section)/ References Choose a topic that related to advances in information assurance security. High-level topics include (but are not limited to) the following: Information security and risk management Access controls Security architecture and design Physical and environmental security Telecommunications and network security Cryptography Business continuity and disaster recovery Legal, regulations, compliance, and investigations Application security Operations security The topic of choice will be submitted to the instructor. This will include an annotated bibliography for review and approval. This should include at least 5 sources. Your Advanced Research in IAS and Information Technology (IT) Management template document should be constructed in the following format: Use Word Title Page Course number and name Project name Student name Date Table of Contents (TOC) Autogenerated TOC Separate page Maximum of three levels deep Be sure to update the fields of the TOC so it is up-to-date before submitting your project. Abstract Paper Topic Background Section Headings (create each heading on a new page with TBD as content, except for sections listed under New Content below) Section 1: Policies, Procedures, Roles, and Responsibilities Section 2: Data Governance Section 3: Network Security Section 4: Asset Security Management Section 5: Compliance with Security Regulations Conclusion References Each week, you will add to this document and submit it for grading. Overview Each section will contain the following: Section 1: Policies, Procedures, Roles, and Responsibilities Choose a topic List at least 5 references Section 2: Data Governance Submit an outline of the paper, including the following information (in addition to the weekly topics): Background and history on the topic Why the topic is applicable Details about the topic Solution s for how the topic can be used Description of any policies and procedures and their applicability Discuss the need for data governance Section 3: Network Security Discussion of the implementation any network security as appropriate to the topic Discussion of the need for layered security Section 4: Asset Security Management Risk assessment Risk identification Safeguard implementation Section 5: Compliance with Security Regulations Detailed discussion about any laws and regulations that apply to your topic Add the outline to the Table of Contents of the paper, and be sure to include the Title Page, Table of Contents, and the section place holders for the following: Abstract Topic research Weekly material and sections Conclusion References .