Attached find three attachments. The work to be done is "Project 4". The other two(Project 1 and 2) are my previous works that you will need to refer from when doing the work. APA format as stated in thirty hours. The work should be plagiarism free and the grading rubric is as follows: Provided an excellent IT Security Policy which clearly, concisely, and accurately presents all required information (see outline in assignment for sections, fields, and content requirements). Presentation of information is organized in a logical fashion and uses 3 or more tables to group related information for presentation. All required fields under each section are listed and filled in (e.g. Owner Name in ID Section has a name filled in.) Provided an excellent risk identification, assessment, and prioritization for APT threats against the data center. Risk identification included at least fifteen (15) specific risks. The risk assessment clearly and concisely addressed the potential negative impacts of APTs upon the confidentiality, integrity, and availability of information, information systems, and information infrastructure in the data center. Risk Register table containing all identified risks was included in the Risk section of the policy. Table was complete, concise, and accurate. Appropriately used information from 3 or more authoritative sources. Addressed seven or more recommended best practices for APT prevention, detection, and eradication. These best practices include (but are not limited to): (a) Maintaining a list of application systems at risk (b) Creating an APT checklist for assets at risk (c) Focusing on APT detection techniques and analysis tools (d) Focusing on incident response for APTs (e) Creating ready to use APT rapid response tactics (f) Preparing an APT forensic response plan (g) Increasing use of external threat intelligence (h) Focusing on APTs in security awareness training. Provided an excellent set of policy statements which will ensure that the selected best practices are implemented. Policy statement(s) and supporting explanations are clear, concise, and accurate. Used and cited at least three authoritative sources. Presented an excellent policy statement or statements which will ensure that IT Security is addressed during all four phases of the DR/BCP planning process. Policy statement(s) and supporting explanations are clear, concise, and accurate. Used and cited at least two authoritative sources. Identified 5 or more technologies which could be used to combat APT threats through improvements in detection, prevention, and eradication. Integrated these technologies into policy statements in a clear, concise, and accurate manner. Presented 15 or more policy statements to require implementation of best practices, security controls, and technical counter measures (technologies) to combat APTs in the data center. Policy statement(s) and supporting explanations are clear, concise, and accurate. Used and cited at least three auth.