SlideShare a Scribd company logo
1 of 3
Attached find three attachments. The work to be done is
"Project 4". The other two(Project 1 and 2) are my previous
works that you will need to refer from when doing the work.
APA format as stated in thirty hours. The work should be
plagiarism free and the grading rubric is as follows:
Provided an excellent IT Security Policy which clearly,
concisely, and accurately presents all required information (see
outline in assignment for sections, fields, and content
requirements). Presentation of information is organized in a
logical fashion and uses 3 or more tables to group related
information for presentation. All required fields under each
section are listed and filled in (e.g. Owner Name in ID Section
has a name filled in.)
Provided an excellent risk identification, assessment, and
prioritization for APT threats against the data center. Risk
identification included at least fifteen (15) specific risks. The
risk assessment clearly and concisely addressed the potential
negative impacts of APTs upon the confidentiality, integrity,
and availability of information, information systems, and
information infrastructure in the data center.
Risk Register table containing all identified risks was included
in the Risk section of the policy. Table was complete, concise,
and accurate.
Appropriately used information from 3 or more authoritative
sources.
Addressed seven or more recommended best practices for APT
prevention, detection, and eradication. These best practices
include (but are not limited to):
(a) Maintaining a list of application systems at risk
(b) Creating an APT checklist for assets at risk
(c) Focusing on APT detection techniques and analysis tools
(d) Focusing on incident response for APTs
(e) Creating ready to use APT rapid response tactics
(f) Preparing an APT forensic response plan
(g) Increasing use of external threat intelligence
(h) Focusing on APTs in security awareness training.
Provided an excellent set of policy statements which will ensure
that the selected best practices are implemented.
Policy statement(s) and supporting explanations are clear,
concise, and accurate.
Used and cited at least three authoritative sources.
Presented an excellent policy statement or statements which
will ensure that IT Security is addressed during all four phases
of the DR/BCP planning process.
Policy statement(s) and supporting explanations are clear,
concise, and accurate.
Used and cited at least two authoritative sources.
Identified 5 or more technologies which could be used to
combat APT threats through improvements in detection,
prevention, and eradication. Integrated these technologies into
policy statements in a clear, concise, and accurate manner.
Presented 15 or more policy statements to require
implementation of best practices, security controls, and
technical counter measures (technologies) to combat APTs in
the data center.
Policy statement(s) and supporting explanations are clear,
concise, and accurate.
Used and cited at least three authoritative sources.
Work credits all sources used in a professional manner using
APA format citations/references, foot notes with publication
information, or end notes with publication information.
Provides a Bibliography or "Works Cited" if not using APA
format.
Publication information is sufficient to retrieve all listed
resources.
Submitted work shows outstanding organization and the use of
color, fonts, titles, headings and sub-headings, etc. is
appropriate to the assignment type.
No formatting, grammar, spelling, or punctuation errors.
Attached find three attachments. The work to be done is Project 4..docx

More Related Content

Similar to Attached find three attachments. The work to be done is Project 4..docx

This assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docxThis assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docx
gasciognecaren
 
Risk ManagementRisks and Risk ManagementRisks a.docx
Risk ManagementRisks and Risk ManagementRisks a.docxRisk ManagementRisks and Risk ManagementRisks a.docx
Risk ManagementRisks and Risk ManagementRisks a.docx
joellemurphey
 
The Rookie Chief Information Security OfficerDue Week 10 and w.docx
The Rookie Chief Information Security OfficerDue Week 10 and w.docxThe Rookie Chief Information Security OfficerDue Week 10 and w.docx
The Rookie Chief Information Security OfficerDue Week 10 and w.docx
teresehearn
 
A Security Testing Methodology that Fits Every IT Budget
A Security Testing Methodology that Fits Every IT BudgetA Security Testing Methodology that Fits Every IT Budget
A Security Testing Methodology that Fits Every IT Budget
Rochester Security Summit
 
Rubric for week 1System model 10 - Provide a scope description .docx
Rubric for week 1System model 10 - Provide a scope description .docxRubric for week 1System model 10 - Provide a scope description .docx
Rubric for week 1System model 10 - Provide a scope description .docx
toddr4
 
INTRODUCTIONOne of the most critical factors in customer relat.docx
INTRODUCTIONOne of the most critical factors in customer relat.docxINTRODUCTIONOne of the most critical factors in customer relat.docx
INTRODUCTIONOne of the most critical factors in customer relat.docx
bagotjesusa
 
 risk-based approach of managing information systems is a holistic.docx
 risk-based approach of managing information systems is a holistic.docx risk-based approach of managing information systems is a holistic.docx
 risk-based approach of managing information systems is a holistic.docx
odiliagilby
 
The Rookie Chief Information Security OfficerThis assignment c.docx
The Rookie Chief Information Security OfficerThis assignment c.docxThe Rookie Chief Information Security OfficerThis assignment c.docx
The Rookie Chief Information Security OfficerThis assignment c.docx
oreo10
 
Bolton Health Service Secure Network Design.docx
Bolton Health Service Secure Network Design.docxBolton Health Service Secure Network Design.docx
Bolton Health Service Secure Network Design.docx
write31
 

Similar to Attached find three attachments. The work to be done is Project 4..docx (20)

This assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docxThis assignment consists of five (5) parts     Part 1 Organi.docx
This assignment consists of five (5) parts     Part 1 Organi.docx
 
Risk ManagementRisks and Risk ManagementRisks a.docx
Risk ManagementRisks and Risk ManagementRisks a.docxRisk ManagementRisks and Risk ManagementRisks a.docx
Risk ManagementRisks and Risk ManagementRisks a.docx
 
The Rookie Chief Information Security OfficerDue Week 10 and w.docx
The Rookie Chief Information Security OfficerDue Week 10 and w.docxThe Rookie Chief Information Security OfficerDue Week 10 and w.docx
The Rookie Chief Information Security OfficerDue Week 10 and w.docx
 
Cst 630 Enhance teaching / snaptutorial.com
Cst 630 Enhance teaching / snaptutorial.comCst 630 Enhance teaching / snaptutorial.com
Cst 630 Enhance teaching / snaptutorial.com
 
A Security Testing Methodology that Fits Every IT Budget
A Security Testing Methodology that Fits Every IT BudgetA Security Testing Methodology that Fits Every IT Budget
A Security Testing Methodology that Fits Every IT Budget
 
Cmgt 582 Education Specialist -snaptutorial.com
Cmgt 582  Education Specialist -snaptutorial.comCmgt 582  Education Specialist -snaptutorial.com
Cmgt 582 Education Specialist -snaptutorial.com
 
Rubric for week 1System model 10 - Provide a scope description .docx
Rubric for week 1System model 10 - Provide a scope description .docxRubric for week 1System model 10 - Provide a scope description .docx
Rubric for week 1System model 10 - Provide a scope description .docx
 
INTRODUCTIONOne of the most critical factors in customer relat.docx
INTRODUCTIONOne of the most critical factors in customer relat.docxINTRODUCTIONOne of the most critical factors in customer relat.docx
INTRODUCTIONOne of the most critical factors in customer relat.docx
 
Cst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.comCst 630 Extraordinary Success/newtonhelp.com
Cst 630 Extraordinary Success/newtonhelp.com
 
Cst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.comCst 630 Education is Power/newtonhelp.com
Cst 630 Education is Power/newtonhelp.com
 
Cst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.comCst 630 Motivated Minds/newtonhelp.com
Cst 630 Motivated Minds/newtonhelp.com
 
Cst 630Education Specialist / snaptutorial.com
Cst 630Education Specialist / snaptutorial.comCst 630Education Specialist / snaptutorial.com
Cst 630Education Specialist / snaptutorial.com
 
Cst 630 Inspiring Innovation--tutorialrank.com
Cst 630 Inspiring Innovation--tutorialrank.comCst 630 Inspiring Innovation--tutorialrank.com
Cst 630 Inspiring Innovation--tutorialrank.com
 
 risk-based approach of managing information systems is a holistic.docx
 risk-based approach of managing information systems is a holistic.docx risk-based approach of managing information systems is a holistic.docx
 risk-based approach of managing information systems is a holistic.docx
 
The Rookie Chief Information Security OfficerThis assignment c.docx
The Rookie Chief Information Security OfficerThis assignment c.docxThe Rookie Chief Information Security OfficerThis assignment c.docx
The Rookie Chief Information Security OfficerThis assignment c.docx
 
Bolton Health Service Secure Network Design.docx
Bolton Health Service Secure Network Design.docxBolton Health Service Secure Network Design.docx
Bolton Health Service Secure Network Design.docx
 
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
Strayer cis 349 week 10 term paper planning an it infrastructure audit for co...
 
CST 630 RANK Redefined Education--cst630rank.com
CST 630 RANK Redefined Education--cst630rank.comCST 630 RANK Redefined Education--cst630rank.com
CST 630 RANK Redefined Education--cst630rank.com
 
Cst 630 Education Organization-snaptutorial.com
Cst 630 Education Organization-snaptutorial.comCst 630 Education Organization-snaptutorial.com
Cst 630 Education Organization-snaptutorial.com
 
CST 630 RANK Remember Education--cst630rank.com
CST 630 RANK Remember Education--cst630rank.comCST 630 RANK Remember Education--cst630rank.com
CST 630 RANK Remember Education--cst630rank.com
 

More from marlinnewton

Be sure to address the followingThe reason for your selection of .docx
Be sure to address the followingThe reason for your selection of .docxBe sure to address the followingThe reason for your selection of .docx
Be sure to address the followingThe reason for your selection of .docx
marlinnewton
 
Base in this argument I need a good comment( related to this argum.docx
Base in this argument I need a good comment( related to this argum.docxBase in this argument I need a good comment( related to this argum.docx
Base in this argument I need a good comment( related to this argum.docx
marlinnewton
 
BackgroundPROVISION Healthcare Technologies manufactures patient i.docx
BackgroundPROVISION Healthcare Technologies manufactures patient i.docxBackgroundPROVISION Healthcare Technologies manufactures patient i.docx
BackgroundPROVISION Healthcare Technologies manufactures patient i.docx
marlinnewton
 
BackgroundA significant criminal event may occur at any place and .docx
BackgroundA significant criminal event may occur at any place and .docxBackgroundA significant criminal event may occur at any place and .docx
BackgroundA significant criminal event may occur at any place and .docx
marlinnewton
 
Bacillus Anthracis is another term for Anthrax. Anthrax is a serious.docx
Bacillus Anthracis is another term for Anthrax. Anthrax is a serious.docxBacillus Anthracis is another term for Anthrax. Anthrax is a serious.docx
Bacillus Anthracis is another term for Anthrax. Anthrax is a serious.docx
marlinnewton
 

More from marlinnewton (20)

BC14. Topic 220 requires an entity to report income tax expense or b.docx
BC14. Topic 220 requires an entity to report income tax expense or b.docxBC14. Topic 220 requires an entity to report income tax expense or b.docx
BC14. Topic 220 requires an entity to report income tax expense or b.docx
 
Be sure to address the followingThe reason for your selection of .docx
Be sure to address the followingThe reason for your selection of .docxBe sure to address the followingThe reason for your selection of .docx
Be sure to address the followingThe reason for your selection of .docx
 
Based on your Week Two Learning Team Collaborative discussion, sub.docx
Based on your Week Two Learning Team Collaborative discussion, sub.docxBased on your Week Two Learning Team Collaborative discussion, sub.docx
Based on your Week Two Learning Team Collaborative discussion, sub.docx
 
Based on your Week Three Learning Team Collaborative discussion, s.docx
Based on your Week Three Learning Team Collaborative discussion, s.docxBased on your Week Three Learning Team Collaborative discussion, s.docx
Based on your Week Three Learning Team Collaborative discussion, s.docx
 
Based on your Week Three Learning Team Collaborative discussion, s.docx
Based on your Week Three Learning Team Collaborative discussion, s.docxBased on your Week Three Learning Team Collaborative discussion, s.docx
Based on your Week Three Learning Team Collaborative discussion, s.docx
 
Based on your research and understanding, write a 3- to 4-page Micro.docx
Based on your research and understanding, write a 3- to 4-page Micro.docxBased on your research and understanding, write a 3- to 4-page Micro.docx
Based on your research and understanding, write a 3- to 4-page Micro.docx
 
Based on your past experiences and the knowledge gained during your .docx
Based on your past experiences and the knowledge gained during your .docxBased on your past experiences and the knowledge gained during your .docx
Based on your past experiences and the knowledge gained during your .docx
 
Based on your reading of chapter 1, Madison Hemings, explain why m.docx
Based on your reading of chapter 1, Madison Hemings, explain why m.docxBased on your reading of chapter 1, Madison Hemings, explain why m.docx
Based on your reading of chapter 1, Madison Hemings, explain why m.docx
 
Based on the Citation and Notification of Penalty letter you receive.docx
Based on the Citation and Notification of Penalty letter you receive.docxBased on the Citation and Notification of Penalty letter you receive.docx
Based on the Citation and Notification of Penalty letter you receive.docx
 
Based on chapter 10, write a 2-3 page paper describing factors that .docx
Based on chapter 10, write a 2-3 page paper describing factors that .docxBased on chapter 10, write a 2-3 page paper describing factors that .docx
Based on chapter 10, write a 2-3 page paper describing factors that .docx
 
Base in this argument I need a good comment( related to this argum.docx
Base in this argument I need a good comment( related to this argum.docxBase in this argument I need a good comment( related to this argum.docx
Base in this argument I need a good comment( related to this argum.docx
 
Based on a project included in a word file. Create a Microso.docx
Based on a project included in a word file. Create a Microso.docxBased on a project included in a word file. Create a Microso.docx
Based on a project included in a word file. Create a Microso.docx
 
Balancing Function and Fashion Please respond to the followingE.docx
Balancing Function and Fashion Please respond to the followingE.docxBalancing Function and Fashion Please respond to the followingE.docx
Balancing Function and Fashion Please respond to the followingE.docx
 
Background You are part of a team that will be implementing an as.docx
Background You are part of a team that will be implementing an as.docxBackground You are part of a team that will be implementing an as.docx
Background You are part of a team that will be implementing an as.docx
 
BackgroundPROVISION Healthcare Technologies manufactures patient i.docx
BackgroundPROVISION Healthcare Technologies manufactures patient i.docxBackgroundPROVISION Healthcare Technologies manufactures patient i.docx
BackgroundPROVISION Healthcare Technologies manufactures patient i.docx
 
BackgroundA significant criminal event may occur at any place and .docx
BackgroundA significant criminal event may occur at any place and .docxBackgroundA significant criminal event may occur at any place and .docx
BackgroundA significant criminal event may occur at any place and .docx
 
Bacillus Anthracis is another term for Anthrax. Anthrax is a serious.docx
Bacillus Anthracis is another term for Anthrax. Anthrax is a serious.docxBacillus Anthracis is another term for Anthrax. Anthrax is a serious.docx
Bacillus Anthracis is another term for Anthrax. Anthrax is a serious.docx
 
Background informationsProblem for the caseEleanor Galvin .docx
Background informationsProblem for the caseEleanor Galvin .docxBackground informationsProblem for the caseEleanor Galvin .docx
Background informationsProblem for the caseEleanor Galvin .docx
 
AuditingAuditors have come into a department as part of a company-.docx
AuditingAuditors have come into a department as part of a company-.docxAuditingAuditors have come into a department as part of a company-.docx
AuditingAuditors have come into a department as part of a company-.docx
 
Audit TestsDescribes five types of audit tests of financial stat.docx
Audit TestsDescribes five types of audit tests of financial stat.docxAudit TestsDescribes five types of audit tests of financial stat.docx
Audit TestsDescribes five types of audit tests of financial stat.docx
 

Recently uploaded

The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
heathfieldcps1
 

Recently uploaded (20)

ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.ICT role in 21st century education and it's challenges.
ICT role in 21st century education and it's challenges.
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptxHMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
HMCS Vancouver Pre-Deployment Brief - May 2024 (Web Version).pptx
 
How to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POSHow to Manage Global Discount in Odoo 17 POS
How to Manage Global Discount in Odoo 17 POS
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptxSKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
SKILL OF INTRODUCING THE LESSON MICRO SKILLS.pptx
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
Sensory_Experience_and_Emotional_Resonance_in_Gabriel_Okaras_The_Piano_and_Th...
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17How to Create and Manage Wizard in Odoo 17
How to Create and Manage Wizard in Odoo 17
 
Interdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptxInterdisciplinary_Insights_Data_Collection_Methods.pptx
Interdisciplinary_Insights_Data_Collection_Methods.pptx
 
Spatium Project Simulation student brief
Spatium Project Simulation student briefSpatium Project Simulation student brief
Spatium Project Simulation student brief
 
Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...Making communications land - Are they received and understood as intended? we...
Making communications land - Are they received and understood as intended? we...
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Google Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptxGoogle Gemini An AI Revolution in Education.pptx
Google Gemini An AI Revolution in Education.pptx
 
The basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptxThe basics of sentences session 3pptx.pptx
The basics of sentences session 3pptx.pptx
 
On National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan FellowsOn National Teacher Day, meet the 2024-25 Kenan Fellows
On National Teacher Day, meet the 2024-25 Kenan Fellows
 
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
Beyond_Borders_Understanding_Anime_and_Manga_Fandom_A_Comprehensive_Audience_...
 

Attached find three attachments. The work to be done is Project 4..docx

  • 1. Attached find three attachments. The work to be done is "Project 4". The other two(Project 1 and 2) are my previous works that you will need to refer from when doing the work. APA format as stated in thirty hours. The work should be plagiarism free and the grading rubric is as follows: Provided an excellent IT Security Policy which clearly, concisely, and accurately presents all required information (see outline in assignment for sections, fields, and content requirements). Presentation of information is organized in a logical fashion and uses 3 or more tables to group related information for presentation. All required fields under each section are listed and filled in (e.g. Owner Name in ID Section has a name filled in.) Provided an excellent risk identification, assessment, and prioritization for APT threats against the data center. Risk identification included at least fifteen (15) specific risks. The risk assessment clearly and concisely addressed the potential negative impacts of APTs upon the confidentiality, integrity, and availability of information, information systems, and information infrastructure in the data center. Risk Register table containing all identified risks was included in the Risk section of the policy. Table was complete, concise, and accurate. Appropriately used information from 3 or more authoritative sources. Addressed seven or more recommended best practices for APT prevention, detection, and eradication. These best practices include (but are not limited to): (a) Maintaining a list of application systems at risk (b) Creating an APT checklist for assets at risk (c) Focusing on APT detection techniques and analysis tools (d) Focusing on incident response for APTs (e) Creating ready to use APT rapid response tactics (f) Preparing an APT forensic response plan
  • 2. (g) Increasing use of external threat intelligence (h) Focusing on APTs in security awareness training. Provided an excellent set of policy statements which will ensure that the selected best practices are implemented. Policy statement(s) and supporting explanations are clear, concise, and accurate. Used and cited at least three authoritative sources. Presented an excellent policy statement or statements which will ensure that IT Security is addressed during all four phases of the DR/BCP planning process. Policy statement(s) and supporting explanations are clear, concise, and accurate. Used and cited at least two authoritative sources. Identified 5 or more technologies which could be used to combat APT threats through improvements in detection, prevention, and eradication. Integrated these technologies into policy statements in a clear, concise, and accurate manner. Presented 15 or more policy statements to require implementation of best practices, security controls, and technical counter measures (technologies) to combat APTs in the data center. Policy statement(s) and supporting explanations are clear, concise, and accurate. Used and cited at least three authoritative sources. Work credits all sources used in a professional manner using APA format citations/references, foot notes with publication information, or end notes with publication information. Provides a Bibliography or "Works Cited" if not using APA format. Publication information is sufficient to retrieve all listed resources. Submitted work shows outstanding organization and the use of color, fonts, titles, headings and sub-headings, etc. is appropriate to the assignment type. No formatting, grammar, spelling, or punctuation errors.