SlideShare a Scribd company logo
1 of 6
CIS 550 Week 10 Term. Paper:
DigiNotar,
Part 6B NEW
To purchase this material click below link
http://www.assignmentcloud.com/cis-
550/cis-550-week-10-term-paper-diginotar-
part-6b-new
www.assignmentcloud.com/
For more classes visit
www.assignmentcloud.com
CIS 550 Week 10 Term Paper: DigiNotar,
Part 6B NEW
Term Paper: DigiNotar, Part 6B Due Week
10 and worth 200 points
DigiNotar was a Certificate Authority (CA)
whose security was breached in 2011. In
your term paper, you are to play the role of
a CIO and review the role CAs provide.
Provide a historical perspective of CAs and
their significance to the Internet and
organizations. Your paper will review the
events that lead to the breach of DigiNotar
and the factors that would have mitigated
it.
Write a ten to sixteen (10-16) page paper
in which you develop a security policy
document for your mid-sized organization
that will include measures to protect
against breaches and act as a proactive
defense. You may select a fictitious name
for your organization for the purpose of
this paper. Do not duplicate a company's
existing policy. Create your own unique
work based on what you have learned in
this course. Policy reference materials can
be found in Part 6B of your textbook.
There will be two (2) major sections of the
handbook: Policy Introduction and Policy
Criteria.
Section 1: Policy Introduction
In two to four (2-4) pages total, develop a
policy introduction that secures the reason
for the policy. It must include the following
four (4) items:
WWW.1
DoaHnem mfonnaflon
2. Audience
3. Purpose
4. Scope
Section 2: Policy Criteria
In eight to twelve (8-12) pages total,
develop a security policy to protect against
breaches and act as a proactive defense. It
must include the following five
(5) policy items:
1. Objectives
2. Compliances
3. Responsibilities
4. Implementation
5. Controls
6. Use at least four (4)
quality resources in this
assignment.Note:
Wikipedia and similar
Websites do not qualify as
quality
resources.
www.assignmenic
loud.com/
Your assignment must
follow these formatting
requirements:
• Be typed, double spaced,
using Times New Roman
font (size 12), with one-
• Include a cover page containing the title
of the assignment, the student's name, the
professor's name, the course title, and the
date. The cover page and the reference
page are not included in the required
assignment page length.
The specific course learning outcomes
associated with this assignment are:
• Develop policies and procedures to
provide necessary countermeasures to
vnr
^om^i||
iiiui.iou^sa
ll1
<res>m/
vulnerabilities.
• Use technology and information
resources to research issues in
information security.
• Write clearly and concisely about
security management using proper
writing mechanics and technical style
conventions.
• Include a cover page containing the title
of the assignment, the student's name, the
professor's name, the course title, and the
date. The cover page and the reference
page are not included in the required
assignment page length.
The specific course learning outcomes
associated with this assignment are:
• Develop policies and procedures to
provide necessary countermeasures to
vnr
^om^i||
iiiui.iou^sa
ll1
<res>m/
vulnerabilities.
• Use technology and information
resources to research issues in
information security.
• Write clearly and concisely about
security management using proper
writing mechanics and technical style
conventions.

More Related Content

Similar to Cis 550-week-10-term-paper

Strayer cis-438-week-9-assignment-4
Strayer cis-438-week-9-assignment-4Strayer cis-438-week-9-assignment-4
Strayer cis-438-week-9-assignment-4infinityend3
 
Cis 550-week-9-case-study-7
Cis 550-week-9-case-study-7Cis 550-week-9-case-study-7
Cis 550-week-9-case-study-7shyaminfo18
 
CIS 558 Focus Dreams/newtonhelp.com
CIS 558 Focus Dreams/newtonhelp.comCIS 558 Focus Dreams/newtonhelp.com
CIS 558 Focus Dreams/newtonhelp.combellflower91
 
CIS 558 Life of the Mind/newtonhelp.com   
CIS 558 Life of the Mind/newtonhelp.com   CIS 558 Life of the Mind/newtonhelp.com   
CIS 558 Life of the Mind/newtonhelp.com   bellflower9
 
CIS 558 Imagine Your Future/newtonhelp.com   
CIS 558 Imagine Your Future/newtonhelp.com   CIS 558 Imagine Your Future/newtonhelp.com   
CIS 558 Imagine Your Future/newtonhelp.com   bellflower51
 
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxmanningchassidy
 
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docx
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docxAssignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docx
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docxastonrenna
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woeleanorabarrington
 
Strayer cis 558 week 4 case study 1 mitigating cloud computing risks
Strayer cis 558 week 4 case study 1 mitigating cloud computing risksStrayer cis 558 week 4 case study 1 mitigating cloud computing risks
Strayer cis 558 week 4 case study 1 mitigating cloud computing risksshyaminfopvtltd
 
Strayer cis 558 week 4 case study 1 mitigating cloud computing risks
Strayer cis 558 week 4 case study 1 mitigating cloud computing risksStrayer cis 558 week 4 case study 1 mitigating cloud computing risks
Strayer cis 558 week 4 case study 1 mitigating cloud computing risksshyaminfotech
 
Strayer cis 558 week 4 case study 1 mitigating cloud computing risks
Strayer cis 558 week 4 case study 1 mitigating cloud computing risksStrayer cis 558 week 4 case study 1 mitigating cloud computing risks
Strayer cis 558 week 4 case study 1 mitigating cloud computing risksvindaniel123
 
Strayer cis 558 week 4 case study 1 mitigating cloud computing risks
Strayer cis 558 week 4 case study 1 mitigating cloud computing risksStrayer cis 558 week 4 case study 1 mitigating cloud computing risks
Strayer cis 558 week 4 case study 1 mitigating cloud computing risksElijahEthaan
 
Strayer cis 333 week 10 technical project paper
Strayer cis 333 week 10 technical project paperStrayer cis 333 week 10 technical project paper
Strayer cis 333 week 10 technical project paperaagnaa
 
Strayer cis-438-week-7-assignment-3-intellectual-property-laws-and-security-m...
Strayer cis-438-week-7-assignment-3-intellectual-property-laws-and-security-m...Strayer cis-438-week-7-assignment-3-intellectual-property-laws-and-security-m...
Strayer cis-438-week-7-assignment-3-intellectual-property-laws-and-security-m...infinityend3
 
Assignment 2 critical infrastructure protection
Assignment 2 critical infrastructure protectionAssignment 2 critical infrastructure protection
Assignment 2 critical infrastructure protectioncoursesexams1
 
Cis 502 assignment 1 week 2 – strayer new
Cis 502 assignment 1 week 2 – strayer newCis 502 assignment 1 week 2 – strayer new
Cis 502 assignment 1 week 2 – strayer newLindaAdams2017
 
Cis 500 Enhance teaching-snaptutorial.com
Cis 500 Enhance teaching-snaptutorial.comCis 500 Enhance teaching-snaptutorial.com
Cis 500 Enhance teaching-snaptutorial.comrobertleew8
 
Strayer cis 333 week 10 technical project paper
Strayer cis 333 week 10 technical project paperStrayer cis 333 week 10 technical project paper
Strayer cis 333 week 10 technical project paperolivergeorg
 
Strayer cis 333 week 10 technical project paper
Strayer cis 333 week 10 technical project paperStrayer cis 333 week 10 technical project paper
Strayer cis 333 week 10 technical project paperuopassignment
 
Security Policy Document Project Objectives The purpose .docx
Security Policy Document Project Objectives The purpose .docxSecurity Policy Document Project Objectives The purpose .docx
Security Policy Document Project Objectives The purpose .docxkenjordan97598
 

Similar to Cis 550-week-10-term-paper (20)

Strayer cis-438-week-9-assignment-4
Strayer cis-438-week-9-assignment-4Strayer cis-438-week-9-assignment-4
Strayer cis-438-week-9-assignment-4
 
Cis 550-week-9-case-study-7
Cis 550-week-9-case-study-7Cis 550-week-9-case-study-7
Cis 550-week-9-case-study-7
 
CIS 558 Focus Dreams/newtonhelp.com
CIS 558 Focus Dreams/newtonhelp.comCIS 558 Focus Dreams/newtonhelp.com
CIS 558 Focus Dreams/newtonhelp.com
 
CIS 558 Life of the Mind/newtonhelp.com   
CIS 558 Life of the Mind/newtonhelp.com   CIS 558 Life of the Mind/newtonhelp.com   
CIS 558 Life of the Mind/newtonhelp.com   
 
CIS 558 Imagine Your Future/newtonhelp.com   
CIS 558 Imagine Your Future/newtonhelp.com   CIS 558 Imagine Your Future/newtonhelp.com   
CIS 558 Imagine Your Future/newtonhelp.com   
 
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docxTerm Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
Term Paper Managing an IT Infrastructure AuditDue Week 10 a.docx
 
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docx
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docxAssignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docx
Assignment 3 Outline a New IT Security PolicyDue Week 9 and wor.docx
 
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and woerm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
erm Paper Managing an IT Infrastructure AuditDue Week 10 and wo
 
Strayer cis 558 week 4 case study 1 mitigating cloud computing risks
Strayer cis 558 week 4 case study 1 mitigating cloud computing risksStrayer cis 558 week 4 case study 1 mitigating cloud computing risks
Strayer cis 558 week 4 case study 1 mitigating cloud computing risks
 
Strayer cis 558 week 4 case study 1 mitigating cloud computing risks
Strayer cis 558 week 4 case study 1 mitigating cloud computing risksStrayer cis 558 week 4 case study 1 mitigating cloud computing risks
Strayer cis 558 week 4 case study 1 mitigating cloud computing risks
 
Strayer cis 558 week 4 case study 1 mitigating cloud computing risks
Strayer cis 558 week 4 case study 1 mitigating cloud computing risksStrayer cis 558 week 4 case study 1 mitigating cloud computing risks
Strayer cis 558 week 4 case study 1 mitigating cloud computing risks
 
Strayer cis 558 week 4 case study 1 mitigating cloud computing risks
Strayer cis 558 week 4 case study 1 mitigating cloud computing risksStrayer cis 558 week 4 case study 1 mitigating cloud computing risks
Strayer cis 558 week 4 case study 1 mitigating cloud computing risks
 
Strayer cis 333 week 10 technical project paper
Strayer cis 333 week 10 technical project paperStrayer cis 333 week 10 technical project paper
Strayer cis 333 week 10 technical project paper
 
Strayer cis-438-week-7-assignment-3-intellectual-property-laws-and-security-m...
Strayer cis-438-week-7-assignment-3-intellectual-property-laws-and-security-m...Strayer cis-438-week-7-assignment-3-intellectual-property-laws-and-security-m...
Strayer cis-438-week-7-assignment-3-intellectual-property-laws-and-security-m...
 
Assignment 2 critical infrastructure protection
Assignment 2 critical infrastructure protectionAssignment 2 critical infrastructure protection
Assignment 2 critical infrastructure protection
 
Cis 502 assignment 1 week 2 – strayer new
Cis 502 assignment 1 week 2 – strayer newCis 502 assignment 1 week 2 – strayer new
Cis 502 assignment 1 week 2 – strayer new
 
Cis 500 Enhance teaching-snaptutorial.com
Cis 500 Enhance teaching-snaptutorial.comCis 500 Enhance teaching-snaptutorial.com
Cis 500 Enhance teaching-snaptutorial.com
 
Strayer cis 333 week 10 technical project paper
Strayer cis 333 week 10 technical project paperStrayer cis 333 week 10 technical project paper
Strayer cis 333 week 10 technical project paper
 
Strayer cis 333 week 10 technical project paper
Strayer cis 333 week 10 technical project paperStrayer cis 333 week 10 technical project paper
Strayer cis 333 week 10 technical project paper
 
Security Policy Document Project Objectives The purpose .docx
Security Policy Document Project Objectives The purpose .docxSecurity Policy Document Project Objectives The purpose .docx
Security Policy Document Project Objectives The purpose .docx
 

More from shyaminfo18

Cis 550-week-8-case-study-6
Cis 550-week-8-case-study-6Cis 550-week-8-case-study-6
Cis 550-week-8-case-study-6shyaminfo18
 
Cis 550-week-7-case-study-5
Cis 550-week-7-case-study-5Cis 550-week-7-case-study-5
Cis 550-week-7-case-study-5shyaminfo18
 
Cis 550-week-6-assignment
Cis 550-week-6-assignmentCis 550-week-6-assignment
Cis 550-week-6-assignmentshyaminfo18
 
Cis 550-week-3-case-study
Cis 550-week-3-case-studyCis 550-week-3-case-study
Cis 550-week-3-case-studyshyaminfo18
 
Cis 550-week-3-case-study-2
Cis 550-week-3-case-study-2Cis 550-week-3-case-study-2
Cis 550-week-3-case-study-2shyaminfo18
 
Cis 550-week-2-case-study-1
Cis 550-week-2-case-study-1Cis 550-week-2-case-study-1
Cis 550-week-2-case-study-1shyaminfo18
 
Strayer cis-542-week-10-term-paper
Strayer cis-542-week-10-term-paperStrayer cis-542-week-10-term-paper
Strayer cis-542-week-10-term-papershyaminfo18
 
Strayer cis-542-week-6-assignment-2-electronic-h assignment-2
Strayer cis-542-week-6-assignment-2-electronic-h assignment-2Strayer cis-542-week-6-assignment-2-electronic-h assignment-2
Strayer cis-542-week-6-assignment-2-electronic-h assignment-2shyaminfo18
 
Strayer cis-534-week-8-assignment-2-mister-network-engineer-new
Strayer cis-534-week-8-assignment-2-mister-network-engineer-newStrayer cis-534-week-8-assignment-2-mister-network-engineer-new
Strayer cis-534-week-8-assignment-2-mister-network-engineer-newshyaminfo18
 
Strayer cis-534-week-4-assignment-1-defense-in-depth-new
Strayer cis-534-week-4-assignment-1-defense-in-depth-newStrayer cis-534-week-4-assignment-1-defense-in-depth-new
Strayer cis-534-week-4-assignment-1-defense-in-depth-newshyaminfo18
 

More from shyaminfo18 (10)

Cis 550-week-8-case-study-6
Cis 550-week-8-case-study-6Cis 550-week-8-case-study-6
Cis 550-week-8-case-study-6
 
Cis 550-week-7-case-study-5
Cis 550-week-7-case-study-5Cis 550-week-7-case-study-5
Cis 550-week-7-case-study-5
 
Cis 550-week-6-assignment
Cis 550-week-6-assignmentCis 550-week-6-assignment
Cis 550-week-6-assignment
 
Cis 550-week-3-case-study
Cis 550-week-3-case-studyCis 550-week-3-case-study
Cis 550-week-3-case-study
 
Cis 550-week-3-case-study-2
Cis 550-week-3-case-study-2Cis 550-week-3-case-study-2
Cis 550-week-3-case-study-2
 
Cis 550-week-2-case-study-1
Cis 550-week-2-case-study-1Cis 550-week-2-case-study-1
Cis 550-week-2-case-study-1
 
Strayer cis-542-week-10-term-paper
Strayer cis-542-week-10-term-paperStrayer cis-542-week-10-term-paper
Strayer cis-542-week-10-term-paper
 
Strayer cis-542-week-6-assignment-2-electronic-h assignment-2
Strayer cis-542-week-6-assignment-2-electronic-h assignment-2Strayer cis-542-week-6-assignment-2-electronic-h assignment-2
Strayer cis-542-week-6-assignment-2-electronic-h assignment-2
 
Strayer cis-534-week-8-assignment-2-mister-network-engineer-new
Strayer cis-534-week-8-assignment-2-mister-network-engineer-newStrayer cis-534-week-8-assignment-2-mister-network-engineer-new
Strayer cis-534-week-8-assignment-2-mister-network-engineer-new
 
Strayer cis-534-week-4-assignment-1-defense-in-depth-new
Strayer cis-534-week-4-assignment-1-defense-in-depth-newStrayer cis-534-week-4-assignment-1-defense-in-depth-new
Strayer cis-534-week-4-assignment-1-defense-in-depth-new
 

Recently uploaded

Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdfQucHHunhnh
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdfQucHHunhnh
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin ClassesCeline George
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.pptRamjanShidvankar
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphThiyagu K
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxAreebaZafar22
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfJayanti Pande
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxVishalSingh1417
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 

Recently uploaded (20)

Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"Mattingly "AI & Prompt Design: The Basics of Prompt Design"
Mattingly "AI & Prompt Design: The Basics of Prompt Design"
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
1029 - Danh muc Sach Giao Khoa 10 . pdf
1029 -  Danh muc Sach Giao Khoa 10 . pdf1029 -  Danh muc Sach Giao Khoa 10 . pdf
1029 - Danh muc Sach Giao Khoa 10 . pdf
 
1029-Danh muc Sach Giao Khoa khoi 6.pdf
1029-Danh muc Sach Giao Khoa khoi  6.pdf1029-Danh muc Sach Giao Khoa khoi  6.pdf
1029-Danh muc Sach Giao Khoa khoi 6.pdf
 
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17  How to Extend Models Using Mixin ClassesMixin Classes in Odoo 17  How to Extend Models Using Mixin Classes
Mixin Classes in Odoo 17 How to Extend Models Using Mixin Classes
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Application orientated numerical on hev.ppt
Application orientated numerical on hev.pptApplication orientated numerical on hev.ppt
Application orientated numerical on hev.ppt
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Z Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot GraphZ Score,T Score, Percential Rank and Box Plot Graph
Z Score,T Score, Percential Rank and Box Plot Graph
 
ICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptxICT Role in 21st Century Education & its Challenges.pptx
ICT Role in 21st Century Education & its Challenges.pptx
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Web & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdfWeb & Social Media Analytics Previous Year Question Paper.pdf
Web & Social Media Analytics Previous Year Question Paper.pdf
 
Unit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptxUnit-IV- Pharma. Marketing Channels.pptx
Unit-IV- Pharma. Marketing Channels.pptx
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 

Cis 550-week-10-term-paper

  • 1. CIS 550 Week 10 Term. Paper: DigiNotar, Part 6B NEW To purchase this material click below link http://www.assignmentcloud.com/cis- 550/cis-550-week-10-term-paper-diginotar- part-6b-new www.assignmentcloud.com/ For more classes visit www.assignmentcloud.com CIS 550 Week 10 Term Paper: DigiNotar, Part 6B NEW Term Paper: DigiNotar, Part 6B Due Week 10 and worth 200 points
  • 2. DigiNotar was a Certificate Authority (CA) whose security was breached in 2011. In your term paper, you are to play the role of a CIO and review the role CAs provide. Provide a historical perspective of CAs and their significance to the Internet and organizations. Your paper will review the events that lead to the breach of DigiNotar and the factors that would have mitigated it. Write a ten to sixteen (10-16) page paper in which you develop a security policy document for your mid-sized organization that will include measures to protect against breaches and act as a proactive defense. You may select a fictitious name for your organization for the purpose of this paper. Do not duplicate a company's existing policy. Create your own unique work based on what you have learned in this course. Policy reference materials can
  • 3. be found in Part 6B of your textbook. There will be two (2) major sections of the handbook: Policy Introduction and Policy Criteria. Section 1: Policy Introduction In two to four (2-4) pages total, develop a policy introduction that secures the reason for the policy. It must include the following four (4) items: WWW.1 DoaHnem mfonnaflon 2. Audience 3. Purpose 4. Scope Section 2: Policy Criteria In eight to twelve (8-12) pages total, develop a security policy to protect against breaches and act as a proactive defense. It must include the following five (5) policy items:
  • 4. 1. Objectives 2. Compliances 3. Responsibilities 4. Implementation 5. Controls 6. Use at least four (4) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources. www.assignmenic loud.com/ Your assignment must follow these formatting requirements: • Be typed, double spaced, using Times New Roman font (size 12), with one-
  • 5. • Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: • Develop policies and procedures to provide necessary countermeasures to vnr ^om^i|| iiiui.iou^sa ll1 <res>m/ vulnerabilities. • Use technology and information resources to research issues in information security. • Write clearly and concisely about security management using proper writing mechanics and technical style conventions.
  • 6. • Include a cover page containing the title of the assignment, the student's name, the professor's name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: • Develop policies and procedures to provide necessary countermeasures to vnr ^om^i|| iiiui.iou^sa ll1 <res>m/ vulnerabilities. • Use technology and information resources to research issues in information security. • Write clearly and concisely about security management using proper writing mechanics and technical style conventions.