Measures of Central Tendency: Mean, Median and Mode
Cis 550-week-10-term-paper
1. CIS 550 Week 10 Term. Paper:
DigiNotar,
Part 6B NEW
To purchase this material click below link
http://www.assignmentcloud.com/cis-
550/cis-550-week-10-term-paper-diginotar-
part-6b-new
www.assignmentcloud.com/
For more classes visit
www.assignmentcloud.com
CIS 550 Week 10 Term Paper: DigiNotar,
Part 6B NEW
Term Paper: DigiNotar, Part 6B Due Week
10 and worth 200 points
2. DigiNotar was a Certificate Authority (CA)
whose security was breached in 2011. In
your term paper, you are to play the role of
a CIO and review the role CAs provide.
Provide a historical perspective of CAs and
their significance to the Internet and
organizations. Your paper will review the
events that lead to the breach of DigiNotar
and the factors that would have mitigated
it.
Write a ten to sixteen (10-16) page paper
in which you develop a security policy
document for your mid-sized organization
that will include measures to protect
against breaches and act as a proactive
defense. You may select a fictitious name
for your organization for the purpose of
this paper. Do not duplicate a company's
existing policy. Create your own unique
work based on what you have learned in
this course. Policy reference materials can
3. be found in Part 6B of your textbook.
There will be two (2) major sections of the
handbook: Policy Introduction and Policy
Criteria.
Section 1: Policy Introduction
In two to four (2-4) pages total, develop a
policy introduction that secures the reason
for the policy. It must include the following
four (4) items:
WWW.1
DoaHnem mfonnaflon
2. Audience
3. Purpose
4. Scope
Section 2: Policy Criteria
In eight to twelve (8-12) pages total,
develop a security policy to protect against
breaches and act as a proactive defense. It
must include the following five
(5) policy items:
4. 1. Objectives
2. Compliances
3. Responsibilities
4. Implementation
5. Controls
6. Use at least four (4)
quality resources in this
assignment.Note:
Wikipedia and similar
Websites do not qualify as
quality
resources.
www.assignmenic
loud.com/
Your assignment must
follow these formatting
requirements:
• Be typed, double spaced,
using Times New Roman
font (size 12), with one-
5. • Include a cover page containing the title
of the assignment, the student's name, the
professor's name, the course title, and the
date. The cover page and the reference
page are not included in the required
assignment page length.
The specific course learning outcomes
associated with this assignment are:
• Develop policies and procedures to
provide necessary countermeasures to
vnr
^om^i||
iiiui.iou^sa
ll1
<res>m/
vulnerabilities.
• Use technology and information
resources to research issues in
information security.
• Write clearly and concisely about
security management using proper
writing mechanics and technical style
conventions.
6. • Include a cover page containing the title
of the assignment, the student's name, the
professor's name, the course title, and the
date. The cover page and the reference
page are not included in the required
assignment page length.
The specific course learning outcomes
associated with this assignment are:
• Develop policies and procedures to
provide necessary countermeasures to
vnr
^om^i||
iiiui.iou^sa
ll1
<res>m/
vulnerabilities.
• Use technology and information
resources to research issues in
information security.
• Write clearly and concisely about
security management using proper
writing mechanics and technical style
conventions.