SlideShare a Scribd company logo
IT 549 Milestone Four Guidelines and Rubric
One of the most important aspects of information assurance is
ensuring that proper policies and procedures are established
within an organization . Without
proper policies and procedures, there would be no order. By
implementing appropriate statements of policy and developing
effective procedures, IT
administrators ensure that incidents can be appropriately
responded to, and that individuals within the organization
understand their roles within the
information assurance plan. Individuals in an organization
would not be able to adequately understand their roles without
the establishment of these statements
of policy.
Prompt: In Module Seven, you will submit your plan pertaining
to statements of policy. You will establish protocols and
mitigating factors to the organization.
Justify how the disaster response protocols will mitigate the
threats to and vulnerabilities of the organization. You will fo
cus on disaster and incident response
protocols as well as access control. Assess your proposed
method for maintaining the success of the plan going forward.
Justify how your method will ensure the
ongoing effectiveness of the information assurance plan.
Specifically, the following critical elements must be addressed:
IV. Statements of Policy
a) Develop appropriate incident response protocols to respond
to the various threats and vulnerabilities identified within the
organization.
b) Justify how the incident response protocols will mitigate the
threats to and vulnerabilities of the organization. Support your
justification with
information assurance research and best practices.
c) Develop appropriate disaster response protocols to respond to
the various threats and vulnerabilities identified within the
organization.
d) Justify how the disaster response protocols will mitigate the
threats to and vulnerabilities of the organization. Support your
justification with
information assurance research and best practices.
e) Develop appropriate access control protocols that provide an
appropriate amount of protection while allowing users to
continue to operate
without denial of service.
f) Justify your access control protocols. Support your
justification with information assurance research and best
practices.
g) Recommend a method for maintaining the information
assurance plan once it has been established.
h) Justify how your maintenance plan will ensure the ongoing
effectiveness of the information assurance plan. Support your
justification with
information assurance research and best practices.
Rubric
Guidelines for Submission: Your paper must be submitted as a
three - to four-page Microsoft Word document with double
spacing, 12-point Times New Roman
font, one-inch margins, and at least three sources cited in APA
format.
Critical Elements Proficient (100%) Needs Improvement (75%)
Not Evident (0%) Value
Incident Response
Protocols
Devel ops appropri ate i nci dent
res pons e protocol s to res pond to
the vari ous threats and
vul nerabi l ities i denti fied
Devel ops i nci dent res pons e
protocol s to res pond to the
vari ous threats and
vul nerabi l ities i denti fied, but
they are not al l appropriate or do
not res pond to al l the threats
and vul nerabi l iti es
Does not devel op i nci dent
res pons e protocol s
12
Justification of
Incident Response
Protocols
Logi cal l y justi fies how the
i nci dent res pons e protocol s wi l l
mi ti gate the threats to and
vul nerabi l ities of the organi zation
wi th s upport from i nformati on
as s urance res earch and bes t
practi ces
Jus ti fi es how the i nci dent
res pons e protocol s wi l l mi ti gate
the threats to and vul nerabi l iti es
of the organi zati on wi th mi ni mal
s upport from i nformati on
as s urance res earch and bes t
practi ces , or jus ti ficati on i s
i l l ogi cal
Does not jus ti fy how the i nci dent
res pons e protocol s wi l l mi ti gate
the threats to and vul nerabi l iti es
of the organi zati on
12
Disaster Response
Protocols
Devel ops appropri ate di s aster
res pons e protocol s to res pond to
the vari ous threats and
vul nerabi l ities i denti fied
Devel ops di s aster res pons e
protocol s to res pond to the
vari ous threats and
vul nerabi l ities i denti fied, but
they are not al l appropriate or do
not res pond to al l the threats
and vul nerabi l iti es
Does not devel op di s as ter
res pons e protocol s
12
Justification of
Disaster Response
Protocols
Logi cal l y justi fies how the
di s as ter res pons e protocol s wi l l
mi ti gate the threats to and
vul nerabi l ities of the organi zation
wi th s upport from i nformati on
as s urance res earch and bes t
practi ces
Jus ti fi es how the di s aster
res pons e protocol s wi l l mi ti gate
the threats to and vul nerabi l iti es
of the organi zati on wi th mi ni mal
s upport from i nformati on
as s urance res earch and bes t
practi ces , or jus ti ficati on i s
i l l ogi cal
Does not jus ti fy how the di s as ter
res pons e protocol s wi l l mi ti gate
the threats to and vul nerabi l iti es
of the organi zati on
12
Access Control
Protocols
Devel ops appropri ate acces s
control protocol s that provi de an
appropri ate amount of
protecti on whi l e al l owi ng us ers
to conti nue to operate wi thout
deni al of s ervi ce
Devel ops acces s control
protocol s , but they do not
provi de an appropri ate amount
of protecti on whi l e al l owi ng
us ers to conti nue to operate
wi thout deni al of s ervi ce
Does not devel op acces s control
protocol s
12
Justification of
Access Control
Protocols
Logi cal l y justi fies the acces s
control protocol s wi th s upport
from i nformati on as s urance
res earch and bes t practi ces
Jus ti fi es the acces s control
protocol s wi th mi ni mal s upport
from i nformati on as s urance
res earch and bes t practi ces , or
jus ti fi cation i s i llogical
Does not jus ti fy the acces s
control protocol s
12
Method for
Maintaining the
Information
Assurance Plan
Recommends a comprehens i ve
method for mai ntai ni ng the
i nformati on as s urance pl an once
i t has been es tabl i s hed
Recommends a method for
mai ntai ni ng the i nformati on
as s urance pl an once i t has been
es tabl i s hed but
recommendati ons are not ful l y
devel oped
Does not recommend a method
for mai ntai ni ng the i nformati on
as s urance pl an once i t has been
es tabl i s hed
12
Justification of
Maintenance Plan
Logi cal l y justi fies how the
mai ntenance pl an wi l l ens ure the
ongoi ng effecti venes s of the
i nformati on as s urance pl an wi th
s upport from i nformati on
as s urance res earch and bes t
practi ces
Jus ti fi es how the mai ntenance
pl an wi l l ens ure the ongoi ng
effecti venes s of the i nformati on
as s urance pl an wi th mi ni mal
s upport from i nformati on
as s urance res earch and bes t
practi ces , or jus ti ficati on i s
i l l ogi cal
Does not jus ti fy how the
mai ntenance pl an wi l l ens ure the
ongoi ng effecti venes s of the
i nformati on as s urance pl an
12
Articulation of
Response
Submi s s i on has no major errors
rel ated to ci tati ons , grammar,
s pel l i ng, s yntax, or organi zati on
Submi s s i on has major errors
rel ated to ci tati ons , grammar,
s pel l i ng, s yntax, or organi zati on
that negati vel y i mpact readabi lity
and arti cul ation of mai n i deas
Submi s s i on has criti cal errors
rel ated to ci tati ons , grammar,
s pel l i ng, s yntax, or organi zati on
that prevent unders tandi ng of
i deas
4
Earned Total 100%
Week 4 Assignment Template
Sustainable Living Guide Contributions, Part Four of Four:
Sustaining our Atmosphere and Climate
Instructions: Using the term that you have selected from the list
provided in the classroom, please complete the following three-
paragraph essay. Write a minimum of 5 to 7 well-crafted,
original sentences per paragraph. In your response, you are
expected to cite and reference, in APA format, at least two
outside sources in addition to the class text. The sources must
be credible (from experts in the field of study); at least one
scholarly source (published in a peer-reviewed academic
journal) is strongly encouraged. Delete all instructions before
submitting your work to Waypoint.
Your Term: [type your term here]
[First Paragraph: Thoroughly define your term, using your own
words to do so. In your definition, be sure explain why the term
is important to know. Be as specific as possible and provide
examples as necessary to support your ideas.]
[Second Paragraph:Discuss how the term affects living beings
(including humans) and/or the physical environment. Provide
examples as needed.]
[Third Paragraph: Suggest two clear, specific actions that you
and the other students might take to promote environmental
sustainability in relation to this term. Be creative and concrete
with your suggestions. For example, you might recommend
supporting a particular organization that is active in the field of
your term. Explain exactly how those actions will aid in
safeguarding our environment in relation to your chosen term.]
References: Following your essay, list all references you cited,
in APA format.
After proofreading your assignment carefully, please submit
your work to Waypoint for evaluation.

More Related Content

Similar to IT 549 Milestone Four Guidelines and Rubric One of the .docx

MODULE 7 UNIT 3Ongoing projectHAR CYB Module 7 Unit 3 Ongoin.docx
MODULE 7 UNIT 3Ongoing projectHAR CYB Module 7 Unit 3 Ongoin.docxMODULE 7 UNIT 3Ongoing projectHAR CYB Module 7 Unit 3 Ongoin.docx
MODULE 7 UNIT 3Ongoing projectHAR CYB Module 7 Unit 3 Ongoin.docx
audeleypearl
 
(CDC IT Security Staff BCP Policy) ([CSIA 413,).docx
 (CDC IT Security Staff BCP Policy) ([CSIA 413,).docx (CDC IT Security Staff BCP Policy) ([CSIA 413,).docx
(CDC IT Security Staff BCP Policy) ([CSIA 413,).docx
joyjonna282
 
Impact of Nursing Informatics on Patient Outcomes Care Efficiencies.docx
Impact of Nursing Informatics on Patient Outcomes Care Efficiencies.docxImpact of Nursing Informatics on Patient Outcomes Care Efficiencies.docx
Impact of Nursing Informatics on Patient Outcomes Care Efficiencies.docx
4934bk
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
FireEye, Inc.
 
The security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docxThe security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docx
joshua2345678
 
Please answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docxPlease answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docx
mattjtoni51554
 
Assignment 2 Organizational Risk Appetite and Risk AssessmentDu.docx
Assignment 2 Organizational Risk Appetite and Risk AssessmentDu.docxAssignment 2 Organizational Risk Appetite and Risk AssessmentDu.docx
Assignment 2 Organizational Risk Appetite and Risk AssessmentDu.docx
josephinepaterson7611
 
SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls Survey
Edgar Alejandro Villegas
 
Explanation of the most common types of administrative risks
Explanation of the most common types of administrative risksExplanation of the most common types of administrative risks
Explanation of the most common types of administrative risks
Prathitha cb
 
Assignment_Fraud Prevention and Detection PlanDue February 22, 2.docx
Assignment_Fraud Prevention and Detection PlanDue February 22, 2.docxAssignment_Fraud Prevention and Detection PlanDue February 22, 2.docx
Assignment_Fraud Prevention and Detection PlanDue February 22, 2.docx
normanibarber20063
 
Rubric Name Project 7 Organization Enterprise Plan and Security P.docx
Rubric Name Project 7 Organization Enterprise Plan and Security P.docxRubric Name Project 7 Organization Enterprise Plan and Security P.docx
Rubric Name Project 7 Organization Enterprise Plan and Security P.docx
SUBHI7
 
Web Application Penetration Tests - Reporting
Web Application Penetration Tests - ReportingWeb Application Penetration Tests - Reporting
Web Application Penetration Tests - Reporting
Netsparker
 
Chapter 14 certificationsIT Framework standards
Chapter 14 certificationsIT Framework standardsChapter 14 certificationsIT Framework standards
Chapter 14 certificationsIT Framework standards
EstelaJeffery653
 
Discusses the resources needed to ensure billing and coding compliance update...
Discusses the resources needed to ensure billing and coding compliance update...Discusses the resources needed to ensure billing and coding compliance update...
Discusses the resources needed to ensure billing and coding compliance update...
intel-writers.com
 
ISE 510 Final Project Milestone Two Guidelines and Rubric .docx
 ISE 510 Final Project Milestone Two Guidelines and Rubric .docx ISE 510 Final Project Milestone Two Guidelines and Rubric .docx
ISE 510 Final Project Milestone Two Guidelines and Rubric .docx
aryan532920
 
RUNNING HEADER Potential Risk FactorsPotential Risk Factors.docx
RUNNING HEADER Potential Risk FactorsPotential Risk Factors.docxRUNNING HEADER Potential Risk FactorsPotential Risk Factors.docx
RUNNING HEADER Potential Risk FactorsPotential Risk Factors.docx
rtodd599
 
LO5 Develop a cyber  1. Instructions and guidelines (Re.docx
LO5 Develop a cyber  1. Instructions and guidelines (Re.docxLO5 Develop a cyber  1. Instructions and guidelines (Re.docx
LO5 Develop a cyber  1. Instructions and guidelines (Re.docx
jeremylockett77
 
HIM 500 Milestone One Gu
HIM 500 Milestone One GuHIM 500 Milestone One Gu
HIM 500 Milestone One Gu
SusanaFurman449
 
 risk-based approach of managing information systems is a holistic.docx
 risk-based approach of managing information systems is a holistic.docx risk-based approach of managing information systems is a holistic.docx
 risk-based approach of managing information systems is a holistic.docx
odiliagilby
 
NUR 400 Short Paper Rubric In the clinical area, yo.docx
 NUR 400 Short Paper Rubric   In the clinical area, yo.docx NUR 400 Short Paper Rubric   In the clinical area, yo.docx
NUR 400 Short Paper Rubric In the clinical area, yo.docx
aryan532920
 

Similar to IT 549 Milestone Four Guidelines and Rubric One of the .docx (20)

MODULE 7 UNIT 3Ongoing projectHAR CYB Module 7 Unit 3 Ongoin.docx
MODULE 7 UNIT 3Ongoing projectHAR CYB Module 7 Unit 3 Ongoin.docxMODULE 7 UNIT 3Ongoing projectHAR CYB Module 7 Unit 3 Ongoin.docx
MODULE 7 UNIT 3Ongoing projectHAR CYB Module 7 Unit 3 Ongoin.docx
 
(CDC IT Security Staff BCP Policy) ([CSIA 413,).docx
 (CDC IT Security Staff BCP Policy) ([CSIA 413,).docx (CDC IT Security Staff BCP Policy) ([CSIA 413,).docx
(CDC IT Security Staff BCP Policy) ([CSIA 413,).docx
 
Impact of Nursing Informatics on Patient Outcomes Care Efficiencies.docx
Impact of Nursing Informatics on Patient Outcomes Care Efficiencies.docxImpact of Nursing Informatics on Patient Outcomes Care Efficiencies.docx
Impact of Nursing Informatics on Patient Outcomes Care Efficiencies.docx
 
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
SANS 2013 Report on Critical Security Controls Survey: Moving From Awareness ...
 
The security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docxThe security consulting firm that you work for has been awarded a co.docx
The security consulting firm that you work for has been awarded a co.docx
 
Please answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docxPlease answer the following questions in essay fashion giving as m.docx
Please answer the following questions in essay fashion giving as m.docx
 
Assignment 2 Organizational Risk Appetite and Risk AssessmentDu.docx
Assignment 2 Organizational Risk Appetite and Risk AssessmentDu.docxAssignment 2 Organizational Risk Appetite and Risk AssessmentDu.docx
Assignment 2 Organizational Risk Appetite and Risk AssessmentDu.docx
 
SANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls SurveySANS 2013 Critical Security Controls Survey
SANS 2013 Critical Security Controls Survey
 
Explanation of the most common types of administrative risks
Explanation of the most common types of administrative risksExplanation of the most common types of administrative risks
Explanation of the most common types of administrative risks
 
Assignment_Fraud Prevention and Detection PlanDue February 22, 2.docx
Assignment_Fraud Prevention and Detection PlanDue February 22, 2.docxAssignment_Fraud Prevention and Detection PlanDue February 22, 2.docx
Assignment_Fraud Prevention and Detection PlanDue February 22, 2.docx
 
Rubric Name Project 7 Organization Enterprise Plan and Security P.docx
Rubric Name Project 7 Organization Enterprise Plan and Security P.docxRubric Name Project 7 Organization Enterprise Plan and Security P.docx
Rubric Name Project 7 Organization Enterprise Plan and Security P.docx
 
Web Application Penetration Tests - Reporting
Web Application Penetration Tests - ReportingWeb Application Penetration Tests - Reporting
Web Application Penetration Tests - Reporting
 
Chapter 14 certificationsIT Framework standards
Chapter 14 certificationsIT Framework standardsChapter 14 certificationsIT Framework standards
Chapter 14 certificationsIT Framework standards
 
Discusses the resources needed to ensure billing and coding compliance update...
Discusses the resources needed to ensure billing and coding compliance update...Discusses the resources needed to ensure billing and coding compliance update...
Discusses the resources needed to ensure billing and coding compliance update...
 
ISE 510 Final Project Milestone Two Guidelines and Rubric .docx
 ISE 510 Final Project Milestone Two Guidelines and Rubric .docx ISE 510 Final Project Milestone Two Guidelines and Rubric .docx
ISE 510 Final Project Milestone Two Guidelines and Rubric .docx
 
RUNNING HEADER Potential Risk FactorsPotential Risk Factors.docx
RUNNING HEADER Potential Risk FactorsPotential Risk Factors.docxRUNNING HEADER Potential Risk FactorsPotential Risk Factors.docx
RUNNING HEADER Potential Risk FactorsPotential Risk Factors.docx
 
LO5 Develop a cyber  1. Instructions and guidelines (Re.docx
LO5 Develop a cyber  1. Instructions and guidelines (Re.docxLO5 Develop a cyber  1. Instructions and guidelines (Re.docx
LO5 Develop a cyber  1. Instructions and guidelines (Re.docx
 
HIM 500 Milestone One Gu
HIM 500 Milestone One GuHIM 500 Milestone One Gu
HIM 500 Milestone One Gu
 
 risk-based approach of managing information systems is a holistic.docx
 risk-based approach of managing information systems is a holistic.docx risk-based approach of managing information systems is a holistic.docx
 risk-based approach of managing information systems is a holistic.docx
 
NUR 400 Short Paper Rubric In the clinical area, yo.docx
 NUR 400 Short Paper Rubric   In the clinical area, yo.docx NUR 400 Short Paper Rubric   In the clinical area, yo.docx
NUR 400 Short Paper Rubric In the clinical area, yo.docx
 

More from vrickens

1000 words, 2 referencesBegin conducting research now on your .docx
1000 words, 2 referencesBegin conducting research now on your .docx1000 words, 2 referencesBegin conducting research now on your .docx
1000 words, 2 referencesBegin conducting research now on your .docx
vrickens
 
1000 words only due by 5314 at 1200 estthis is a second part to.docx
1000 words only due by 5314 at 1200 estthis is a second part to.docx1000 words only due by 5314 at 1200 estthis is a second part to.docx
1000 words only due by 5314 at 1200 estthis is a second part to.docx
vrickens
 
1000 words with refernceBased on the American constitution,” wh.docx
1000 words with refernceBased on the American constitution,” wh.docx1000 words with refernceBased on the American constitution,” wh.docx
1000 words with refernceBased on the American constitution,” wh.docx
vrickens
 
10.1. In a t test for a single sample, the samples mean.docx
10.1. In a t test for a single sample, the samples mean.docx10.1. In a t test for a single sample, the samples mean.docx
10.1. In a t test for a single sample, the samples mean.docx
vrickens
 
100 WORDS OR MOREConsider your past experiences either as a studen.docx
100 WORDS OR MOREConsider your past experiences either as a studen.docx100 WORDS OR MOREConsider your past experiences either as a studen.docx
100 WORDS OR MOREConsider your past experiences either as a studen.docx
vrickens
 
1000 to 2000 words Research Title VII of the Civil Rights Act of.docx
1000 to 2000 words Research Title VII of the Civil Rights Act of.docx1000 to 2000 words Research Title VII of the Civil Rights Act of.docx
1000 to 2000 words Research Title VII of the Civil Rights Act of.docx
vrickens
 
1000 word essay MlA Format.. What is our personal responsibility tow.docx
1000 word essay MlA Format.. What is our personal responsibility tow.docx1000 word essay MlA Format.. What is our personal responsibility tow.docx
1000 word essay MlA Format.. What is our personal responsibility tow.docx
vrickens
 
100 wordsGoods and services that are not sold in markets.docx
100 wordsGoods and services that are not sold in markets.docx100 wordsGoods and services that are not sold in markets.docx
100 wordsGoods and services that are not sold in markets.docx
vrickens
 
100 word responseChicago style citingLink to textbook httpbo.docx
100 word responseChicago style citingLink to textbook httpbo.docx100 word responseChicago style citingLink to textbook httpbo.docx
100 word responseChicago style citingLink to textbook httpbo.docx
vrickens
 
100 word response to the followingBoth perspectives that we rea.docx
100 word response to the followingBoth perspectives that we rea.docx100 word response to the followingBoth perspectives that we rea.docx
100 word response to the followingBoth perspectives that we rea.docx
vrickens
 
100 word response to the followingThe point that Penetito is tr.docx
100 word response to the followingThe point that Penetito is tr.docx100 word response to the followingThe point that Penetito is tr.docx
100 word response to the followingThe point that Penetito is tr.docx
vrickens
 
100 word response to the folowingMust use Chicago style citing an.docx
100 word response to the folowingMust use Chicago style citing an.docx100 word response to the folowingMust use Chicago style citing an.docx
100 word response to the folowingMust use Chicago style citing an.docx
vrickens
 
100 word response using textbook Getlein, Mark. Living with Art, 9t.docx
100 word response using textbook Getlein, Mark. Living with Art, 9t.docx100 word response using textbook Getlein, Mark. Living with Art, 9t.docx
100 word response using textbook Getlein, Mark. Living with Art, 9t.docx
vrickens
 
100 word response to the following. Must cite properly in MLA.Un.docx
100 word response to the following. Must cite properly in MLA.Un.docx100 word response to the following. Must cite properly in MLA.Un.docx
100 word response to the following. Must cite properly in MLA.Un.docx
vrickens
 
100 original, rubric, word count and required readings must be incl.docx
100 original, rubric, word count and required readings must be incl.docx100 original, rubric, word count and required readings must be incl.docx
100 original, rubric, word count and required readings must be incl.docx
vrickens
 
100 or more wordsFor this Discussion imagine that you are speaki.docx
100 or more wordsFor this Discussion imagine that you are speaki.docx100 or more wordsFor this Discussion imagine that you are speaki.docx
100 or more wordsFor this Discussion imagine that you are speaki.docx
vrickens
 
10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx
10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx
10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx
vrickens
 
10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx
10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx
10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx
vrickens
 
10-12 page paer onDiscuss the advantages and problems with trailer.docx
10-12 page paer onDiscuss the advantages and problems with trailer.docx10-12 page paer onDiscuss the advantages and problems with trailer.docx
10-12 page paer onDiscuss the advantages and problems with trailer.docx
vrickens
 
10. Assume that you are responsible for decontaminating materials in.docx
10. Assume that you are responsible for decontaminating materials in.docx10. Assume that you are responsible for decontaminating materials in.docx
10. Assume that you are responsible for decontaminating materials in.docx
vrickens
 

More from vrickens (20)

1000 words, 2 referencesBegin conducting research now on your .docx
1000 words, 2 referencesBegin conducting research now on your .docx1000 words, 2 referencesBegin conducting research now on your .docx
1000 words, 2 referencesBegin conducting research now on your .docx
 
1000 words only due by 5314 at 1200 estthis is a second part to.docx
1000 words only due by 5314 at 1200 estthis is a second part to.docx1000 words only due by 5314 at 1200 estthis is a second part to.docx
1000 words only due by 5314 at 1200 estthis is a second part to.docx
 
1000 words with refernceBased on the American constitution,” wh.docx
1000 words with refernceBased on the American constitution,” wh.docx1000 words with refernceBased on the American constitution,” wh.docx
1000 words with refernceBased on the American constitution,” wh.docx
 
10.1. In a t test for a single sample, the samples mean.docx
10.1. In a t test for a single sample, the samples mean.docx10.1. In a t test for a single sample, the samples mean.docx
10.1. In a t test for a single sample, the samples mean.docx
 
100 WORDS OR MOREConsider your past experiences either as a studen.docx
100 WORDS OR MOREConsider your past experiences either as a studen.docx100 WORDS OR MOREConsider your past experiences either as a studen.docx
100 WORDS OR MOREConsider your past experiences either as a studen.docx
 
1000 to 2000 words Research Title VII of the Civil Rights Act of.docx
1000 to 2000 words Research Title VII of the Civil Rights Act of.docx1000 to 2000 words Research Title VII of the Civil Rights Act of.docx
1000 to 2000 words Research Title VII of the Civil Rights Act of.docx
 
1000 word essay MlA Format.. What is our personal responsibility tow.docx
1000 word essay MlA Format.. What is our personal responsibility tow.docx1000 word essay MlA Format.. What is our personal responsibility tow.docx
1000 word essay MlA Format.. What is our personal responsibility tow.docx
 
100 wordsGoods and services that are not sold in markets.docx
100 wordsGoods and services that are not sold in markets.docx100 wordsGoods and services that are not sold in markets.docx
100 wordsGoods and services that are not sold in markets.docx
 
100 word responseChicago style citingLink to textbook httpbo.docx
100 word responseChicago style citingLink to textbook httpbo.docx100 word responseChicago style citingLink to textbook httpbo.docx
100 word responseChicago style citingLink to textbook httpbo.docx
 
100 word response to the followingBoth perspectives that we rea.docx
100 word response to the followingBoth perspectives that we rea.docx100 word response to the followingBoth perspectives that we rea.docx
100 word response to the followingBoth perspectives that we rea.docx
 
100 word response to the followingThe point that Penetito is tr.docx
100 word response to the followingThe point that Penetito is tr.docx100 word response to the followingThe point that Penetito is tr.docx
100 word response to the followingThe point that Penetito is tr.docx
 
100 word response to the folowingMust use Chicago style citing an.docx
100 word response to the folowingMust use Chicago style citing an.docx100 word response to the folowingMust use Chicago style citing an.docx
100 word response to the folowingMust use Chicago style citing an.docx
 
100 word response using textbook Getlein, Mark. Living with Art, 9t.docx
100 word response using textbook Getlein, Mark. Living with Art, 9t.docx100 word response using textbook Getlein, Mark. Living with Art, 9t.docx
100 word response using textbook Getlein, Mark. Living with Art, 9t.docx
 
100 word response to the following. Must cite properly in MLA.Un.docx
100 word response to the following. Must cite properly in MLA.Un.docx100 word response to the following. Must cite properly in MLA.Un.docx
100 word response to the following. Must cite properly in MLA.Un.docx
 
100 original, rubric, word count and required readings must be incl.docx
100 original, rubric, word count and required readings must be incl.docx100 original, rubric, word count and required readings must be incl.docx
100 original, rubric, word count and required readings must be incl.docx
 
100 or more wordsFor this Discussion imagine that you are speaki.docx
100 or more wordsFor this Discussion imagine that you are speaki.docx100 or more wordsFor this Discussion imagine that you are speaki.docx
100 or more wordsFor this Discussion imagine that you are speaki.docx
 
10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx
10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx
10. (TCOs 1 and 10) Apple, Inc. a cash basis S corporation in Or.docx
 
10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx
10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx
10-12 slides with Notes APA Style ReferecesThe prosecutor is getti.docx
 
10-12 page paer onDiscuss the advantages and problems with trailer.docx
10-12 page paer onDiscuss the advantages and problems with trailer.docx10-12 page paer onDiscuss the advantages and problems with trailer.docx
10-12 page paer onDiscuss the advantages and problems with trailer.docx
 
10. Assume that you are responsible for decontaminating materials in.docx
10. Assume that you are responsible for decontaminating materials in.docx10. Assume that you are responsible for decontaminating materials in.docx
10. Assume that you are responsible for decontaminating materials in.docx
 

Recently uploaded

The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
History of Stoke Newington
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
TechSoup
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
amberjdewit93
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
Celine George
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Excellence Foundation for South Sudan
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
Celine George
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
Dr. Mulla Adam Ali
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
Academy of Science of South Africa
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
thanhdowork
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Dr. Vinod Kumar Kanvaria
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
adhitya5119
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
ak6969907
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
tarandeep35
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
David Douglas School District
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
Jean Carlos Nunes Paixão
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
Dr. Shivangi Singh Parihar
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 

Recently uploaded (20)

The History of Stoke Newington Street Names
The History of Stoke Newington Street NamesThe History of Stoke Newington Street Names
The History of Stoke Newington Street Names
 
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat  Leveraging AI for Diversity, Equity, and InclusionExecutive Directors Chat  Leveraging AI for Diversity, Equity, and Inclusion
Executive Directors Chat Leveraging AI for Diversity, Equity, and Inclusion
 
Digital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental DesignDigital Artefact 1 - Tiny Home Environmental Design
Digital Artefact 1 - Tiny Home Environmental Design
 
How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17How to Fix the Import Error in the Odoo 17
How to Fix the Import Error in the Odoo 17
 
Your Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective UpskillingYour Skill Boost Masterclass: Strategies for Effective Upskilling
Your Skill Boost Masterclass: Strategies for Effective Upskilling
 
How to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP ModuleHow to Add Chatter in the odoo 17 ERP Module
How to Add Chatter in the odoo 17 ERP Module
 
Hindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdfHindi varnamala | hindi alphabet PPT.pdf
Hindi varnamala | hindi alphabet PPT.pdf
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 
South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)South African Journal of Science: Writing with integrity workshop (2024)
South African Journal of Science: Writing with integrity workshop (2024)
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
A Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptxA Survey of Techniques for Maximizing LLM Performance.pptx
A Survey of Techniques for Maximizing LLM Performance.pptx
 
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
Exploiting Artificial Intelligence for Empowering Researchers and Faculty, In...
 
Advanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docxAdvanced Java[Extra Concepts, Not Difficult].docx
Advanced Java[Extra Concepts, Not Difficult].docx
 
World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024World environment day ppt For 5 June 2024
World environment day ppt For 5 June 2024
 
S1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptxS1-Introduction-Biopesticides in ICM.pptx
S1-Introduction-Biopesticides in ICM.pptx
 
Pride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School DistrictPride Month Slides 2024 David Douglas School District
Pride Month Slides 2024 David Douglas School District
 
A Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdfA Independência da América Espanhola LAPBOOK.pdf
A Independência da América Espanhola LAPBOOK.pdf
 
PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.PCOS corelations and management through Ayurveda.
PCOS corelations and management through Ayurveda.
 
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptxChapter 4 - Islamic Financial Institutions in Malaysia.pptx
Chapter 4 - Islamic Financial Institutions in Malaysia.pptx
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 

IT 549 Milestone Four Guidelines and Rubric One of the .docx

  • 1. IT 549 Milestone Four Guidelines and Rubric One of the most important aspects of information assurance is ensuring that proper policies and procedures are established within an organization . Without proper policies and procedures, there would be no order. By implementing appropriate statements of policy and developing effective procedures, IT administrators ensure that incidents can be appropriately responded to, and that individuals within the organization understand their roles within the information assurance plan. Individuals in an organization would not be able to adequately understand their roles without the establishment of these statements of policy. Prompt: In Module Seven, you will submit your plan pertaining to statements of policy. You will establish protocols and mitigating factors to the organization. Justify how the disaster response protocols will mitigate the threats to and vulnerabilities of the organization. You will fo cus on disaster and incident response protocols as well as access control. Assess your proposed method for maintaining the success of the plan going forward. Justify how your method will ensure the ongoing effectiveness of the information assurance plan. Specifically, the following critical elements must be addressed: IV. Statements of Policy
  • 2. a) Develop appropriate incident response protocols to respond to the various threats and vulnerabilities identified within the organization. b) Justify how the incident response protocols will mitigate the threats to and vulnerabilities of the organization. Support your justification with information assurance research and best practices. c) Develop appropriate disaster response protocols to respond to the various threats and vulnerabilities identified within the organization. d) Justify how the disaster response protocols will mitigate the threats to and vulnerabilities of the organization. Support your justification with information assurance research and best practices. e) Develop appropriate access control protocols that provide an appropriate amount of protection while allowing users to continue to operate without denial of service. f) Justify your access control protocols. Support your justification with information assurance research and best practices. g) Recommend a method for maintaining the information assurance plan once it has been established. h) Justify how your maintenance plan will ensure the ongoing effectiveness of the information assurance plan. Support your justification with information assurance research and best practices.
  • 3. Rubric Guidelines for Submission: Your paper must be submitted as a three - to four-page Microsoft Word document with double spacing, 12-point Times New Roman font, one-inch margins, and at least three sources cited in APA format. Critical Elements Proficient (100%) Needs Improvement (75%) Not Evident (0%) Value Incident Response Protocols Devel ops appropri ate i nci dent res pons e protocol s to res pond to the vari ous threats and vul nerabi l ities i denti fied Devel ops i nci dent res pons e protocol s to res pond to the vari ous threats and vul nerabi l ities i denti fied, but they are not al l appropriate or do not res pond to al l the threats and vul nerabi l iti es Does not devel op i nci dent res pons e protocol s 12
  • 4. Justification of Incident Response Protocols Logi cal l y justi fies how the i nci dent res pons e protocol s wi l l mi ti gate the threats to and vul nerabi l ities of the organi zation wi th s upport from i nformati on as s urance res earch and bes t practi ces Jus ti fi es how the i nci dent res pons e protocol s wi l l mi ti gate the threats to and vul nerabi l iti es of the organi zati on wi th mi ni mal s upport from i nformati on as s urance res earch and bes t practi ces , or jus ti ficati on i s i l l ogi cal Does not jus ti fy how the i nci dent res pons e protocol s wi l l mi ti gate the threats to and vul nerabi l iti es of the organi zati on 12 Disaster Response Protocols
  • 5. Devel ops appropri ate di s aster res pons e protocol s to res pond to the vari ous threats and vul nerabi l ities i denti fied Devel ops di s aster res pons e protocol s to res pond to the vari ous threats and vul nerabi l ities i denti fied, but they are not al l appropriate or do not res pond to al l the threats and vul nerabi l iti es Does not devel op di s as ter res pons e protocol s 12 Justification of Disaster Response Protocols Logi cal l y justi fies how the di s as ter res pons e protocol s wi l l mi ti gate the threats to and vul nerabi l ities of the organi zation wi th s upport from i nformati on as s urance res earch and bes t practi ces Jus ti fi es how the di s aster
  • 6. res pons e protocol s wi l l mi ti gate the threats to and vul nerabi l iti es of the organi zati on wi th mi ni mal s upport from i nformati on as s urance res earch and bes t practi ces , or jus ti ficati on i s i l l ogi cal Does not jus ti fy how the di s as ter res pons e protocol s wi l l mi ti gate the threats to and vul nerabi l iti es of the organi zati on 12 Access Control Protocols Devel ops appropri ate acces s control protocol s that provi de an appropri ate amount of protecti on whi l e al l owi ng us ers to conti nue to operate wi thout deni al of s ervi ce Devel ops acces s control protocol s , but they do not provi de an appropri ate amount of protecti on whi l e al l owi ng
  • 7. us ers to conti nue to operate wi thout deni al of s ervi ce Does not devel op acces s control protocol s 12 Justification of Access Control Protocols Logi cal l y justi fies the acces s control protocol s wi th s upport from i nformati on as s urance res earch and bes t practi ces Jus ti fi es the acces s control protocol s wi th mi ni mal s upport from i nformati on as s urance res earch and bes t practi ces , or jus ti fi cation i s i llogical Does not jus ti fy the acces s control protocol s 12 Method for Maintaining the Information
  • 8. Assurance Plan Recommends a comprehens i ve method for mai ntai ni ng the i nformati on as s urance pl an once i t has been es tabl i s hed Recommends a method for mai ntai ni ng the i nformati on as s urance pl an once i t has been es tabl i s hed but recommendati ons are not ful l y devel oped Does not recommend a method for mai ntai ni ng the i nformati on as s urance pl an once i t has been es tabl i s hed 12 Justification of Maintenance Plan Logi cal l y justi fies how the mai ntenance pl an wi l l ens ure the ongoi ng effecti venes s of the i nformati on as s urance pl an wi th s upport from i nformati on as s urance res earch and bes t
  • 9. practi ces Jus ti fi es how the mai ntenance pl an wi l l ens ure the ongoi ng effecti venes s of the i nformati on as s urance pl an wi th mi ni mal s upport from i nformati on as s urance res earch and bes t practi ces , or jus ti ficati on i s i l l ogi cal Does not jus ti fy how the mai ntenance pl an wi l l ens ure the ongoi ng effecti venes s of the i nformati on as s urance pl an 12 Articulation of Response Submi s s i on has no major errors rel ated to ci tati ons , grammar, s pel l i ng, s yntax, or organi zati on Submi s s i on has major errors rel ated to ci tati ons , grammar, s pel l i ng, s yntax, or organi zati on that negati vel y i mpact readabi lity and arti cul ation of mai n i deas Submi s s i on has criti cal errors
  • 10. rel ated to ci tati ons , grammar, s pel l i ng, s yntax, or organi zati on that prevent unders tandi ng of i deas 4 Earned Total 100% Week 4 Assignment Template Sustainable Living Guide Contributions, Part Four of Four: Sustaining our Atmosphere and Climate Instructions: Using the term that you have selected from the list provided in the classroom, please complete the following three- paragraph essay. Write a minimum of 5 to 7 well-crafted, original sentences per paragraph. In your response, you are expected to cite and reference, in APA format, at least two outside sources in addition to the class text. The sources must be credible (from experts in the field of study); at least one scholarly source (published in a peer-reviewed academic journal) is strongly encouraged. Delete all instructions before submitting your work to Waypoint. Your Term: [type your term here] [First Paragraph: Thoroughly define your term, using your own words to do so. In your definition, be sure explain why the term is important to know. Be as specific as possible and provide examples as necessary to support your ideas.]
  • 11. [Second Paragraph:Discuss how the term affects living beings (including humans) and/or the physical environment. Provide examples as needed.] [Third Paragraph: Suggest two clear, specific actions that you and the other students might take to promote environmental sustainability in relation to this term. Be creative and concrete with your suggestions. For example, you might recommend supporting a particular organization that is active in the field of your term. Explain exactly how those actions will aid in safeguarding our environment in relation to your chosen term.] References: Following your essay, list all references you cited, in APA format. After proofreading your assignment carefully, please submit your work to Waypoint for evaluation.