Physical security

I don’t understand this Article Writing question and need help to study.

Company xxxxxx Department of Defense (DoD) Ready

Group Project #

Student’s Names

The University of Cumberlands

Abstract

An abstract is a single paragraph, without indentation, that summarizes the key points of the manuscript in 150 to 250 words.The purpose of the abstract is to provide the reader with a brief overview of the paper.This template is based on 6thed of the Publication manual of the American Psychological Association.

Note: an abstract is only required if the assignment calls for it.Consult with your instructor.

Phase 1 (10-12-2019)

Step 1: Select an organization.

The organization you select can be your employer, a fictitious organization, or a city government.

Step 2: Create an executive summary.

Provide background information (such as a business model, number of employees, or a determination of growth stage) and an overview of the current IT strategic planning process. Answer the following:

  • What are the objectives of the IT security policy?
  • How was the policy developed?
  • How long is the policy valid?

Step 3: Conduct a research of DoD-specific requirement for an Organization IT infrastructure and US compliance laws that may affect them

  • State the organizational mission and vision.
  • Identify the organizational IT Infrastructure
  • Identify specific DoD Requirement for the infrastructure (Detail research, Use APA citations)
  • Identify the US compliance laws that may affect the organization(Detail Research , Use APA citations and references)


Phase 2 (10-12-2019)

Step 4: Policies, Standards and Controls(Users, Workstation, LAN, LAN-to-WAN)

4.1.Users

4.1.0 Acceptable use policy (Introduction, Purpose, Scope, Policy)

4.1.1 Introduction

4.1.2 Purpose

4.1.2 Scope

4.1.3 Policies (Examples of policies to develop: General Use and ownership, Security and Proprietary Information, Unacceptable Use, System and Network Activities)

4.3.0 introduction

4.3.1 Purpose

4.3.2 scope

4.3.3 LAN Policy, Standard, Controls

4.4LAN-to-WAN Domains

Do same as above……….


Phase 3 (10-13-2019)

Step 6: Policies, Standards and Controls (WAN, Remote Access , System Application Domains )

4.4.1Introduction

4.4.2 Purpose ….

Step 7: Conclusion

  • Summarize the planning and execution process Develop a deployment plan for implementation of these polices, standards, and controls Include all applicable DoD frameworks

Reference

APA Reference

Minimum of 5 references

Submit a Comment