Security Plan and Recommendations computer science assignment help

Get perfect grades by consistently using www.assignmentgeeks.org. Place your order and get a quality paper today. Take advantage of our current 20% discount by using the coupon code GET20


Order a Similar Paper Order a Different Paper

Case Study is attached. Please pick any 3 technologies (confirm with me if you’re unsure)

Project #4 Security Plan and Recommendation

Develop a Security Plan and Recommendation Memo to the CIO.  The Plan must communicate the security strategy and technologies (minimum of 3) you are recommending from P1/P2/P3.  Include a brief description of the technologies you are proposing with associated costs, expected return on investment (ROI), mitigation of risks, barriers to success. You must also include a detailed Network Diagram illustrating how this technology fits into the infrastructure.

Requirements:

The Recommendation Memo is a one page Executive Memo to the CIO summarizing and introducing the Plan. The recommendation memo will be on plain white background and carry the same formatting as a formal letter. You may use one of the MS Office or similar memo styles that meet this requirement. The Plan (your second deliverable for this assignment) will be a minimum 5 page, double-spaced paper using Times New Roman 12 font and APA style formatting for citations and references. It will also include a minimum of 5 references. The Title/Cover page, illustrations (tables/charts/graphs), network diagram, and references are not part of the page count but are required for the assignment. The grading rubric provides additional details as to what should be included in the paper. Your instructor may provide an APA style template to use for this paper.

Grading Rubric:

Introduce and Summarize Plan  10 points

Clearly introduces and summarizes the security plan.

Format, Grammar and Punctuation (Memo)  5 points

MS Word document using standard memo/letter formatting. No grammar, use of first/second person, spelling or punctuation errors.

Describes Strategy  13 points

Clearly describes the security strategy being proposed. Strategy covers the confidentiality, integrity and availability.

Link Solutions  13 points

Clearly describes the linkage between each technology and the strategy.

Network Diagram  13 points

Clear, detailed network diagram that describes how the technology fits within the infrastructure.

Describes Technologies13 points

Clearly describes the technologies being proposed.  Describe at least three (3) technologies.

Costs, ROI, Mitigation and Barriers  13 points

Clear and detailed description of the associated costs, expected return on investment, mitigation of risks, and barriers to success for each technology being proposed.

Use of Authoritative Sources  5 points

Used at least 5 authoritative or scholarly sources in paper. One must be NIST SP 800-53. No APA style errors in sources.

Citation of Sources  5 points

All sources cited. No errors in citing material in paper.

Formatting  5 points

Prepared MS Word document, used consistent formatting, section subheadings, submitted one file, used instructor provided template, correct coversheet and separate reference page and meets minimum page count.

Grammar and Punctuation  5 points

No grammar, use of first/second person, spelling or punctuation errors.

"Is this question part of your assignment? We can help"

ORDER NOW

Writerbay.net

Do you need help with this or a different assignment? We offer CONFIDENTIAL, ORIGINAL (Turnitin/LopesWrite/SafeAssign checks), and PRIVATE services using latest (within 5 years) peer-reviewed articles. Kindly click on ORDER NOW to receive an A++ paper from our masters- and PhD writers.

Get a 15% discount on your order using the following coupon code SAVE15


Order a Similar Paper Order a Different Paper