Warning: Trying to access array offset on value of type bool in /home/topgsnkq/timelyhomework.com/wp-content/themes/enfold/framework/php/function-set-avia-frontend.php on line 570

Security Basics

  • Assume your supervisor has just put you in charge of onboarding interns joining your information security team. While these interns all have some level of experience in IT security, you want to be sure everyone is starting off with a common set of understandings about basic security principles, practices, and processes. Therefore, your supervisor asks you to create a primer on key information security concepts for the interns to use as a reference as they move forward in their individual roles on your team.For this assessment, create a document addressing the following key security topics:
    • Describe the key elements of an information security program.
    • Describe the roles within an organization that contribute to the information security program.
    • Analyze the role of the information security manager in protecting information assets.
    • Explain how the concept of security layers contributes to an effective security management program
    • Explain how the OSI model and network protocols contribute to the overall security profile of a network, including all the following sub-topics, which must be covered in order to meet the requirements:
      • TCP/IP v4 and 6.
      • DNS.
      • HTTP.
      • SSL.
      • TLS.
      • SMTP.
      • UDP.
    • Explain how robust change management procedures contribute to the overall security profile of an organization
    • Analyze the workflow associated with information security incidents that may require involvement with local or federal regulators or law enforcement.

    Additional Requirements

    • Written communication: Written communication is free of errors that detract from the overall message.
    • APA formatting: Resources and citations are formatted according to APA (6th edition) style and formatting.
    • Page length: 8–10 double-spaced pages, not including the references page.
    • Font and font size: Times New Roman, 12 point.
    • Security Basics Scoring Guide Grading Rubric
      Criteria Non-performance Basic Proficient Distinguished
      Describe the key elements of an information security program.
      Does not describe the key elements of an information security program. Describes incompletely or inaccurately the key elements of an information security program. Describes the key elements of an information security program. Describes the key elements of an information security program and explains why those elements are key.
      Describe the roles within an organization that contribute to the information security program.
      Does not describe the roles within an organization that contribute to the information security program. Describes incompletely or inaccurately the roles within an organization that contribute to the information security program. Describes the roles within an organization that contribute to the information security program. Describes the roles within an organization that contribute to the information security program and explains why those roles were selected.
      Analyze the role of the information security manager in protecting information assets.
      Does not analyze the role of the information security manager in protecting information assets. Analyzes incompletely or inaccurately the role of the information security manager in protecting information assets. Analyzes the role of the information security manager in protecting information assets. Analyzes the role of the information security manager in protecting information assets and explains how this role fits with an overall enterprise-security management plan.
      Explain how the concept of security layers contributes to an effective security management program.
      Does not explain how the concept of security layers contributes to an effective security management program. Explains incompletely or inaccurately how the concept of security layers contributes to an effective security management program. Explains how the concept of security layers contributes to an effective security management program. Explains how the concept of security layers contributes to an effective security management program, including the use of supporting examples.
      Explain how the OSI model and network protocols contribute to the overall security profile of a network.
      Does not explain how the OSI model and network protocols contribute to the overall security profile of a network. Explains incompletely or inaccurately how the OSI model and network protocols contribute to the overall security profile of a network. Explains how the OSI model and network protocols contribute to the overall security profile of a network. Explains how the OSI model and network protocols contribute to the overall security profile of a network, including the use of supporting examples.
      Explain how robust change management procedures contribute to the overall security profile of an organization.
      Does not explain how robust change management procedures contribute to the overall security profile of an organization. Explains incompletely or inaccurately how robust change management procedures contribute to the overall security profile of an organization. Explains how robust change management procedures contribute to the overall security profile of an organization. Explains how robust change management procedures contribute to the overall security profile of an organization, including the use of supporting examples.
      Analyze the workflow associated with information security incidents that may require involvement with local or federal regulators or law enforcement.
      Does not analyze the workflow associated with information security incidents that may require involvement with local or federal regulators or law enforcement. Analyzes incompletely or inaccurately the workflow associated with information security incidents that may require involvement with local or federal regulators or law enforcement. Analyzes the workflow associated with information security incidents that may require involvement with local or federal regulators or law enforcement. Analyzes the workflow associated with information security incidents that may require involvement with local or federal regulators or law enforcement, including the use of supporting examples.
      Exhibit proficiency in writing and use of APA 6th edition.
      Does not exhibit proficiency in writing and use of APA 6th edition. Exhibits a low level of proficiency in writing and use of APA 6th edition. Exhibits proficiency in writing and use of APA 6th edition. Exhibits a high level of proficiency in writing and use of APA 6th edition.

 
"Looking for a Similar Assignment? Order now and Get 10% Discount! Use Code "GET10" in your order"

If this is not the paper you were searching for, you can order your 100% plagiarism free, professional written paper now!

Order Now Just Browsing

All of our assignments are originally produced, unique, and free of plagiarism.

Free Revisions Plagiarism Free 24x7 Support