Questions Uploads

Information Security Planning

Question

Question:
CSIS 341
Information Security Planning
Mid-Term Research PaperWrite a 2 – 3 page paper

(not including the title and reference pages) which provides a comprehensive reflection of the learning objectives and concepts addressed in the course so far. The paper should address why the overall Information Security Planning objective is important and outline methodologies in which an information systems infrastructure can be appropriately secured while ensuring the confidentiality, integrity, and availability of the infrastructure. Your paper should reflect professional writing, current APA standards, and include at least 3 scholarly references (e.g., peer-reviewed journal articles).

 
Looking for a Similar Assignment? Order now and Get 10% Discount! Use Coupon Code "Newclient"

Responsibilities of a class

Question

Question

Responsibilities of a class include ‘knowing’ and ‘doing.’ Knowing and doing are 2 distinctly different

things. From scripture, choose a verse, parable, or passage where the ‘doing’ part either did or did not follow the ‘knowing’ part. Write about the passage and the results. 250 word requirement

Responsibilities of a class include ‘knowing’ and ‘doing.’ Knowing and doing are 2 distinctly different

things. From scripture, choose a verse, parable, or passage where the ‘doing’ part either did or did not follow the ‘knowing’ part. Write about the passage and the results. 250 word requirement

 
Looking for a Similar Assignment? Order now and Get 10% Discount! Use Coupon Code "Newclient"

Are the following allowable expenses (please list Yes or No clearly – such as, “Yes, this is allowable, because___)? Why or why not? a) An agency decides to award a vendor $1,000,000 to perform accounting services on a one-year appropriation.

Are the following allowable expenses (please list Yes or No clearly – such as, “Yes, this is allowable,

because___)? Why or why not? 

a)   An agency decides to award a vendor $1,000,000 to perform accounting services on a one-year appropriation. The appropriation is for Fiscal year 2014. The award is made on October 2, 2014. The appropriation allows using the funds for accounting services.

b)  For a no-year appropriation, could the agency start a new obligation starting on October 24, 2015? The obligation would be for goods/services that would be a use listed in the appropriation, and would be above the amount remaining on the appropriation.

c)  An agency has a multi-year appropriation, from Beg. Budget Fiscal Years 2012-Budget Year 2014. The agency awarded a vendor a contractor on October 1, 2013 for an item listed in the appropriation. The vendor identified an invoice for work performed in November 2013, and requested payment on January 5, 2015. Is the payment allowable?

 
Looking for a Similar Assignment? Order now and Get 10% Discount! Use Coupon Code "Newclient"

Application Activity 2

Question


Application Activity 2:For this assignment, you will assume that you are the network

administrator for a large medical record organization. The objective for this assignment is to draft a functional security plan to include an accurate risk assessment. This organization has requested that a security plan be designed in order to prevent attackers or other natural disasters from compromising the network. Before an effective security plan can be designed and established, there must first be an accurate assessment of the risk that is present. Risk assessments start by creating an inventory of all information items and information systems. Once this has been accomplished, identifying threats is the next step. There are a number of considerations that must be considered, such as the threat potential for a security violation, a threat assessment in which the types of threats are identified, a threat analysis which is a systematic rating of threats based upon the risk and probability, along with an assessment of the probability that threat will actually materialize.

The medical record organization consists of the following individuals: doctors, nurses, clerical personnel, and administrators. Each of these individuals will need different levels of access. In your security plan, be sure to include how the databases for the system will be used, how the domain will be configured, the operating system that the client’s computers will run on, the data transmission rates that are to be selected, the process for protecting confidential records along with the authentication process used to provide access, and the process decided for storing information on separate databases. Also, include visual aids of the network topology by using Microsoft Visio or a subsequent visual design tool.

In addition to the security plan provided to the organization, draft a risk assessment for the newly designed network. Your risk assessment should include the most likely forms of attacks/natural disasters that the network is likely to be subjected to. Based on these identified risks, also include measures and methods designed to respond to these risks and/or reduce the likelihood in their occurrence. Overall, your report should consist of a minimum of 8 pages excluding the title page, network diagrams, and references. There must be a minimum of 5 peer-reviewed sources included

 
Looking for a Similar Assignment? Order now and Get 10% Discount! Use Coupon Code "Newclient"