Your Perfect Assignment is Just a Click Away
We Write Custom Academic Papers

100% Original, Plagiarism Free, Customized to your instructions!

glass
pen
clip
papers
heaphones

Your group is working for a global organization that handles highly classified intellectual property.

Your group is working for a global organization that handles highly classified intellectual property.

Your group is working for a global organization that handles highly classified intellectual property. Your team has been tasked with developing a series of important network security policies that will provide direction and guidance to the organization on important information security issues.

Each group member will choose an element(s) of the policy to research and design. The group will collaborate on what the overall design and outline should look like and include components from end-user behavior, a training plan, file and folder access, social engineering safeguards, bring-your-own-device policies, use of external drives on company assets, security hardware, penetration testing, and affiliation of the information security department with law enforcement agencies. Students may either interview someone in the local FBI field office or research the FBI and DHS Web sites related to information-sharing programs that the government offers; this could be advantageous to the organization’s information security program.

  • Assign group members to the sections below, research the various components, and create an appropriate policy.
  • The final deliverable should be organized in this format.
    • Cover page with the group name, date, a listing of all group members, and sections of the Policy they contributed. (If no contribution is received, please list their name and “no contribution.”
    • Section 1: End-user behavior -Acceptable Use Policy
    • Section 2: A training plan,- Policy on employee security training
    • Section 3: File and folder access -Policy on how access and authorization controls
    • Section 4: Social engineering safeguards, Policy on technical controls, and end-user training to prevent multiple forms of social engineering to include phishing, spearfishing, whaling-based email attacks, phone call attacks, physical security attacks, and USB devices left in the parking lot attacks.
    • Section 5: Bring-your-own-device policies,
    • Section 6: Use of external drives on company assets,
    • Section 7: Security hardware, penetration testing, Define your Policy for what security hardware will be purchased, how it will be configured, and how often penetration test and vulnerability assessments will be completed
    • Section 8: Affiliation of the information security department with law enforcement agencies. This Policy will explain the importance of working with federal law enforcement authorities in information sharing and incident response of breaches.
    • References: Citations for all your work in APA version 7 format

Special note: Your team’s network security policy should look exactly like this and be organized in this manner. Please do not add or remove sections. Please do not submit policy sections individually, as they must all be included within the single group policy.

We offer the best custom essay writing services at an affordable rate. We have done this assignment before, we can also do it for you.

Order Solution Now

Our Service Charter

1. Professional & Expert Writers: Essay Pillars only hires the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed of papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Essay Pillars are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Essay Pillars is known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit in all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Essay Pillars, we have put in place a team of experts who answer to all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.