IT 3358: Information Security Concepts for the IT Professional All Assignments Tasks
IT 3358: Information Security Concepts for the IT Professional All Assignments Tasks
IT3358 Information
Security Concepts for the IT Professional
Unit 1 Assignment
Project Scope
For this assignment, you will develop an initial scope
document and proposal for deploying an Enterprise Security Infrastructure
Project. This is done by gathering facts about the selected organization and
identifying project needs.
First, select a global IT organization with which you are
currently affiliated, have worked for in the past, or one you would like to
learn more about. This organization should be relevant to your professional
goals and sufficient information about this organization should be available
through experience or research. You will use this same organization as a
foundation for all of your project assignments in this course.
Once you have selected your organization, you will evaluate
the existing security infrastructure and suggest improvements appropriate to
improving the cost and efficiency of managing the security. If assumptions need
to be made as part of your project, please list those assumptions so that your
instructor is aware.
For this assignment, use the suggested resources, the
Capella library, and the Internet to research the subject matter.
Instructions
Now that you have an understanding of the project and the
company’s needs, include the following in the initial scope document and
proposal:
Describe the scope of your project by providing an overview
to the selected organization: the reasons for your choice, its size, and the
location of the organization.
Describe the main business problems and goals as they relate
to information technology. Include information relative to organizational user,
organizational systems, and the security requirements.
Describe decision makers and stakeholders on whom you would rely
to develop a requirements analysis and traverse through the information
gathering phases of a security infrastructure deployment project.
Define a project timeline and outline that coincides with
the system and/or infrastructure component life cycle stages. Additionally,
identify the security components, requirements, and concerns that will need to
be addressed.
Explain the role of Availability, Confidentiality,
Authentication, and Integrity in identifying the project scope for the
organization.
Given the global nature of the organization, identify any
unique challenges that you anticipate facing from a regulatory, human
resources, and cultural standpoint.
You are encouraged to provide resources and citations. Any
references should be formatted according to APA (6th Edition) style and
formatting.
IT3358 Information
Security Concepts for the IT Professional
Unit 2 Assignment
AAA Framework and Cryptography Strategy
For this assignment, you will complete a data security
strategy. This is done by gathering facts about the selected organization and
identifying project needs. For this assignment, use the suggested resources,
the Capella library, and the Internet to research the subject matter.
Instructions
For this assignment, complete the following components for
your Perimeter Security Strategy:
Describe vulnerabilities and threats associated with data
being stored, in transit and in use.
Compare two cryptography tools and strategies for the
project that would be beneficial for protecting data being stored, in transit
and in use.
Describe at least three (3), non-cryptography strategies for
protecting stored data, data in transit and/or data in use for the company.
Describe strategies and identify at least two (2) tools for
supporting the AAA framework in your company’s security solution.
Determine how you would consider applying access control and
identify management to protect stored data, data in transit and/or data in use
in the company.
Define at least two (2) policies or guidelines that you
would include your organization’s data security manual. You are encouraged to
provide resources and citations. Any references should be formatted according
to APA (6th Edition) Style and Formatting.
Note: Make sure that you follow the scoring guide prior to
submitting. Submit your document to the assignment area once completed.
Resources
AAA Framework and Cryptography Strategy Scoring Guide.
IT3358 Information
Security Concepts for the IT Professional
Unit 3 Assignment
Physical Network Security Strategy
For this assignment, you will complete your Physical and
Network Security strategy. Each organization/company would need to show how
their data, assets, and networks are protected. In this assignment, you will
outline, address, and discuss your overall physical and network security
strategy where you plan, design, and implement your security strategy around
the organization’s global network infrastructure. For this assignment, use the
suggested resources, the Capella library, and the Internet to research the
subject matter.
Instructions
For this week, you are to complete the following components:
Describe at least three (3) threats and vulnerabilities
associated to physical security.
Define at least two (2) physical security strategies for
protecting each of the following categories in the company: (a) data, (b) human
resources and (c) hardware.
Describe strategies for protecting the company’s network
perimeter from external threats.
Describe strategies for protecting the company’s internal
and external network traffic and identify at least two (2) network security
tools you would consider utilizing.
Define at least two (2) policies or guidelines that you
would include in the organization’s physical security manual.
You are encouraged to provide resources and citations. Any
references should be formatted according to APA (6th Edition) style and formatting.
Ensure to follow the scoring guide prior to submitting and
submit your document to the assignment area.
IT3358 Information
Security Concepts for the IT Professional
Unit 4 Assignment
OS and Application Security Strategy
For this assignment, you will explain how to secure your
applications and operating systems through the use of various security tools.
For this assignment, use the suggested resources, the Capella library, and the
Internet to research the subject matter.
Instructions
For this assignment, complete the following components to
secure your applications and operating systems:
Describe threats and vulnerabilities associated with at
least two (2) operating systems.
Describe an anti-malware solution for the organization and
indicate on which operating systems it supports.
Select a suitable intrusion detection system (IDS) solution
for the organization and explain the reasoning for your suggestion.
Describe at least two (2) control strategies you would
consider implementing for securing the company’s web-based infrastructure.
Describe at least two (2) control strategies you would
consider implementing for securing the company’s database infrastructure.
Define two (2) items that you would include in the
organization’s operating system security hardening procedures.
You are encouraged to provide resources and citations. Any
references should be formatted according to APA (6th Edition) Style and
Formatting.
Follow the scoring guide and submit to the assignment
section once completed.
IT3358 Information
Security Concepts for the IT Professional
Unit 5 Assignment
Security Policy
As part of your course project, you are to develop, and
design your overall security policy strategy.
Instructions
Identify a complete list of security standards that must be
addressed in a comprehensive solution for the organization.
Discuss legal and regulatory issues that must be considered
in relation to the management of information assets.
Identify the steps that you took throughout the quarter to
ensure that your security solution will succeed internationally and describe
how you addressed globalization in your security design.
For your final submission, include all your previous work
for weeks 1–4 as part of this submission. Review the feedback that your
instructor provided throughout the quarter and use that to finalize the
security solution for your organization.
You are encouraged to provide resources and citations. Any
references should be formatted according to APA (6th Edition) style and
formatting.
Note: Make sure that your paper is professionally written
and free of errors, and that APA formatting is applied throughout. Once
complete, submit your document in the assignment area.
IT3358 Information
Security Concepts for the IT Professional
Unit 1 Assignment
Project Scope
For this assignment, you will develop an initial scope
document and proposal for deploying an Enterprise Security Infrastructure
Project. This is done by gathering facts about the selected organization and
identifying project needs.
First, select a global IT organization with which you are
currently affiliated, have worked for in the past, or one you would like to
learn more about. This organization should be relevant to your professional
goals and sufficient information about this organization should be available
through experience or research. You will use this same organization as a
foundation for all of your project assignments in this course.
Once you have selected your organization, you will evaluate
the existing security infrastructure and suggest improvements appropriate to
improving the cost and efficiency of managing the security. If assumptions need
to be made as part of your project, please list those assumptions so that your
instructor is aware.
For this assignment, use the suggested resources, the
Capella library, and the Internet to research the subject matter.
Instructions
Now that you have an understanding of the project and the
company’s needs, include the following in the initial scope document and
proposal:
Describe the scope of your project by providing an overview
to the selected organization: the reasons for your choice, its size, and the
location of the organization.
Describe the main business problems and goals as they relate
to information technology. Include information relative to organizational user,
organizational systems, and the security requirements.
Describe decision makers and stakeholders on whom you would rely
to develop a requirements analysis and traverse through the information
gathering phases of a security infrastructure deployment project.
Define a project timeline and outline that coincides with
the system and/or infrastructure component life cycle stages. Additionally,
identify the security components, requirements, and concerns that will need to
be addressed.
Explain the role of Availability, Confidentiality,
Authentication, and Integrity in identifying the project scope for the
organization.
Given the global nature of the organization, identify any
unique challenges that you anticipate facing from a regulatory, human
resources, and cultural standpoint.
You are encouraged to provide resources and citations. Any
references should be formatted according to APA (6th Edition) style and
formatting.
IT3358 Information
Security Concepts for the IT Professional
Unit 2 Assignment
AAA Framework and Cryptography Strategy
For this assignment, you will complete a data security
strategy. This is done by gathering facts about the selected organization and
identifying project needs. For this assignment, use the suggested resources,
the Capella library, and the Internet to research the subject matter.
Instructions
For this assignment, complete the following components for
your Perimeter Security Strategy:
Describe vulnerabilities and threats associated with data
being stored, in transit and in use.
Compare two cryptography tools and strategies for the
project that would be beneficial for protecting data being stored, in transit
and in use.
Describe at least three (3), non-cryptography strategies for
protecting stored data, data in transit and/or data in use for the company.
Describe strategies and identify at least two (2) tools for
supporting the AAA framework in your company’s security solution.
Determine how you would consider applying access control and
identify management to protect stored data, data in transit and/or data in use
in the company.
Define at least two (2) policies or guidelines that you
would include your organization’s data security manual. You are encouraged to
provide resources and citations. Any references should be formatted according
to APA (6th Edition) Style and Formatting.
Note: Make sure that you follow the scoring guide prior to
submitting. Submit your document to the assignment area once completed.
Resources
AAA Framework and Cryptography Strategy Scoring Guide.
IT3358 Information
Security Concepts for the IT Professional
Unit 3 Assignment
Physical Network Security Strategy
For this assignment, you will complete your Physical and
Network Security strategy. Each organization/company would need to show how
their data, assets, and networks are protected. In this assignment, you will
outline, address, and discuss your overall physical and network security
strategy where you plan, design, and implement your security strategy around
the organization’s global network infrastructure. For this assignment, use the
suggested resources, the Capella library, and the Internet to research the
subject matter.
Instructions
For this week, you are to complete the following components:
Describe at least three (3) threats and vulnerabilities
associated to physical security.
Define at least two (2) physical security strategies for
protecting each of the following categories in the company: (a) data, (b) human
resources and (c) hardware.
Describe strategies for protecting the company’s network
perimeter from external threats.
Describe strategies for protecting the company’s internal
and external network traffic and identify at least two (2) network security
tools you would consider utilizing.
Define at least two (2) policies or guidelines that you
would include in the organization’s physical security manual.
You are encouraged to provide resources and citations. Any
references should be formatted according to APA (6th Edition) style and formatting.
Ensure to follow the scoring guide prior to submitting and
submit your document to the assignment area.
IT3358 Information
Security Concepts for the IT Professional
Unit 4 Assignment
OS and Application Security Strategy
For this assignment, you will explain how to secure your
applications and operating systems through the use of various security tools.
For this assignment, use the suggested resources, the Capella library, and the
Internet to research the subject matter.
Instructions
For this assignment, complete the following components to
secure your applications and operating systems:
Describe threats and vulnerabilities associated with at
least two (2) operating systems.
Describe an anti-malware solution for the organization and
indicate on which operating systems it supports.
Select a suitable intrusion detection system (IDS) solution
for the organization and explain the reasoning for your suggestion.
Describe at least two (2) control strategies you would
consider implementing for securing the company’s web-based infrastructure.
Describe at least two (2) control strategies you would
consider implementing for securing the company’s database infrastructure.
Define two (2) items that you would include in the
organization’s operating system security hardening procedures.
You are encouraged to provide resources and citations. Any
references should be formatted according to APA (6th Edition) Style and
Formatting.
Follow the scoring guide and submit to the assignment
section once completed.
IT3358 Information
Security Concepts for the IT Professional
Unit 5 Assignment
Security Policy
As part of your course project, you are to develop, and
design your overall security policy strategy.
Instructions
Identify a complete list of security standards that must be
addressed in a comprehensive solution for the organization.
Discuss legal and regulatory issues that must be considered
in relation to the management of information assets.
Identify the steps that you took throughout the quarter to
ensure that your security solution will succeed internationally and describe
how you addressed globalization in your security design.
For your final submission, include all your previous work
for weeks 1–4 as part of this submission. Review the feedback that your
instructor provided throughout the quarter and use that to finalize the
security solution for your organization.
You are encouraged to provide resources and citations. Any
references should be formatted according to APA (6th Edition) style and
formatting.
Note: Make sure that your paper is professionally written
and free of errors, and that APA formatting is applied throughout. Once
complete, submit your document in the assignment area.
APA Writing Checklist
Use this document as a checklist for each paper you will write throughout your GCU graduate program. Follow specific instructions indicated in the assignment and use this checklist to help ensure correct grammar and APA formatting. Refer to the APA resources available in the GCU Library and Student Success Center.
Also Read : IT 3215 Unit 05 Assignment Query, Strings and Storing Persistent Information
☐ APA paper template (located in the Student Success Center/Writing Center) is utilized for the correct format of the paper. APA style is applied, and format is correct throughout.
☐ The title page is present. APA format is applied correctly. There are no errors.
☐ The introduction is present. APA format is applied correctly. There are no errors.
☐ Topic is well defined.
☐ Strong thesis statement is included in the introduction of the paper.
☐ The thesis statement is consistently threaded throughout the paper and included in the conclusion.
☐ Paragraph development: Each paragraph has an introductory statement, two or three sentences as the body of the paragraph, and a transition sentence to facilitate the flow of information. The sections of the main body are organized to reflect the main points of the author. APA format is applied correctly. There are no errors.
☐ All sources are cited. APA style and format are correctly applied and are free from error.
☐ Sources are completely and correctly documented on a References page, as appropriate to assignment and APA style, and format is free of error.
Scholarly Resources: Scholarly resources are written with a focus on a specific subject discipline and usually written by an expert in the same subject field. Scholarly resources are written for an academic audience.
Examples of Scholarly Resources include: Academic journals, books written by experts in a field, and formally published encyclopedias and dictionaries.
Peer-Reviewed Journals: Peer-reviewed journals are evaluated prior to publication by experts in the journal’s subject discipline. This process ensures that the articles published within the journal are academically rigorous and meet the required expectations of an article in that subject discipline.
Empirical Journal Article: This type of scholarly resource is a subset of scholarly articles that reports the original finding of an observational or experimental research study. Common aspects found within an empirical article include: literature review, methodology, results, and discussion.
Adapted from “Evaluating Resources: Defining Scholarly Resources,” located in Research Guides in the GCU Library.
☐ The writer is clearly in command of standard, written, academic English. Utilize writing resources such as Grammarly, LopesWrite report, and ThinkingStorm to check your writing.