Infrastructure and Security computer science assignment help

Are you pressed for time and haven’t started working on your assignment yet? Would you like to buy an assignment? Use our custom writing services for better grades. Even if your deadline is approaching fast, our writers can handle your task right when you need it. Our writers will complete your order from scratch and make sure it’s completely unique.


Order a Similar Paper Order a Different Paper

This is a two-part deliverable using MS Word and MS Visio, or their open source equivalents. You are the Chief Security Officer (CSO) of a law office that occupies four (4) floors of a high-rise building in downtown Washington, D.C. There are approximately 50 PCs on the first floor, 150 PCs on the second floor, and 40 PCs on both the third and fourth floors. The servers for each department reside on their respective floors. The director of the accounting department has expressed concerns about the security of his files. For this assignment, you will explain the key functions of a cyber-security policy catalog. Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.

Submission Requirements

  • Document (MS Word)
  • Microsoft Visio Plan (MS Visio)

Section 1

Write a three to four (3-4) page deliverable in which you:

  1. Explain the major cyber governance issues in an organization and, because of those issues, examine how organizations develop communication protocols.
  2. Describe the security issues found on a network, and arrange them from highest to lowest, mapping out security loopholes to justify your answer.
  3. Differentiate between intellectual property theft and cyber espionage. Determine how you, as the CSO of an organization, would deal with both cases and what standard operating procedures you would follow.

Section 2

4. Using Microsoft Visio, or an open source alternative such as Dia, illustrate the flow of data for both input and output information in an infrastructure. The diagram must map any issues in terms of a cyber-infrastructure.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Discuss the threats of modern technology in the workplace.
  • Discuss how policies play an important role in techniques adopted for cybersecurity.
  • Discuss the various issues related to cyber governance, cyber users, cyber management, and cyber infrastructure.
  • Use technology and information resources to research issues in information assurance.
  • Write clearly and concisely about information assurance topics using proper writing mechanics and technical style conventions.

Writerbay.net

Do you need help with this or a different assignment? Even when your task is complicated and the deadline is in less than 2 days, you still have every chance to get a good grade for it. How? By completing the order form, you will get the finest custom-written assignment at an affordable price. We also deliver a number of services for free (e.g., revisions, editing, checking the text for authenticity). Use our paper writing service to receive effective help with your homework.


Order a Similar Paper Order a Different Paper