Creating Company E-mail/WIFI/Internet Use Policies

  

You have just been hired as the Security Manager of a medium-sized Financial Services company employing 250 people in New Hampshire, and have been asked to write two new security policies for this company. The first one is an e-mail policy for employees concentrating on personal use of company resources. The second policy is that of WIFI and Internet use within the company.

There are many resources available on the web so researching these topics and policies should be easy. The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company.

Project Plan

You are asked to create two separate policies on use of EMAIL and a WIFI/INTERNET USE within the company.

Be specific in your terms and conditions of use. Consider these items to be included in your policies (as applicable).

1. Overview 

2. Purpose 

3. Scope

4. Policy 

5. Policy Compliance

6. Related Standards, Policies and Processes

7. Definitions and Terms

200-250 words

 As you all read, according to Kirk (2016), most of your time will be spent working with your data.  The four following group actions were mentioned by Kirk (2016):

  • Data acquisition: Gathering the raw material
  • Data examination: Identifying physical properties and meaning
  • Data transformation: Enhancing your data through modification and consolidation
  • Data exploration: Using exploratory analysis and research techniques to learn

Select 1 data action and elaborate on the actions preformed in that action group.Please make sure you have an initial post (about 200 words) and a comment/post to one of your friends’ posts. 

Discussion question, 350 words and 2 references.

Describe an IT or similar business project you have done or are currently doing. In your discussion, provide information on the following:

1.  What is that project? Provide complete description. Consider using PPM.

2.  What was the scoop, deliverable, and results of the project?

3.  What constraints did you experience and how did you handle them?

4.  If you had to do the same project again, what changes will you recommend?

Digital Forensics-Need at least 5 pages excluding ref and title need APA format need plagiarism report + Minimum 10 slides excluding Title and ref and need really fancy PPT not just copy paste, need with videos links images and more colorful

Need a minimum 5 page paper + minimum 10 slides excluding title and reference, need really fancy ppt with video links, images and colorful ppt, on the computer forensics topic with example of how its used to investigate crime, and following attached abstract . No plagiarism need plagiarism report and paper + ppt in APA format

Cloud Computing

 

You are the CIO of ABC Corp a government contracting corporation that prioritizes security. You are tasked with moving the development team’s resources to the cloud. You need to provide a report to top leadership justifying the type of cloud solution that would be appropriate for this move. Provide the following in your report.

  1. Describe the MOST appropriate cloud service and research justification of its appropriateness.
  2. Select a Cloud Deployment model and research justification of its appropriateness.
  3. What are some of the pros and cons of both the cloud service and model you selected?

Paper should be in APA format, with at least two scholarly resources, and at least 1000 words.

Assignment #019

1. Describe the importance of databases and database management systems in managing organizational data and information
2. provide the types and some examples of database management systems
3. address the advantages and disadvantages of using a DBMS.

Paper work

 For the final project, you will be conducting a forensics investigation using one of the following items: 

 

  1. A smartphone
  2. A network (ideally, a wireless network)

 

You  may use either for your investigation. However, be aware of legal  issues surrounding your data gathering. If you are using any system you  do not personally control and have authority to investigate/discover,  please get written permission from the owner/operator of the system or  refrain from your forensics analysis of that systems and use a personal  system. For a network, you can use your own personal home network. For a  smartphone, consider using an image from the Internet or a personal  device. There could be issues related to using a live, active, personal  device (example: corruption of the device). If using a personal device,  consider using an old, outdated phone, if available.

 You  will review various forensics tools used with your selected system.  Select a tool and use that tool to gather forensics data for analysis.  You are simulating the process of gathering this data, so you do not  need to investigate a compromised device or system. The project  deliverables are as follows:

Week  3 – Prepare a two-page paper (double-spaced) that describes the device  or system you will investigate and the intended tool you plan to use to  conduct your forensics investigation. The interim paper should be in the  form of an Executive Summary. Be sure to provide references in APA  format.

Incident Detection 2.0

select an industry. You may use the same industry you used in earlier discussions, or you may select a new industry.

Please respond to the following in a post of 100 words:

  • Distinguish between incident detection precursors and incident detection indicators.
  • For your selected industry, describe the challenges associated with incident detection precursors and incident detection indicators.

Firewall technologies

Q.  Discuss the current methodologies used to secure wired or wireless networks via current Firewall technologies and the potential exposures that currently exist  

Need responses to posts that answered this question. APA style 150 words for each of the 4 responses.  Make sure there is no plagiarism