Develop a Computer/Internet Security Policy

 Research Paper: Develop a Computer/Internet Security Policy

You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas:

Computer and email acceptable use policy

Internet acceptable use policy

Password protection policy

Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. 

Your paper should meet the following requirements:

Be approximately four pages in length and four references.

Follow APA7 guidelines. Your paper should include an introduction, a body with fully developed content, and a conclusion.

Importance of Systems methodology

Pick an organization for which you are interviewing and describe it in your post. Which concepts would you choose and what would your descriptions look like?Why would you select these concepts?

1 page in APA 6th Format on Organ Leader & Decision Making

This discussion topic is to be reflective of the course material.  Therefore, use your own words to respond to the following questions:

  1. What other topics would you have liked to have covered in this course?
  2. What reading did you find most interesting and why?
  3. How has this course changed your perspective or outlook moving forward?
  4. Any other topic of interest that you would like to add.

Discussion Question

Take a position on the ethical concerns raised by employees who are upset about organizations monitoring their e-mail or Internet access for security purposes.

  • Assess whether you believe it is fair for an employee to undergo this type of surveillance.
  • Suggest an alternative approach for an organization to control security without monitoring employee actions.

project

  

Briefly respond to all the following questions. Make sure to explain and backup your responses with facts and examples. This assignment should be in APA format and have to include at least two references.

Your work over the next 8 weeks will lead-up to your ability to represent an enterprise security architecture solution as a diagram or diagrams with annotations. The project involves depicting a Security Architecture for one of the following businesses: 

· Financial (Bank, brokerage, Insurer, etc.) 

· Hospital/Medical Services 

· Pharmaceutical/Chemical 

· Social Media Company 

· Energy Company (Electrical Utility, Oil Company, Solar, Wind, etc.) 

· Manufacturer (Automobile, Computer, Consumer Electronics, etc.) 

Respond to the following:

· Identify the business type you have selected for your paper.

· Provide a brief overview of the business

· Provide the goals and approach to the project

· Architectural diagrams and annotations 

Submission

Compose your work in a .doc or .docx file type using a word processor (such as Microsoft Word, etc.) and save it frequently to your computer. 

Check your work and correct any spelling or grammatical errors. 

Include at least two APA most recent references.

Java assignment help

This assignment focuses on conjunctive normal form formulas (cnf-formula) and satisfiability.

In this assignment, you must create a Netbeans Java program that:

• prompts the user for the location of a file to load a cnf-formula (use JFileChooser)

• reads a cnf-formula from the file creating a CnfFormula object (see file-format below),

• prompt the user for a variable assignment (see AssignmentView below),

• verifies and displays whether the user’s assignment satisfies the cnf-formula,

• determines whether the cnf-formula is satisfiable and if so, output the assignment,

• as Java comments give the Big-O analysis of the verify and isSatisfiable methods,

• as a separate file, submit the cnf-formula file you “unit” tested on.

Job search 3.0

Research project manager’s positions and please post the following. Please do not copy and paste from web sites.

  1. Find three different job postings in the area you live in for a Project Manager. What are the items in the three job ads that are the same? Are there any major differences? Also, look up how much a project manager earns in your area. 
  2. In your opinion was any of the information that you uncovered in your search interesting or surprising?
  3. 1000 words

Refelction

Please write 300 words on interhship reflection. Etchical hacking and information assurance.