Description

Answer the question reviewing the draft version document – (ProjectCheckpoint2.docx) for the continuation to finish the work.

Purpose

This course project is intended to assess your ability to identify, design, and organize information technology (IT) security policies.

Learning Objectives and Outcomes

You will be able to develop draft IT security policies for an organization and apply learning constructs from the course.

Task –

Q1) Submit a draft of DoD-compliant policies, standards, and controls that affect the User, Workstation, LAN, and LAN-to-WAN Domains.

Requirements

1. APA Format 7th edition

2. Page length – 6pages

You should consider the following laws in your report

  • Department of Defense Instruction (DoDI) issues plans and implementations of policies that allocates relations required to contribute security situational awareness as identified by the DoD policies and agreements.
  • undefined

  • National Institute of Standards and Technology (NIST) is a known cybersecurity framework used to provide guidance on what processes and controls should be implemented. These standards are in place to protect services and consumers of information systems.
  • undefined

  • North American Electric Reliability Corporation (NERC) has cyber security standards focused on ensuring the reliability of the Bulk Electric System (BES).
  • undefined

  • Federal Information Processing Standards (FIPS) Publications are guidelines exercised by all agencies to classify, manage, operate, and control security requirements of all information and information systems collected or maintained to for or by the federal government.
  • undefined

  • International Standards Organization (ISO) a certified security standard for the creation and maintenance of assets and requirements to ensure the Confidentiality, Integrity, and Availability (CIA) of all Information Technology (IT) and Information Systems (IS).