Answered You can hire a professional tutor to get the answer.

QUESTION

15 Pages (3pages-section)/ References Choose a topic that related to advances in information assurance security. High-level topics include (but are not limited to) the following:Information security

15 Pages (3pages-section)/ References 

Choose a topic that related to advances in information assurance security. High-level topics include (but are not limited to) the following:

  • Information security and risk      management
  • Access controls
  • Security architecture and design
  • Physical and environmental security
  • Telecommunications and network      security
  • Cryptography
  • Business continuity and disaster      recovery
  • Legal, regulations, compliance, and      investigations
  • Application security
  • Operations security

The topic of choice will be submitted to the instructor. This will include an annotated bibliography for review and approval. This should include at least 5 sources.

Your Advanced Research in IAS and Information Technology (IT) Management template document should be constructed in the following format:

  • Use Word
  • Title Page
    • Course number and name
    • Project name
    • Student name
    • Date
  • Table of Contents (TOC) 
    • Autogenerated TOC
    • Separate page
    • Maximum of three levels deep
    • Be sure to update the fields of the       TOC so it is up-to-date before submitting your project.
  • Abstract
  • Paper Topic Background
  • Section Headings (create each      heading on a new page with TBD as content, except for sections listed      under New Content below)
    • Section 1: Policies, Procedures,       Roles, and Responsibilities
    • Section 2: Data Governance
    • Section 3: Network Security
    • Section 4: Asset Security       Management
    • Section 5: Compliance with Security       Regulations
  • Conclusion
  • References

Each week, you will add to this document and submit it for grading.

Overview

Each section will contain the following:

  • Section 1: Policies, Procedures,      Roles, and Responsibilities
    • Choose a topic
    • List at least 5 references
  • Section 2: Data Governance
    • Submit an outline of the paper,       including the following information (in addition to the weekly topics):
      • Background and history on the        topic
      • Why the topic is applicable
      • Details about the topic
      • Solutions for how the topic can be        used
    • Description of any policies and       procedures and their applicability
    • Discuss the need for data       governance
  • Section 3: Network Security
    • Discussion of the implementation       any network security as appropriate to the topic
    • Discussion of the need for layered       security
  • Section 4: Asset Security Management
    • Risk assessment
      • Risk identification
      • Safeguard implementation
  • Section 5: Compliance with Security      Regulations
    • Detailed discussion about any laws       and regulations that apply to your topic

Add the outline to the Table of Contents of the paper, and be sure to include the Title Page, Table of Contents, and the section place holders for the following:

  • Abstract
  • Topic research
  • Weekly material and sections
  • Conclusion
  • References
Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question