Answered You can hire a professional tutor to get the answer.
Assignment 1: Using Security Policies and Controls to Overcome Business Challenges Learning Objectives and OutcomesUnderstand the importance of information security policies and the role they play in
Assignment 1: Using Security Policies and Controls to Overcome Business Challenges
- Learning Objectives and Outcomes
- Understand the importance of information security policies and the role they play in business activities to ensure sound, secure information.
- Identify four IT security controls for a given scenario.
- Scenario
- The organization is a regional XYZ Credit Union/Bank that has multiple branches and locations throughout the region.
- Online banking and use of the Internet are the bank’s strengths, given limited its human resources.
- The customer service department is the organization’s most critical business function.
- The organization wants to be in compliance with Gramm-Leach-Bliley Act (GLBA) and IT security best practices regarding its employees.
- The organization wants to monitor and control use of the Internet by implementing content filtering.
- The organization wants to eliminate personal use of organization-owned IT assets and systems.
- The organization wants to monitor and control use of the e-mail system by implementing e-mail security controls.
- The organization wants to implement this policy for all the IT assets it owns and to incorporate this policy review into an annual security awareness training program.
- Assignment RequirementsUsing the scenario, identify four possible information technology (IT) security controls for the bank and provide rationale for your choices.Required Resources
- Course textbook
- Internet
- Submission Requirements
- Format: Microsoft Word
- Citation Style: Your school’s preferred style guide
- Length: 1–2 pages
- Self-Assessment Checklist
- I listed four IT controls based on the scenario.
- I provided rationale for my selection of IT security controls.
- By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with theBlackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution's policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.
Assignment 2:
Use the library and other Internet resources to research for answers for the following questions. Write a 2–3 pages research paper answering these questions.
- Describe the complex email system as shown within the image "Example of a Complex Hybrid System." below
- Describe in detail with examples the benefits of this type of systems in real life.
- Provide at least two references to support your initial post.
Please note:
- Apply APA format on your academic writings.
- provide 2-3 pages long (not including title and references) as a word document.
- Include title page, table of content page.
- Use time new roman or Arial as font type.
- Use 12 a font size.
- Use double spaces.
- Add running head to the upper left corner of your document.
- Add page numbers to the upper right corner of your document.
- Add a references page to the end of your document.