Answered You can hire a professional tutor to get the answer.

QUESTION

Assignment 1: Using Security Policies and Controls to Overcome Business Challenges Learning Objectives and OutcomesUnderstand the importance of information security policies and the role they play in

Assignment 1: Using Security Policies and Controls to Overcome Business Challenges

  1. Learning Objectives and Outcomes
    • Understand the importance of information security policies and the role they play in business activities to ensure sound, secure information.
    • Identify four IT security controls for a given scenario.
    • Scenario
    • The organization is a regional XYZ Credit Union/Bank that has multiple branches and locations throughout the region.
    • Online banking and use of the Internet are the bank’s strengths, given limited its human resources.
    • The customer service department is the organization’s most critical business function.
    • The organization wants to be in compliance with Gramm-Leach-Bliley Act (GLBA) and IT security best practices regarding its employees.
    • The organization wants to monitor and control use of the Internet by implementing content filtering.
    • The organization wants to eliminate personal use of organization-owned IT assets and systems.
    • The organization wants to monitor and control use of the e-mail system by implementing e-mail security controls.
    • The organization wants to implement this policy for all the IT assets it owns and to incorporate this policy review into an annual security awareness training program.
    • Assignment RequirementsUsing the scenario, identify four possible information technology (IT) security controls for the bank and provide rationale for your choices.Required Resources
    • Course textbook
    • Internet
    • Submission Requirements
    • Format: Microsoft Word
    • Citation Style: Your school’s preferred style guide
    • Length: 1–2 pages
    • Self-Assessment Checklist
    • I listed four IT controls based on the scenario.
    • I provided rationale for my selection of IT security controls.
  2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with theBlackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution's policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

Assignment 2:

Use the library and other Internet resources to research for answers for the following questions. Write a 2–3 pages research paper answering these questions.

  • Describe the complex email system as shown within the image "Example of a Complex Hybrid System." below
  • Describe in detail with examples the benefits of this type of systems in real life.
  • Provide at least two references to support your initial post.

Please note:

  • Apply APA format on your academic writings.
  • provide 2-3 pages long (not including title and references) as a word document.
  • Include title page, table of content page.
  • Use time new roman or Arial as font type.
  • Use 12 a font size.
  • Use double spaces.
  • Add running head to the upper left corner of your document.
  • Add page numbers to the upper right corner of your document.
  • Add a references page to the end of your document.
Show more
LEARN MORE EFFECTIVELY AND GET BETTER GRADES!
Ask a Question