Best writers. Best papers. Let professionals take care of your academic papers

Order a similar paper and get 15% discount on your first order with us
Use the following coupon "FIRST15"
ORDER NOW

Security Basics

  • Assume your supervisor has just put you in charge of onboarding interns joining your information security team. While these interns all have some level of experience in IT security, you want to be sure everyone is starting off with a common set of understandings about basic security principles, practices, and processes. Therefore, your supervisor asks you to create a primer on key information security concepts for the interns to use as a reference as they move forward in their individual roles on your team.For this assessment, create a document addressing the following key security topics:
    • Describe the key elements of an information security program.
    • Describe the roles within an organization that contribute to the information security program.
    • Analyze the role of the information security manager in protecting information assets.
    • Explain how the concept of security layers contributes to an effective security management program
    • Explain how the OSI model and network protocols contribute to the overall security profile of a network, including all the following sub-topics, which must be covered in order to meet the requirements:
      • TCP/IP v4 and 6.
      • DNS.
      • HTTP.
      • SSL.
      • TLS.
      • SMTP.
      • UDP.
    • Explain how robust change management procedures contribute to the overall security profile of an organization
    • Analyze the workflow associated with information security incidents that may require involvement with local or federal regulators or law enforcement.

    Additional Requirements

    • Written communication: Written communication is free of errors that detract from the overall message.
    • APA formatting: Resources and citations are formatted according to APA (6th edition) style and formatting.
    • Page length: 8–10 double-spaced pages, not including the references page.
    • Font and font size: Times New Roman, 12 point.
    • Security Basics Scoring Guide Grading Rubric
      Criteria Non-performance Basic Proficient Distinguished
      Describe the key elements of an information security program.
      Does not describe the key elements of an information security program. Describes incompletely or inaccurately the key elements of an information security program. Describes the key elements of an information security program. Describes the key elements of an information security program and explains why those elements are key.
      Describe the roles within an organization that contribute to the information security program.
      Does not describe the roles within an organization that contribute to the information security program. Describes incompletely or inaccurately the roles within an organization that contribute to the information security program. Describes the roles within an organization that contribute to the information security program. Describes the roles within an organization that contribute to the information security program and explains why those roles were selected.
      Analyze the role of the information security manager in protecting information assets.
      Does not analyze the role of the information security manager in protecting information assets. Analyzes incompletely or inaccurately the role of the information security manager in protecting information assets. Analyzes the role of the information security manager in protecting information assets. Analyzes the role of the information security manager in protecting information assets and explains how this role fits with an overall enterprise-security management plan.
      Explain how the concept of security layers contributes to an effective security management program.
      Does not explain how the concept of security layers contributes to an effective security management program. Explains incompletely or inaccurately how the concept of security layers contributes to an effective security management program. Explains how the concept of security layers contributes to an effective security management program. Explains how the concept of security layers contributes to an effective security management program, including the use of supporting examples.
      Explain how the OSI model and network protocols contribute to the overall security profile of a network.
      Does not explain how the OSI model and network protocols contribute to the overall security profile of a network. Explains incompletely or inaccurately how the OSI model and network protocols contribute to the overall security profile of a network. Explains how the OSI model and network protocols contribute to the overall security profile of a network. Explains how the OSI model and network protocols contribute to the overall security profile of a network, including the use of supporting examples.
      Explain how robust change management procedures contribute to the overall security profile of an organization.
      Does not explain how robust change management procedures contribute to the overall security profile of an organization. Explains incompletely or inaccurately how robust change management procedures contribute to the overall security profile of an organization. Explains how robust change management procedures contribute to the overall security profile of an organization. Explains how robust change management procedures contribute to the overall security profile of an organization, including the use of supporting examples.
      Analyze the workflow associated with information security incidents that may require involvement with local or federal regulators or law enforcement.
      Does not analyze the workflow associated with information security incidents that may require involvement with local or federal regulators or law enforcement. Analyzes incompletely or inaccurately the workflow associated with information security incidents that may require involvement with local or federal regulators or law enforcement. Analyzes the workflow associated with information security incidents that may require involvement with local or federal regulators or law enforcement. Analyzes the workflow associated with information security incidents that may require involvement with local or federal regulators or law enforcement, including the use of supporting examples.
      Exhibit proficiency in writing and use of APA 6th edition.
      Does not exhibit proficiency in writing and use of APA 6th edition. Exhibits a low level of proficiency in writing and use of APA 6th edition. Exhibits proficiency in writing and use of APA 6th edition. Exhibits a high level of proficiency in writing and use of APA 6th edition.

0 replies

Leave a Reply

Want to join the discussion?
Feel free to contribute!

Leave a Reply

Your email address will not be published. Required fields are marked *