subject
Computers and Technology, 17.06.2020 22:57 jeanieb

You work for a high-tech company with approximately 400 employees. Your firm recently won a large Department of Defense (DoD) contract, which will add 30% to the revenue of your organization. It is a high-priority, high-visibility project. You will be allowed to make your own budget, project timeline, and tollgate decisions. This course project will require you to develop the proper DoD security policies required to meet DoD standards for delivery of technology services to the U. S. Air Force Cyber Security Center (AFCSC), a DoD agency. To do this, you must develop DoD-approved policies and standards for your IT infrastructure (see the "Tasks" section below). The policies you create must pass DoD-based requirements. Currently, your organization does not have any DoD contracts and thus has no DoDcompliant security policies or controls in place. Your firm's computing environment includes the following: 12 servers running Microsoft Server 2008 R2, providing the following: Active Directory (AD) Domain Name System (DNS) Dynamic Host Configuration Protocol (DHCP) Enterprise Resource Planning (ERP) application (Oracle) A Research and Development (R&D) Engineering network segment for testing, separatefrom the production environment Microsoft Exchange Server for e-mail Symantec e-mail filter Websense for Internet use Two Linux servers running Apache Server to host your Web site 390 PCs/laptops running Microsoft Windows 7, Microsoft Office 2007, Microsoft Visio, MicrosoftProject, and Adobe ReaderTasksYou should: Create policies that are DoD compliant for the organization’s IT infrastructure. Develop a list of compliance laws required for DoD contracts. List controls placed on domains in the IT infrastructure. List required standards for all devices, categorized by IT domain. Develop a deployment plan for implementation of these polices, standards, and controls. List all applicable DoD frameworks in the final delivery document. Write a professional report that includes all of the above content-related items. This project is due at the end of Week 7.Submission Requirements:1. A Word Document 9 to 12 pages (font size - Times New Roman 12)2. Single spaced with one-inch margins all around, all figures and diagrams must be labelled3. All citations and the reference list in the paper should be formatted in accordance with APA 6th edition(or later) guidelines4. References are NOT included in the page count. Self-Assessment ChecklistI have developed a list of compliance laws required for DoD contracts. I have listed controls placed on domains in the IT infrastructure. I have listed required standards for all devices, categorized by IT domain. I have developed DoD policies and standards for our organization’s IT infrastructure. I have developed a deployment plan for implementation of these polices, standards, and controls. I have listed all applicable DoD frameworks in the final report. I have found additional references/resources than those provided

ansver
Answers: 1

Another question on Computers and Technology

question
Computers and Technology, 21.06.2019 21:20
Write a select statement that returns product name, customer first name, customer last name, channel description, and amount sold for all the sales. make sure to returns sales even if there is no information on the customer, product, or channe
Answers: 2
question
Computers and Technology, 22.06.2019 08:00
What best describes a career pathway in a lodging career? a worker starts out as an amusement attendant, then becomes a recreation worker, and then becomes a gaming worker within five years. a worker starts out as a bell hop, then becomes a night clerk, and then becomes a hotel manager within five years. a worker starting out as a tour guide, then becomes a travel clerk, and then becomes a travel agent within five years. a worker starts out as a server, then becomes a food preparer, and then becomes a head chef within five years.
Answers: 1
question
Computers and Technology, 23.06.2019 15:00
1. which of the following statements are true about routers and routing on the internet. choose two answers. a. protocols ensure that a single path between two computers is established before sending packets over it. b. routers are hierarchical and the "root" router is responsible for communicating to sub-routers the best paths for them to route internet traffic. c. a packet traveling between two computers on the internet may be rerouted many times along the way or even lost or "dropped". d. routers act independently and route packets as they see fit.
Answers: 2
question
Computers and Technology, 23.06.2019 20:30
If an appliance consumes 500 w of power and is left on for 5 hours, how much energy is used over this time period? a. 2.5 kwh b. 25 kwh c. 250 kwh d. 2500 kwh
Answers: 1
You know the right answer?
You work for a high-tech company with approximately 400 employees. Your firm recently won a large De...
Questions
question
Mathematics, 02.12.2020 19:00
question
Mathematics, 02.12.2020 19:00
question
Mathematics, 02.12.2020 19:00
Questions on the website: 13722361