SU Network Architecture and Security Considerations Essay

One of the responsibilities of a Security Administrator is to create and document policies that protect the organization and guide users to making smart decisions. In this assignment you will build a handbook that can be used for such a purpose. The NIST’s Special Publications Website, a government operated Website, provides several documents for you to review in order to see examples that may be helpful to start this assignment (

Save Time On Research and Writing
Hire a Pro to Write You a 100% Plagiarism-Free Paper.
Get My Paper

http://csrc.nist.gov/publications/PubsSPs.html

).

Other helpful Websites for this assignment include:

  • DISA.mil (http://iase.disa.mil/)
  • TechRepublic (http://www.techrepublic.com/search?q=Security+Administrator+handbook&e=1)
  • ACM (http://www.acm.org/search?SearchableText=security+administration)
  • Publications from the Strayer Learning Resource Center are also available. Additional resources should be used when necessary. Write a twelve to eighteen (12-18) page Security Administrator’s handbook including policies tailored to your work environment or for a business environment with which you are familiar. You may select a fictitious name for your organization for the purpose of this paper. Do not duplicate your company’s existing handbook. Create your own unique work based on what you have learned in this course. There will be two (2) major sections of the handbook: Main Body and Policies.  Section 1: Main BodyIn four to six (4-6) pages total, develop the basic procedures and guidelines that the organization must address to properly secure its corporate network and information assets in the followings seven (7) items:

    Save Time On Research and Writing
    Hire a Pro to Write You a 100% Plagiarism-Free Paper.
    Get My Paper
  • Network Architecture and Security Considerations
  • Wireless Security
  • Remote Access Security
  • Laptop and Removable Media Security
  • Vulnerability and Penetration Testing
  • Physical Security
  • Guidelines for Reviewing and Changing Policies
  • Section 2: PoliciesDevelop the policies section of the handbook and include two to three (2-3) pages for each policy in which you define the policies used by the organization identifying the unique requirements of your industry. It must include, at a minimum, the following four (4) security policies:

  • Acceptable Use Policy
  • Password Policy
  • Incident Response Policy
  • User Awareness and Training Policy
  • To organize your policies and to give your policies structure, follow this sequential format:

  • Policy Statement
  • Purpose
  • Objectives
  • Standards
  • Procedures and Guidelines
  • Responsibilities
  • Review and Change Management
  • Use at least four (4) quality resources.
  • Still stressed from student homework?
    Get quality assistance from academic writers!

    Order your essay today and save 25% with the discount code LAVENDER