ISOL631 Cumberlands Week 6 Information Technology Questions

+44 222 444 1122

Give us a call

11 Vancouver St, London

Get direction

ISOL631 Cumberlands Week 6 Information Technology Questions

Task 1


  1. The instructions for this project were introduced in Week 6. Attached is a copy of the Week 6 Course Project Instructions.Course Project Instructions
  2. By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

Please refer and follow the below attached course project instructions document:

Note: Your answer should be 1600 words

Task 2


Executive Program Practical Connection Assignment

At UC, it is a priority that students are provided with strong educational programs and courses that allow them to be servant-leaders in their disciplines and communities, linking research with practice and knowledge with ethical decision-making. This assignment is a written assignment where students will demonstrate how this course research has connected and put into practice within their own career.

Provide a reflection of at least 1000 words (or 2 pages double spaced) of how the knowledge, skills, or theories of this course have been applied, or could be applied, in a practical manner to your current work environment. If you are not currently working, share times when you have or could observe these theories and knowledge could be applied to an employment opportunity in your field of study.


Provide a 1000 word (or 2 pages double spaced) minimum reflection.

Use of proper APA formatting and citations. If supporting evidence from outside resources is used those must be properly cited.

Share a personal connection that identifies specific knowledge and theories from this course.

Demonstrate a connection to your current work environment. If you are not employed, demonstrate a connection to your desired work environment.

You should NOT, provide an overview of the assignments assigned in the course. The assignment asks that you reflect how the knowledge and skills obtained through meeting course objectives were applied or could be applied in the workplace.

Note: Please find below attached reference document:

Task 3


The Week 7 assignment asks you to write about how you will apply the course concepts to your career or future career. For this last discussion, describe what you may have learned that will most help you in your career. You could also share what you want to learn more about.

10911.201930: Summer 2019 – Operations Security (ISOL-631-10) – Second Bi-Term

please write at least two pages of content about above subject:

Note: Your answer should be 750 words

1 attachments

Slide 1 of 1

  • Description:





Course Project ISOL 631, Summer 2019 Dr. James C. Hyatt For this project, explain how to apply the information technology security policies to a large organization, based on that organization’s type. There are three types basic types of organizations: ▪ ▪ ▪ Government Facility Hospital/Large Clinic Business Choose an organization type and consider that the basis of your scenario. Imagine you are creating information technology security policies in this scenario. You will create a short paper describing the relevant needs and issues, the recommended structure, and how security policies should be implemented. See the outline below for specific content requirements. There is a word limit—1000-1500 words is the target. It will be difficult to fully address each topic in the outline in a short way, but keeping writing concise and organized is an important workforce skill. To keep within the target word-count range, limit yourself to 100-150 words per section of the outline. An exception is outline #6, which would require 300 or more words. Outline of Paper, with Specific Content Requirements: 1. Identify the relevant business drivers for your chosen scenario. A business driver is something that affects whether an organization can be successful. The textbook lists things like cost and customer satisfaction. Consider especially business drivers relevant to IT security, like mitigating risk exposure, mitigating liability of the organization, etc. 2. For each of the laws in chapter 3, first identify whether the law must be applied to your scenario, and second why or why not this law is relevant. Consider especially industrial standards, like PCI DSS, No. 16 (SSAE16), and ITIL. 3. Discuss the Seven Domains of IT Responsibility and their application. Identify which domains are MOST applicable and explain why. If that domain is not very applicable, explain why not. 4. Identify what policy implementation issues may affect your scenario, such as motivation, leadership, values, whether the organization is likely hierarchical or flat, etc. 5. Every business is a little different, so for this item on the outline, review chapter 6 and select which framework aspects you would focus on for that scenario’s security policy. Identify and justify based on the scenario the appropriate type of IT security policy frameworks that should be implemented. Also include information assurance considerations—confidentiality, integrity, and availability. 6. Identify how to design, organize, implement, and maintain appropriate IT security policies. Since there are so many policies possible, choose just 4-5 policies to focus on for this section. Also include how you would organize the document of policies. For reference, see pages 182-190 for guidelines of what would be included in a policy and how it would be organized. Do not write the polices themselves—you do not have detailed information about the scenario to enable you to do that. Just briefly explain the process. Possible policies: a. Acceptable Use g. Mandated Security Awareness Training b. Access Control h. Production Data Backup c. Asset Protection/Management i. Remote Access d. Continuity & Disaster Recovery j. Vulnerability Management & e. Data Classification Standard & Vulnerability Window Encryption k. Threat Assessment & Management f. Internet Ingress/Egress Traffic l. WAN Service Availability 7. Identify the IT security policy framework approach you would use and why. Also include the User domain policy you would use and the most appropriate IT infrastructure security policy. 8. For a Risk Management policy and Incident Response Team (IRT) policies, identify the type of policy you would select for each and justify why. 9. Discuss the appropriate method to implement and maintain the IT security policy framework, including compliance technologies needed. There are usually multiple ways apply the course content to your scenario. You will be graded on how well you explain and justify your choices based on the needs of your scenario.
Purchase answer to see full attachment

Tags: information technology APA IT information systems business drivers



With over 10 years in the online academic market, we have accumulated thousands of previously completed questions and answers across the globe. You can gain access to them for a very small fee.

Want to complete your own work?