Submit A Bulleted List Of DoD-Compliant Policies, Standards, And Controls That Affect The WAN, Remote Access, And System/Application Domains.”

Project: Department of Defense (DoD) Ready

Submit A Bulleted List Of DoD-Compliant Policies, Standards, And Controls That Affect The WAN, Remote Access, And System/Application Domains.”

Purpose

This course project is intended to assess your ability to identify, design, and organize information technology (IT) security policies.

Learning Objectives and Outcomes

You will be able to develop draft IT security policies for an organization and apply learning constructs from the course.

Required Source Information and Tools

Web References: Links to Web references in this document and related materials are subject to change without prior notice. These links were last verified on June 16, 2014.

 

The following tools and resources will be needed to complete this project:

Course textbook

Internet access

DoD instructions or directives http://www.dtic.mil/whs/directives/

Risk Management Framework (RF) for Department of Defense Information Technology (IT) http://www.dtic.mil/whs/directives/corres/pdf/851001_2014.pdf and http://www.rmf.org/images/stories/rmf_documents/850001_2014.pdf

Department of Defense Information Security Program http://www.fas.org/irp/doddir/dod/5200-1r/

Department of Defense Internet Services and Internet-Based Capabilities http://www.dtic.mil/whs/directives/corres/pdf/855001p.pdf

Department of Defense Proposes New Information Security Requirements for Contractors: http://www.hldataprotection.com/2010/03/articles/cybersecurity-data-breaches/department-of-defense-proposes-new-information-security-requirements-for-contractors/

School/public library (optional)

Deliverables

Project Checkpoints

The course project has a checkpoint strategy. Checkpoint deliverables allow you to receive valuable feedback on your interim work. In this project, you have several ungraded checkpoint deliverables. (See the course Syllabus for the schedule.)

You may discuss project questions with the instructor, and you should receive feedback from the instructor on previously submitted work. Checkpoint deliverables ensure refinement of the final deliverables, if incorporated effectively. The final deliverable for this project is a professional report.

 

Checkpoint Expected Deliverables
Week 6 Submit a bulleted list of DoD-compliant policies, standards, and controls that affect the WAN, Remote Access, and System/Application Domains.”

 

 

Scenario

You work for a high-tech company with approximately 390 employees. Your firm recently won a large DoD contract, which will add 30% to the revenue of your organization. It is a high-priority, high-visibility project. You will be allowed to make your own budget, project timeline, and tollgate decisions.

This course project will require you to form a team of 2 to 3 coworkers (fellow students) and develop the proper DoD security policies required to meet DoD standards for delivery of technology services to the U.S. Air Force Cyber Security Center (AFCSC), a DoD agency. To do this, you must develop DoD-approved policies and standards for your IT infrastructure (see the “Tasks” section below). The policies you create must pass DoD-based requirements. Currently, your organization does not have any DoD contracts and thus has no DoD-compliant security policies or controls in place.

 

Your firm’s computing environment includes the following:

12 servers running Microsoft Server 2012 R2, providing the following:

Active Directory (AD)

Domain Name System (DNS)

Dynamic Host Configuration Protocol (DHCP)

Enterprise Resource Planning (ERP) application (Oracle)

A Research and Development (R&D) Engineering network segment for testing, separate from the production environment

Microsoft Exchange Server for e-mail

Symantec e-mail filter

Websense for Internet use

Two Linux servers running Apache Server to host your Web site

390 PCs/laptops running Microsoft Windows 7 or Windows 8, Microsoft Office 2013, Microsoft Visio, Microsoft Project, and Adobe Reader

Tasks

You should:

Create policies that are DoD compliant for the organization’s IT infrastructure.

Develop a list of compliance laws required for DoD contracts.

List controls placed on domains in the IT infrastructure.

List required standards for all devices, categorized by IT domain.

Develop a deployment plan for implementation of these polices, standards, and controls.

List all applicable DoD frameworks in the final delivery document.

Write a professional report that includes all of the above content-related items.

Submission Requirements

· Format: Microsoft Word

· Font: Arial, Size 12, Double-Space

· Citation Style: Your school’s preferred style guide

· Length: 2–4 pages

Self-Assessment Checklist

I developed a list of compliance laws required for DoD contracts.

I listed controls placed on domains in the IT infrastructure.

I listed required standards for all devices, categorized by IT domain.

I developed DoD policies and standards for our organization’s IT infrastructure. I developed a deployment plan for implementation of these polices, standards, and controls.

I listed all applicable DoD frameworks in the final report.

I involved myself in each of the lessons and asked my instructor questions.

I found additional references/resources than those provided.

I created an academic paper describing the policies, standards, and controls that would make our organization DoD compliant.

I submitted my work per the deliverable timeline to the instructor for monitoring and comment.

 

© 2015 by Jones & Bartlett Learning, LLC, an Ascend Learning Company. All rights reserved.

www.jblearning.com Page 2

Order a Unique Copy of this Paper

Essay Creek is an academic writing service provided to you by, a London-based company.

  • Experience
    Helping students successfully for 11 years.
  • Confidentiality & Security
    Be sure your information will be kept confidential due to our secure service.
  • Quality & Reliability
    8.5 out of 10 average quality score according to our customers' feedback. 97.45% of orders delivered on time.
  • Versatility
    478 active writers in 68 disciplines.
  • 100% money back guarantee
    You can always request a refund if you are not satisfied with the result.

Read more about us

Our team of writers is comprised of people with necessary academic writing skills and experience in various fields of study.

  • Skilled writers only
    We carefully choose writers to employ, paying attention to their skills and abilities.
  • Competence
    Your order will be assigned to a competent writer who specializes in your field of study.
  • In-depth knowledge
    Our writers know both peculiarities of academic writing and paper formatting rules.
  • Motivation
    We keep updated on results our writers show, motivating them to constantly improve their performance.

Read more about our writers

  • Testimonials
    Our clients' testimonials prove we're doing everything right.

Check for yourself

  • Sample essays
    The best way to understand how well our writers do their work is to view sample essays written by them.

View samples

  • Our Free Essay Tools
    Even more opportunities to improve your academic papers.


Bibliography Generator
Words to Pages Converter
Words to Minutes Converter
College GPA Calculator
Thesis statement generator