-45%

CIS 550 CIS550 CIS/550 ENTIRE COURSE HELP – STRAYER UNIVERSITY

$149.99$275.00

CIS 550 CIS550 CIS/550 ENTIRE COURSE HELP – STRAYER UNIVERSITY

CIS 550 Week 10 Term Paper: DigiNotar, Part 6B

CIS 550 Week 2 Case Study 1: Stratified Custom Manufacturing, Part 2

CIS 550 Week 3 Case Study 2 Cenartech Security Case, Part 3B

CIS 550 Week 3 Case Study 2: Cenartech Security Case, Part 3B

CIS 550 Week 4 Case Study 3: Stratified Custom Manufacturing, Part 3E

CIS 550 Week 5 Case Study 4: Stratified Custom Manufacturing, Part 4D

CIS 550 Week 6 Assignment: Digital Signature, Part 5A

CIS 550 Week 7 Case Study 5: Stratified Custom Manufacturing, Part 5F

CIS 550 Week 8 Case Study 6: Stratified Custom Manufacturing, Part 6E

CIS 550 Week 9 Case Study 7: Stratified Custom Manufacturing, Part 7D

Description

CIS 550 CIS550 CIS/550 ENTIRE COURSE HELP – STRAYER UNIVERSITY

CIS 550 Week 10 Term Paper: DigiNotar, Part 6B

CIS 550 Week 2 Case Study 1: Stratified Custom Manufacturing, Part 2

CIS 550 Week 3 Case Study 2 Cenartech Security Case, Part 3B

CIS 550 Week 3 Case Study 2: Cenartech Security Case, Part 3B

CIS 550 Week 4 Case Study 3: Stratified Custom Manufacturing, Part 3E

CIS 550 Week 5 Case Study 4: Stratified Custom Manufacturing, Part 4D

CIS 550 Week 6 Assignment: Digital Signature, Part 5A

CIS 550 Week 7 Case Study 5: Stratified Custom Manufacturing, Part 5F

CIS 550 Week 8 Case Study 6: Stratified Custom Manufacturing, Part 6E

CIS 550 Week 9 Case Study 7: Stratified Custom Manufacturing, Part 7D

CIS 550 CIS550 CIS/550 ENTIRE COURSE HELP – STRAYER UNIVERSITY

CIS 550 Week 10 Term Paper: DigiNotar, Part 6B

Term Paper: DigiNotar, Part 6B

Due Week 10 and worth 200 points

DigiNotar was a Certificate Authority (CA) whose security was breached in 2011. In your term paper, you are to play the role of a CIO and review the role CAs provide. Provide a historical perspective of CAs and their significance to the Internet and organizations. Your paper will review the events that lead to the breach of DigiNotar and the factors that would have mitigated it.

Write a ten to sixteen (10-16) page paper in which you develop a security policy document for your mid-sized organization that will include measures to protect against breaches and act as a proactive defense. You may select a fictitious name for your organization for the purpose of this paper. Do not duplicate a company’s existing policy. Create your own unique work based on what you have learned in this course. Policy reference materials can be found in Part 6B of your textbook. There will be two (2) major sections of the handbook: Policy Introduction and Policy Criteria.

Section 1: Policy Introduction

In two to four (2-4) pages total, develop a policy introduction that secures the reason for the policy. It must include the following four (4) items:

  1. Document information
  2. Audience
  3. Purpose
  4. Scope

Section 2: Policy Criteria

In eight to twelve (8-12) pages total, develop a security policy to protect against breaches and act as a proactive defense. It must include the following five (5) policy items:

  1. Objectives
  2. Compliances
  3. Responsibilities
  4. Implementation
  5. Controls
  6. Use at least four (4) quality resources in this assignment.Note: Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

  • Develop policies and procedures to provide necessary countermeasures to common security threats and vulnerabilities.
  • Use technology and information resources to research issues in information security.
  • Write clearly and concisely about security management using proper writing mechanics and technical style conventions.