IT 3358 Discussion: Security Vulnerabilities: Policies and Controls

IT 3358 Discussion: Security Vulnerabilities: Policies and Controls

When developing a network security strategy, you need to make decisions on what security vulnerabilities need to be controlled in that environment. In your own words, describe how you believe vulnerabilities for global organizations differ from those that are non-local or domestic? Provide at least one (1) example supporting your stance.

 

Instructions

Now that you have an understanding of the project and the company’s needs, include the following in the initial scope document and proposal:

Describe the scope of your project by providing an overview to the selected organization: the reasons for your choice, its size, and the location of the organization. IT 3358 Discussion: Security Vulnerabilities: Policies and Controls

Describe the main business problems and goals as they relate to information technology. Include information relative to organizational user, organizational systems, and the security requirements.

Describe decision makers and stakeholders on whom you would rely to develop a requirements analysis and traverse through the information gathering phases of a security infrastructure deployment project.

Define a project timeline and outline that coincides with the system and/or infrastructure component life cycle stages. Additionally, identify the security components, requirements, and concerns that will need to be addressed. IT 3358 Discussion: Security Vulnerabilities: Policies and Controls

ORDER   A PLAGIARISM-FREE PAPER   NOW

Explain the role of Availability, Confidentiality, Authentication, and Integrity in identifying the project scope for the organization.

Given the global nature of the organization, identify any unique challenges that you anticipate facing from a regulatory, human resources, and cultural standpoint.

You are encouraged to provide resources and citations. Any references should be formatted according to APA (6th Edition) style and formatting.

Refer to the Project Scope Scoring Guide to ensure that you meet the grading criteria for this assignment. Submit your document in the assignment area.

Resources

Project Scope Scoring Guide.

APA Style and Format. IT 3358 Discussion: Security Vulnerabilities: Policies and Controls