The assessments in this course build upon each other, so you are strongly encouraged to complete them in sequence.

The assessments in this course build upon each other, so you are strongly encouraged to complete them in sequence.

Assessment Instructions
Note: The assessments in this course build upon each other, so you are strongly encouraged to complete them in sequence.

Assume your supervisor has just put you in charge of onboarding interns joining your information security team. While these interns
all have some level of experience in IT security, you want to be sure everyone is starting off with a common set of understandings about
basic security principles, practices, and processes. Therefore, your supervisor asks you to create a primer on key information security
concepts for the interns to use as a reference as they move forward in their individual roles on your team.

For this assessment, create a document addressing the following key security topics:

Describe the key elements of an information security program.
Describe the roles within an organization that contribute to the information security program.
Analyze the role of the information security manager in protecting information assets.
Explain how the concept of security layers contributes to an effective security management program
Explain how the OSI model and network protocols contribute to the overall security profile of a network, including all the following sub-topics,
which must be covered in order to meet the requirements:
TCP/IP v4 and 6.
DNS.
HTTP.
SSL.
TLS.
SMTP.
UDP.
Explain how robust change management procedures contribute to the overall security profile of an organization
Analyze the workflow associated with information security incidents that may require involvement with local or federal regulators or law enforcement.
Additional Requirements

Written communication: Written communication is free of errors that detract from the overall message.
APA formatting: Resources and citations are formatted according to APA (6th edition) style and formatting.
Page length: 8–10 double-spaced pages, not including the references page.
Font and font size: Times New Roman, 12 point.

—————————————————————————————————————————————————

Create an 8–10-page document explaining and analyzing a broad range of basic security-knowledge topics.

The objective of this assessment is to demonstrate mastery of the foundational information needed by an information security professional.
By successfully completing this assessment, you will demonstrate your proficiency in the following course competencies and assessment criteria:
Competency 1: Identify general information assurance and security concepts for an organization.
Describe the key elements of an information security program.
Describe the roles within an organization that contribute to the information security program
Analyze the role of the information security manager in protecting information assets.

Competency 4: Design mechanisms that control unauthorized access to private information.
Explain how the concept of security layers contributes to an effective security management program
Explain how the OSI model and network protocols contribute to the overall security profile of a network
Explain how robust change management procedures contribute to the overall security profile of an organization

Competency 6: Describe the relationship between information security concepts and law enforcement.
Analyze the workflow associated with information security incidents that may require involvement with local or federal regulators or law enforcement.

Competency 7: Communicate effectively.
Exhibit proficiency in writing and use of APA 6th edition.

Questions to Consider
To deepen your understanding, you are encouraged to consider the questions below and discuss them with a fellow learner, a work associate, an interested friend,
or a member of the business community.

Use the CISSP domain information located on the ISC2 Web site (linked in the Resources under the Internet Resources heading) and consider the breadth
of the information security profession. How do these domains support one another to create a higher level of risk mitigation than would be possible without
this integration?

Click to Download Solution

Purchase Solution $26

By | 2019-10-26T09:33:25+00:00 October 26th, 2019|Accounting, Technology|