For this
assignment, you will write a technical paper that details the requirements for
information control, perimeter protection, and physical security. Your target
audience consists of technical managers and some business managers. While
considering core requirements within the field, focus your attention on your
selected organization so that you can provide a practical solution based on
your knowledge.
Your technical paper should:
- Address the
different methods of containing data within the organization. - Set a
controlled approach for internal and external identity management and data
access. - Consider the
protection of information and systems for business continuity. - Pay
attention to the information perimeter and privilege access from remote
locations. - Establish
physical security for all information systems and network components. - Provide a
logical diagram of the levels of protection and parameters. The diagram
should only represent an overview, not the detailed components.
Length: 5 – 7 pages, including the
diagram
References: Include sources within the
course plus a minimum of 2 additional scholarly resources.
The completed assignment should
address all the assignment requirements, exhibit evidence of concept knowledge,
and demonstrate thoughtful consideration of the content presented in the
course. The writing should integrate scholarly resources, reflect academic
expectations and current APA standards, and adhere to Northcentral University’s
Academic Integrity Policy.