{"id":25043,"date":"2024-05-09T21:31:08","date_gmt":"2024-05-09T21:31:08","guid":{"rendered":"https:\/\/www.writemyessays.app\/blog\/questions\/assess-your-ability-to-identify-design-and-organize-information-technology-it-security-policies\/"},"modified":"2024-05-09T21:31:08","modified_gmt":"2024-05-09T21:31:08","slug":"assess-your-ability-to-identify-design-and-organize-information-technology-it-security-policies","status":"publish","type":"questions","link":"https:\/\/www.writemyessays.app\/blog\/questions\/assess-your-ability-to-identify-design-and-organize-information-technology-it-security-policies\/","title":{"rendered":"assess your ability to identify, design, and organize information technology (IT) security policies."},"content":{"rendered":"<h2 style=\"margin-right: 6px; margin-bottom: 0px; margin-left: 0px; font-weight: 700; font-size: 1rem; line-height: 1.5rem; cursor: auto;\">Instructions<\/h2>\n<div style=\"font-size: 19px; cursor: auto; color: inherit;\">\n<div style=\"line-height: 1.47; cursor: auto; color: inherit;\">\n<h2 style=\"margin: 12pt 0in 0in; font-weight: bold; font-size: 12pt; line-height: 17.6px; cursor: auto;\">Purpose<\/h2>\n<p style=\"margin: 0in 0in 12pt; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">This course project is intended to assess your ability to identify, design, and organize information technology (IT) security policies.<\/p>\n<h2 style=\"margin: 10pt 0in 0in; font-weight: bold; font-size: 12pt; line-height: 17.6px; cursor: auto;\">Learning Objectives and Outcomes<\/h2>\n<p style=\"margin: 0in 0in 12pt; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">Successful completion of this project will ensure that you can develop draft IT security policies for an organization and apply learning constructs from the course. By the end of this project, you will be able to do the following:<\/p>\n<ul style=\"margin-right: 0px; margin-bottom: 0in; margin-left: 0px; cursor: auto; color: inherit;\">\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">Evaluate compliance laws relevant to the U.S. Department of Defense.<\/li>\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">Assess policy frameworks appropriate for an organization in a given scenario.<\/li>\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">Evaluate security controls and standards for the seven domains of a typical IT infrastructure.<\/li>\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">Develop DoD-compliant policies for an organization\u2019s IT infrastructure.<\/li>\n<\/ul>\n<h2 style=\"margin: 10pt 0in 0in; font-weight: bold; font-size: 12pt; line-height: 17.6px; cursor: auto;\">Required Source Information and Tools<\/h2>\n<p style=\"margin: 6pt 0in 0in; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">Web References:<\/span><\/b><span style=\"cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>Links to Web references in this document and related materials are subject to change without prior notice. These links were last verified on August 26, 2020.<\/span><\/p>\n<p style=\"margin: 0in; font-size: 11pt; cursor: auto; color: inherit;\">&nbsp;<\/p>\n<p style=\"margin: 0in 0in 12pt; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">The following tools and resources will be needed to complete this project:<\/p>\n<ul style=\"margin-right: 0px; margin-bottom: 0in; margin-left: 0px; cursor: auto; color: inherit;\">\n<li style=\"margin: 0in 0in 12pt 0px; font-size: 11pt; line-height: 16.1333px; cursor: auto; color: inherit;\"><span style=\"font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">Course textbook<\/span><\/li>\n<li style=\"margin: 0in 0in 12pt 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">Internet access<\/li>\n<li style=\"margin: 0in 0in 12pt 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\"><span style=\"line-height: 14.6667px; cursor: auto; color: inherit;\">DoD instructions or directives<br style=\"cursor: auto; color: inherit;\"><i style=\"cursor: auto; color: inherit;\">https:\/\/www.esd.whs.mil\/dd\/<\/i><\/span><\/li>\n<li style=\"margin: 0in 0in 12pt 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">Risk Management Framework (RMF) for DoD Information Technology (IT)<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><i style=\"cursor: auto; color: inherit;\">https:\/\/www.esd.whs.mil\/Portals\/54\/Documents\/DD\/issuances\/dodi\/851001p.pdf?ver=2019-02-26-101520-300<\/i><\/li>\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\"><span style=\"line-height: 14.6667px; cursor: auto; color: inherit;\">U.S. Department of Defense (DoD) Chief Information Office Library<\/span><\/li>\n<\/ul>\n<p style=\"margin: 0in 0in 12pt 0.5in; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\"><i style=\"cursor: auto; color: inherit;\">https:\/\/dodcio.defense.gov\/Library\/<\/i><\/p>\n<ul style=\"margin-right: 0px; margin-bottom: 12pt; margin-left: 0px; cursor: auto; color: inherit;\">\n<li style=\"margin: 0in 0in 12pt 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\"><span style=\"line-height: 14.6667px; cursor: auto; color: inherit;\">Department of Defense Information Security Program<br style=\"cursor: auto; color: inherit;\"><i style=\"cursor: auto; color: inherit;\">https:\/\/www.esd.whs.mil\/Portals\/54\/Documents\/DD\/issuances\/dodm\/520001m_vol1.pdf?ver=2020-08-04-092500-203<\/i><\/span><\/li>\n<li style=\"margin: 0in 0in 12pt 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">Department of Defense Internet Services and Internet-Based Capabilities<br style=\"cursor: auto; color: inherit;\"><i style=\"cursor: auto; color: inherit;\">https:\/\/www.esd.whs.mil\/Portals\/54\/Documents\/DD\/issuances\/dodi\/817001p.pdf<\/i><\/li>\n<\/ul>\n<p style=\"margin: 0in 0in 12pt; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">You may consult other relevant sources, if needed. If so, include citations for those sources in the final deliverable for this report.<\/p>\n<h2 style=\"margin: 10pt 0in 12pt; font-weight: bold; font-size: 12pt; line-height: 17.6px; cursor: auto;\">Deliverables<\/h2>\n<p style=\"margin: 0in; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\"><span style=\"line-height: 14.6667px; cursor: auto; color: inherit;\">This project is divided into several parts, each with a deliverable. The first three parts are research drafts, which should include organized lists and notes gathered during research, sources, and in some cases policy drafts. These documents should be organized and readable, but are not polished reports.<\/span><\/p>\n<p style=\"margin: 0in; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\"><span style=\"line-height: 14.6667px; cursor: auto; color: inherit;\">&nbsp;<\/span><\/p>\n<table style=\"cursor: auto; color: inherit;\">\n<thead style=\"cursor: auto; color: inherit;\">\n<tr style=\"cursor: auto; color: inherit;\">\n<td style=\"padding: 0in 5.4pt; cursor: auto; color: inherit;\">\n<p style=\"margin: 0in; font-size: 10pt; line-height: 15.3333px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"font-size: 9pt; line-height: 13.8px; cursor: auto; color: inherit;\">Item<\/span><\/b><\/p>\n<\/td>\n<td style=\"padding: 0in 5.4pt; cursor: auto; color: inherit;\">\n<p style=\"margin: 0in; font-size: 10pt; line-height: 15.3333px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"font-size: 9pt; line-height: 13.8px; cursor: auto; color: inherit;\">Deliverables<\/span><\/b><\/p>\n<\/td>\n<\/tr>\n<\/thead>\n<tbody style=\"cursor: auto; color: inherit;\">\n<tr style=\"cursor: auto; color: inherit;\">\n<td style=\"padding: 0in 5.4pt; cursor: auto; color: inherit;\">\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; line-height: 15.3333px; cursor: auto; color: inherit;\"><span style=\"line-height: 15.3333px; cursor: auto; color: inherit;\">Project Part 1<\/span><\/p>\n<\/td>\n<td style=\"padding: 0in 5.4pt; cursor: auto; color: inherit;\">\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; line-height: 15.3333px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"line-height: 15.3333px; cursor: auto; color: inherit;\">U.S. Compliance Laws Research<\/span><\/b><\/p>\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; line-height: 15.3333px; cursor: auto; color: inherit;\"><span style=\"line-height: 15.3333px; cursor: auto; color: inherit;\">Submit a draft of your research of DOD-specific requirements for an organization\u2019s IT infrastructure and U.S. compliance laws that may affect the firm.<\/span><\/p>\n<\/td>\n<\/tr>\n<tr style=\"cursor: auto; color: inherit;\">\n<td style=\"padding: 0in 5.4pt; cursor: auto; color: inherit;\">\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; line-height: 15.3333px; cursor: auto; color: inherit;\"><span style=\"line-height: 15.3333px; cursor: auto; color: inherit;\">Project Part 2<\/span><\/p>\n<\/td>\n<td style=\"padding: 0in 5.4pt; cursor: auto; color: inherit;\">\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; line-height: 15.3333px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"line-height: 15.3333px; cursor: auto; color: inherit;\">Infrastructure Research A<\/span><\/b><\/p>\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; line-height: 15.3333px; cursor: auto; color: inherit;\"><span style=\"line-height: 15.3333px; cursor: auto; color: inherit;\">Submit a draft of (1) which policy framework(s) will be followed for the project and (2) DoD-compliant policies, standards, and controls that affect the User, Workstation, LAN, and LAN-to-WAN Domains.<\/span><\/p>\n<\/td>\n<\/tr>\n<tr style=\"cursor: auto; color: inherit;\">\n<td style=\"padding: 0in 5.4pt; cursor: auto; color: inherit;\">\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; line-height: 15.3333px; cursor: auto; color: inherit;\"><span style=\"line-height: 15.3333px; cursor: auto; color: inherit;\">Project Part 3<\/span><\/p>\n<\/td>\n<td style=\"padding: 0in 5.4pt; cursor: auto; color: inherit;\">\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; line-height: 15.3333px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"line-height: 15.3333px; cursor: auto; color: inherit;\">Infrastructure Research B<\/span><\/b><\/p>\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; line-height: 15.3333px; cursor: auto; color: inherit;\"><span style=\"line-height: 15.3333px; cursor: auto; color: inherit;\">Submit a bulleted list of DoD-compliant policies, standards, and controls that affect the WAN, Remote Access, and System\/Application Domains.<\/span><\/p>\n<\/td>\n<\/tr>\n<tr style=\"cursor: auto; color: inherit;\">\n<td style=\"padding: 0in 5.4pt; cursor: auto; color: inherit;\">\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; line-height: 15.3333px; cursor: auto; color: inherit;\"><span style=\"line-height: 15.3333px; cursor: auto; color: inherit;\">Project Part 4<\/span><\/p>\n<\/td>\n<td style=\"padding: 0in 5.4pt; cursor: auto; color: inherit;\">\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; line-height: 15.3333px; cursor: auto; color: inherit;\"><b style=\"font-weight: bold; cursor: auto; color: inherit;\"><span style=\"line-height: 15.3333px; cursor: auto; color: inherit;\">Final Report<\/span><\/b><\/p>\n<p style=\"margin: 0in 0in 6pt; font-size: 10pt; line-height: 15.3333px; cursor: auto; color: inherit;\"><span style=\"line-height: 15.3333px; cursor: auto; color: inherit;\">Submit the final report of your class project.<\/span><\/p>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p style=\"margin: 0in; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\"><span style=\"line-height: 14.6667px; cursor: auto; color: inherit;\">&nbsp;<\/span><\/p>\n<p style=\"margin: 0in 0in 12pt; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">\n<h2 style=\"margin: 10pt 0in 12pt; font-weight: bold; font-size: 12pt; line-height: 17.6px; cursor: auto;\">Scenario<\/h2>\n<p style=\"margin: 0in 0in 12pt; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">You are a security professional for Blue Stripe Tech, an IT services provider with approximately 400 employees. Blue Stripe Tech partners with industry leaders to provide storage, networking, virtualization, and cybersecurity to clients.<\/p>\n<p style=\"margin: 0in 0in 12pt; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">Blue Stripe Tech recently won a large DoD contract, which will add 30 percent to the revenue of the organization. It is a high-priority, high-visibility project. Blue Stripe Tech will be allowed to make its own budget, project timeline, and tollgate decisions.<\/p>\n<p style=\"margin: 0in 0in 12pt; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">As a security professional for Blue Stripe Tech, you are responsible for developing security policies for this project. These policies are required to meet DoD standards for delivery of IT technology services to the U.S. Air Force Cyber Security Center (AFCSC), a DoD agency.<\/p>\n<p style=\"margin: 0in 0in 12pt; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">To do this, you must develop DoD-approved policies, standards, and control descriptions for your IT infrastructure (see the \u201cTasks\u201d section in this document). The policies you create must pass DoD-based requirements. Currently, your organization does not have any DoD contracts and thus has no DoD-compliant security policies, standards, or controls in place.<\/p>\n<p style=\"margin: 0in 0in 12pt; font-size: 10pt; line-height: 15.3333px; cursor: auto; color: inherit;\">Blue Stripe Tech&#8217;s computing environment includes the following:<\/p>\n<ul style=\"margin-right: 0px; margin-bottom: 0in; margin-left: 0px; cursor: auto; color: inherit;\">\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">12 servers running the latest edition of Microsoft Server, providing the following:<\/li>\n<\/ul>\n<ul style=\"margin-right: 0px; margin-bottom: 0in; margin-left: 0px; cursor: auto; color: inherit;\">\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">\n<ul style=\"margin-right: 0px; margin-bottom: 0in; margin-left: 0px; cursor: auto; color: inherit;\">\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">Active Directory (AD)<\/li>\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">Domain Name System (DNS)<\/li>\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">Dynamic Host Configuration Protocol (DHCP)<\/li>\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">Enterprise resource planning (ERP) application (Oracle)<\/li>\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">A research and development (R&amp;D) engineering network segment for testing, separate from the production environment<\/li>\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">Microsoft Exchange Server for email<\/li>\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">Email filter<\/li>\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">Cloud-based secure web gateway (web security, data loss protection, next-generation firewall, cloud application security, advanced threat protection)<\/li>\n<\/ul>\n<\/li>\n<\/ul>\n<ul style=\"margin-right: 0px; margin-bottom: 0in; margin-left: 0px; cursor: auto; color: inherit;\">\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">Two Linux servers running Apache Server to host your website<\/li>\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">400 PCs\/laptops running Microsoft Windows 10, Microsoft 365 office applications, and other productivity tools<\/li>\n<\/ul>\n<h2 style=\"margin: 10pt 0in 12pt; font-weight: bold; font-size: 12pt; line-height: 17.6px; cursor: auto;\">Tasks<\/h2>\n<ul style=\"margin-right: 0px; margin-bottom: 0in; margin-left: 0px; cursor: auto; color: inherit;\">\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">Develop a list of compliance laws required for DoD contracts.<\/li>\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">Determine which policy framework(s) will be used for this project.<\/li>\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">List controls placed on domains in the IT infrastructure.<\/li>\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">List required standards for common devices, categorized by IT domain.<\/li>\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">Develop DoD-compliant policies for the organization\u2019s IT infrastructure.<\/li>\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">Describe the policies, standards, and controls that would make the organization DoD compliant.<\/li>\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">Develop a high-level deployment plan for implementation of these polices, standards, and controls.<\/li>\n<li style=\"margin: 0in 0in 12pt 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">Write a professional report that includes all of the above content-related items and citations for all sources.<\/li>\n<\/ul>\n<h4 style=\"margin: 10pt 0in 6pt; font-weight: bold; font-size: 10pt; line-height: 14.6667px; cursor: auto;\">Submission Requirements<\/h4>\n<ul style=\"margin: 0in 0px; cursor: auto; color: inherit;\">\n<li style=\"margin-right: 0in; margin-top: 0in; margin-bottom: 0in; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\"><span style=\"line-height: 14.6667px; cursor: auto; color: inherit;\">Format: Microsoft Word (or compatible)<\/span><\/li>\n<li style=\"margin-right: 0in; margin-top: 0in; margin-bottom: 0in; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\"><span style=\"line-height: 14.6667px; cursor: auto; color: inherit;\">Font<\/span><span style=\"line-height: 14.6667px; cursor: auto; color: inherit;\">: Arial, size 12, double-space<\/span><\/li>\n<li style=\"margin-right: 0in; margin-top: 0in; margin-bottom: 0in; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\"><span style=\"line-height: 14.6667px; cursor: auto; color: inherit;\">Citation style: Your school\u2019s preferred style guide<\/span><\/li>\n<li style=\"margin-right: 0in; margin-top: 0in; margin-bottom: 0in; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\"><span style=\"line-height: 14.6667px; cursor: auto; color: inherit;\">Length of draft research documents: 2\u20134 pages<\/span><\/li>\n<li style=\"margin-right: 0in; margin-top: 0in; margin-bottom: 0in; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\"><span style=\"line-height: 14.6667px; cursor: auto; color: inherit;\">Length of final report: 14\u201318 pages<\/span><\/li>\n<\/ul>\n<h4 style=\"margin: 10pt 0in 6pt; font-weight: bold; font-size: 10pt; line-height: 14.6667px; cursor: auto;\">Self-Assessment<span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span><span style=\"cursor: auto; color: inherit;\">Checklist for Final Report<\/span><\/h4>\n<ul style=\"margin-right: 0px; margin-bottom: 0in; margin-left: 0px; cursor: auto; color: inherit;\">\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">I developed a list of compliance laws required for DoD contracts.<\/li>\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">I listed controls placed on domains in typical IT infrastructure.<\/li>\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">I listed required standards for common devices, categorized by IT domain.<\/li>\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\"><span style=\"cursor: auto; color: inherit;\">I developed DoD-compliant policies<\/span><span style=\"cursor: auto; color: inherit;\">&nbsp;<\/span>and standards for my organization\u2019s IT infrastructure<\/li>\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">I described the policies, standards, and controls that would make my organization DoD compliant.<\/li>\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">I listed all applicable DoD frameworks in the final report.<\/li>\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">I developed a high-level deployment plan for implementation of these polices, standards, and controls.<\/li>\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.<\/li>\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">I included citations for all sources used in the report.<\/li>\n<li style=\"margin: 0in 0in 0in 0px; font-size: 10pt; line-height: 14.6667px; cursor: auto; color: inherit;\">I followed the submission guidelines.<\/li>\n<\/ul>\n<\/div>\n<\/div>\n","protected":false},"excerpt":{"rendered":"<p>Instructions Purpose This course project is intended to assess your ability to identify, design, and organize information technology (IT) security policies. Learning Objectives and Outcomes Successful completion of this project will ensure that you can develop draft IT security policies for an organization and apply learning constructs from the course. By the end of this [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","template":"","meta":[],"disciplines":[62],"paper_types":[],"tagged":[],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/25043"}],"collection":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions"}],"about":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/types\/questions"}],"author":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/comments?post=25043"}],"version-history":[{"count":0,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/questions\/25043\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/media?parent=25043"}],"wp:term":[{"taxonomy":"disciplines","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/disciplines?post=25043"},{"taxonomy":"paper_types","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/paper_types?post=25043"},{"taxonomy":"tagged","embeddable":true,"href":"https:\/\/www.writemyessays.app\/blog\/wp-json\/wp\/v2\/tagged?post=25043"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}