CIS 590 All Assignments CIS 590 All Assignments | Page 21
Illustrate the possible placement of servers, including access paths to the Internet and firewalls.
Note: facility limitations, workstations, printers, routers, switches, bridges, and access points
should be considered in the illustration.
Create and describe a comprehensive security policy for the company that will:
Protect the company infrastructure and assets by applying the principals of CIA. Note: CIA is a
widely used benchmark for evaluation of information systems security, focusing on the three
(3) core goals of confidentiality, integrity, and availability of information.
Address ethical aspects related to employee behavior, contractors, password usage, and access
to networked resources and information.
Your assignment must follow these formatting requirements:
Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all
sides; citations and references must follow APA or school-specific format. Check with your
professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s
name, the course title, and the date. The cover page and the reference page are not included in
the required assignment page length.
Include charts or diagrams created in MS Visio or Dia as an appendix of the infrastructure
document. All references to these diagrams must be included in the body of the infrastructure
document.
Section 2: Revised Project Plan
Use Microsoft Project to:
Update the project plan (summary and detail) template, from Project Deliverable 4: Cloud
Technology and Virtualization, with three to five (3-5) new project tasks each consisting of five
to ten (5-10) subtasks.
The specific course learning outcomes associated with this assignment are:
Describe the methods and best practices in implementing process change in IT organizations.