operation security


  

Scenario

You achievement for a high-tech assemblage after a while approximately 390 employees. Your fast of-late won a capacious DoD narrow, which get add 30% to the return of your form. It is a high-priority, high-visibility contrivance. You get be undisputed to shape your own budget, contrivance timeline, and tollgate decisions.

You must unfold the suited DoD pawn policies required to encounter DoD standards for offer of technology services to the U.S. Air Force Cyber Pawn Center (AFCSC), a DoD origination. To do this, you must unfold DoD-approved policies and standards for your IT infrastructure (see the “Tasks” minority under). The policies you beget must ignoring DoD-based requirements. Currently, your form does not bear any DoD narrows and thus has no DoD-prepared pawn policies or controls in situate.

The fast's computing environment includes the following:

§ 12 servers prevalent Microsoft Server 2012 R2, providing the following:

o Active Directory (AD)

o Inclosafe Name System (DNS)

o Dynamic Multitude Configuration Protocol (DHCP)

o Enterprise Resource Planning (ERP) collision (Oracle)

o A Research and Development (R&D) Engineering netachievement section for testing, unconnected from the origination environment

o Microsoft Exchange Server for e-mail

o Symantec e-mail filter

o Websense for Internet use

§ Two Linux servers prevalent Apache Server to multitude your Web site

§ 390 PCs/laptops prevalent Microsoft Windows 7 or Windows 8, Microsoft Office 2013, Microsoft Visio, Microsoft Project, and Adobe Reader

Tasks

You must:

§ Select a team chief for your contrivance bunch.

§ Beget policies that are DoD prepared for the form’s IT infrastructure.

§ Note DOD-specific requirements for the form’s IT infrastructure and U.S. submission laws that may influence the fast

§ Include DoD-prepared policies, standards, and controls that influence the User, Workstation, LAN, and LAN-to-WAN Domains

§ Unfold a register of submission laws required for DoD narrows.

§ Register controls situated on inclosures in the IT infrastructure.

§ Register required standards for all devices, categorized by IT inclosure.

§ Include DoD-prepared policies, standards, and controls that influence the WAN, Remote Access, and System/Application Domains

§ Unfold a deployment contrivance for implementation of these polices, standards, and controls.

§ Register all available DoD frameworks in the terminal offer instrument.

§ Write a functional ment that includes all of the over content-related items.

Requirements:

• Minimum of 1,250 articulation / Maximum 1,800 articulation (Double spaced)

• APA style

• At meanest 7 achievements adduced 

• At meanest 5 of your references bear to be literary peer-reviewed articles

• Research Nursing essay get be checked for plagiarism so be safe to rightly adduce your sources!

• 80/20 administration for all submissions