Project Part 2 Infrastructure Research A

Scenario You are a security professional for Blue Stripe Tech, an IT services provider with approximately 400 employees. Blue Stripe Tech partners with indust

From Assignment Stress to Stress-Free Grades. Trust your assignments to a professional online essay writer with the fastest delivery time and pure, original assignment papers.

Write My Assignment for Me.

Scenario You are a security professional for Blue Stripe Tech, an IT services provider with approximately 400 employees. Blue Stripe Tech partners with industry leaders to provide storage, networking, virtualization, and cybersecurity to clients. Blue Stripe Tech recently won a large DoD contract, which will add 30 percent to the revenue of the organization. It is a high-priority, high-visibility project. Blue Stripe Tech will be allowed to make its own budget, project timeline, and tollgate decisions. As a security professional for Blue Stripe Tech, you are responsible for developing security policies for this project. These policies are required to meet DoD standards for delivery of IT technology services to the U.S. Air Force Cyber Security Center (AFCSC), a DoD agency. To do this, you must develop DoD-approved policies, standards, and control descriptions for your IT infrastructure (see the “Tasks” section in this document). The policies you create must pass DoD-based requirements. Currently, your organization does not have any DoD contracts and thus has no DoD-compliant security policies, standards, or controls in place. Blue Stripe Tech's computing environment includes the following: 12 servers running the latest edition of Microsoft Server, providing the following: Active Directory (AD) Domain Name System (DNS) Dynamic Host Configuration Protocol (DHCP) Enterprise resource planning (ERP) application (Oracle) A research and development (R&D) engineering network segment for testing, separate from the production environment Microsoft Exchange Server for email Email filter Cloud-based secure web gateway (web security, data loss protection, next-generation firewall, cloud application security, advanced threat protection) Two Linux servers running Apache Server to host your website 400 PCs/laptops running Microsoft Windows 10, Microsoft 365 office applications, and other productivity tools Tasks Develop a list of compliance laws required for DoD contracts. Determine which policy framework(s) will be used for this project. List controls placed on domains in the IT infrastructure. List required standards for common devices, categorized by IT domain. Develop DoD-compliant policies for the organization’s IT infrastructure. Describe the policies, standards, and controls that would make the organization DoD compliant. Develop a high-level deployment plan for implementation of these polices, standards, and controls. Write a professional report that includes all of the above content-related items and citations for all sources. Submission Requirements Format: Microsoft Word (or compatible) Font: Arial, size 12, double-space Citation style: Your school’s preferred style guide Length of draft research documents: 2–4 pages Order this assignment or a similar task.

Calculate Price

Deadline.

Number of Pages.

Price: $12

Order Now >

Why Students Trust Us for Top Grades

Zero-Plagiarism Papers - Original writing by experts with free turnitin reports on-demand.

We Protect Your Privacy - Anonymity and Security with zero-data-sharing policy.

Free unlimited edits - We revise your paper until you are satisfied free of charge.

24|7 Support - We are available to answer your question every second of the day.

Best Writer - We connect you to the most suitable expert writer for your requirements.

How to order: Working with A Top Assignment Writer Online

What You get: With 100% Money-Back Guarantee

Unlimited Revisions Free

Title Page and References Free

Formatting Free

Outline Free

Best Writer Guaranteed

Plagiarism Report Guaranteed

How to order an assignment paper

Make your Studies stress-free and effort-free with our online essay service.

Write My Paper Register

Claim 30% OFF on first Order.

All Solutions are 100% original protected with Zero-Plagiarism Policy.

Recent Assignment Tasks/Orders

Security Breach at Target

In this assignment, you will read the article, "Teaching Case: Security Breach at Target." Then you will write a 3-4 page case analysis in which you: Outline

Information Systems

View

Password-Based Authentication

Go to Basic Search: Strayer University Online Library to locate and integrate at least two quality, academic resources (in addition to your textbook) on risks

Information Systems

View

MSD&CTD:   Describe how to calculate the... | Information Systems

Describe how to calculate the incidence rate for musculoskeletal disorders (MSDs) and cumulative trauma disorders (CTDs) in a workplace. What do you believe i

Information Systems

View