Capella University Protection of the Information Technology Resources Research Paper
Question Description
Write 10 pages.
Assignment Description
Throughout this course you will be working on several aspects ofoperating systems security that will result in a complete OperatingSystems Security Policies document for an organization of your choosing.Operating systems security is vital to the operation of the computersystems infrastructure in any organization and provides the protectionof valuable data and information. Each week, you will complete a part ofthe Operating Systems Security Policies document, with the final draftdue at the end of the course.
You will select an organization and apply your research to theanalysis and development of operating systems security policies thatwould be appropriate for the organization and the needs it has for itssystems. Additional information and the deliverables for each IndividualProject will be provided in the assignment description for the project.This is the course Key Assignment that you will make contributions toeach week.
Project Selection
The first step will be to select an organization as the target foryour Operating Systems Security Policies document. This organizationwill be used as the basis for each of the assignments throughout thecourse and should conform to the following guidelines:
- Nontrivial: The selected organizationshould be large enough to allow reasonable exercise of the operatingsystems security analysis process.
- Domain knowledge:You should be familiar enough with the organization to allow focus onthe project tasks without significant time required for domaineducation.
- Accessibility: You should have goodaccess to the people and other information related to the organizationbecause this will be an important part of the process.
- Note:The selected organization may already have operating systems securitypolicies in place and may still be used as the basis for the projects inthis course.
- Note: The selected organizationmust have a need for some type of operating systems security as part ofits operations. Therefore, you may feel free to identify a hypotheticalorganization that meets the requirements. Any necessary assumptions maybe made by you to fulfill the requirements of organization selection.
Select an existing organization or identify a hypotheticalorganization that fits these requirements, and submit your proposal toyour instructor before proceeding further with the assignments in thecourse. Approval should be sought within the first several days of thecourse. Your instructor will tell you how to submit this proposal andwhat notification will be given for project approval.
Assignment
For the assignments in this course, you will not be implementing anoperating systems security policy; rather, you will be developing acomprehensive operating systems security policies document. Your firsttask in this process will be to select an organization or identify ahypothetical organization to use as the basis of your projects. You willalso create the shell document for the final project deliverable thatyou will be working on during each unit. As you proceed through eachproject phase, you will add contents to each section of the finaldocument to gradually complete the final project delivery. Appropriateresearch should be conducted to support the development of yourdocument, and assumptions may be made when necessary.
The following are the project deliverables:
- Submit the organization proposal to your instructor for approval.
- Operating Systems Security Policies document shell
- Use MS Word
- Title Page
- Course number and name
- Project name
- Student name
- Date
- Table of Contents
- Use autogenerated TOC
- Separate page
- Maximum of 3 levels deep
- Be sure to update fields of TOC so it is up-to-date before submitting project
- SectionHeadings (Create each heading on a new page with TBD as the contentexcept for the sections listed under New Content below.)
- Project Outline
- Operating System Security Tools
- Security Threat Detection
- Secure Communications
- Virus Protection
- Security Management
- New Content
- Project Outline and Requirements
- Give a brief description of the organization (can behypothetical) where the operating systems security policies will beimplemented. Include company size, location(s), and other pertinentinformation.
- Identify the systems in the organization (i.e., thetype and number of computer systems and operating systems used, alongwith a top-level view of the infrastructure). A network diagram would beuseful for this purpose, but the diagram should be pasted into yourWord document.
- Your project must assume that the organizationhas UNIX, open source, and Windows operating systems in its computingenvironment, so be sure to include all 3 categories in the systemsoverview.
- Identify and describe any outside connections to the internal systems.
- Summarize the benefits the company would realize through the implementation of operating systems security policies.
- Material can be taken from the approved proposal submitted to the instructor.
- Be sure that this project is approved by the instructor.
- Operating System Security Tools
- Based on the systems overview, identify and describe at least 3security tools for each OS category (UNIX, open source, and Windows)that can be used at the operating system level to protect the systems,users, and data from security threats.
- The tools can be part ofthe OS or third-party tools. Some examples would include firewalls,account management, and port access management.
- Project Outline and Requirements
Have a similar assignment? "Place an order for your assignment and have exceptional work written by our team of experts, guaranteeing you A results."