Important! Read First
Choose one of the following two Portfolio Project options to complete by the end of Week 8. Do not do both assignments. Identify your assignment choice in the title of your submission. When you are ready to submit, click the Week 8 Portfolio Project header on the Assignments page to upload the document.
Option #1: XYZ Corporation
XYZ Corporation is a small organization of roughly 20 to 30 employees working in a simple office space using basic peer-to-peer type networking in which all employees keep their data on their own PCs and each has his or her own devices (i.e., printers, scanners, and other peripherals).
In the last few months, XYZ developed a revolutionary widget that will change technology as we know it. The company received a substantial investment and will quickly ramp up to 100 employees. They moved into a new building that was wired and set up for a local area network (LAN). They have implemented a client server-based network in which all printers, folders, and other resources are shared but everyone has access to everything and there is no security outside of the defaults in place when the system was set up.
You have been hired to secure XYZ Inc’s network and ensure that the company has the highest levels of security to prevent internal or external attacks. In an 8-10 page proposal, address the following items to provide a comprehensive secure environment:
- A plan to provide secure Access Control Methods for all user access
- A viable Password policy, which includes complexity, duration, and history requirements
- A cryptography method to ensure vital data is encrypted
- A remote access plan to ensure that users that access the network remotely do so in a secure and efficient manner
- A thorough plan to protect the network from Malware and other Malicious attacks
Your proposal should address all of the elements noted above with support, detail, and elaboration for each section explicitly grounded in knowledge from the assigned readings and media, along with any outside sources you may choose to bring into your writing. Your paper should be 8-10 pages in length, conform to CSU-Global Guide to Writing and APA (Links to an external site.), and include 3-5 scholarly references in addition to the course textbook to support your views. The CSU-Global Library is a good place to find these references.
Option #2: ABC Corporation
ABC Corporation is a small but global organization of roughly 200 to 250 employees working in a work-at-home type of office space around the world using Wide Area Network connectivity via VPNs. The company deals with lot of financial information to be shared between the offices that requires encrypted traffic as well as data-at-rest encryption.
You have been hired to secure ABC Inc’s network and ensure that the company has the highest levels of security to prevent internal or external attacks. In an 8-10 page proposal, address the following items to provide a comprehensive secure environment:
- A plan to provide secure Access Control Methods for all user access
- A viable Password policy, which includes complexity, duration, and history requirements
- A cryptography method to ensure vital data is encrypted, including recommendation on algorithms
- A VPN recommendation to access the network remotely do so in a secure and efficient manner
- A thorough plan to protect the network from Malware and other Malicious attacks
Your proposal should address all of the elements noted above with support, detail, and elaboration for each section explicitly grounded in knowledge from the assigned readings and media along with any outside sources you may choose to bring into your writing. Your paper should be 8-10 pages in length, conform to CSU-Global Guide to Writing and APA (Links to an external site.), and include 3-5 scholarly references in addition to the course textbook to support your views. The CSU-Global Library is a good place to find these references.
Rubric
ITS350 Module 8 Portfolio Project
ITS350 Module 8 Portfolio Project
Criteria |
Ratings |
Pts |
This criterion is linked to a Learning OutcomeRequirements
|
15.0 to >12.0 pts
Meets Expectation
The Portfolio includes all of the required components, including paper length and submission of all required items and elements as specified in the assignment.
|
12.0 to >9.0 pts
Approaches Expectation
The Portfolio includes most of the required components, as specified in the assignment.
|
9.0 to >6.0 pts
Below Expectation
The Portfolio includes some of the required components, as specified in the assignment.
|
6.0 to >0 pts
Limited Evidence
The Portfolio includes few of the required components, as specified in the assignment.
|
|
15.0 pts
|
This criterion is linked to a Learning OutcomePlan to provide secure Access Control Methods
|
35.0 to >28.0 pts
Meets Expectation
A detailed plan to provide secure Access Control Methods for all user access.
|
28.0 to >21.0 pts
Approaches Expectation
The plan includes fewer details to provide secure Access Control Methods for all user access.
|
21.0 to >14.0 pts
Below Expectation
The plan includes less than 2 plan item details to provide secure Access Control Methods for all user access.
|
14.0 to >0 pts
Limited Evidence
The plan includes NO plan item details to provide secure Access Control Methods for all user access.
|
|
35.0 pts
|
This criterion is linked to a Learning OutcomeViable password policy
|
35.0 to >28.0 pts
Meets Expectation
A detailed viable Password policy, which includes complexity, duration, and history requirements.
|
28.0 to >21.0 pts
Approaches Expectation
The policy includes some details but not complete detailed viable Password policy, which includes complexity, duration, and history requirements.
|
21.0 to >14.0 pts
Below Expectation
The policy includes 1 or 2 details but not complete detailed viable Password policy, which includes complexity, duration, and history requirements.
|
14.0 to >0 pts
Limited Evidence
The policy includes NO details about viable Password policy, which includes complexity, duration, and history requirements.
|
|
35.0 pts
|
This criterion is linked to a Learning OutcomeCryptography
|
35.0 to >28.0 pts
Meets Expectation
A detailed viable cryptography method to ensure vital data is encrypted.
|
28.0 to >21.0 pts
Approaches Expectation
The plan includes some details but not complete detailed viable cryptography method to ensure vital data is encrypted.
|
21.0 to >14.0 pts
Below Expectation
The plan includes 1 or 2 details but not complete detailed viable cryptography method to ensure vital data is encrypted.
|
14.0 to >0 pts
Limited Evidence
The plan includes NO details about viable cryptography method to ensure vital data is encrypted.
|
|
35.0 pts
|
This criterion is linked to a Learning OutcomeRemote Access Plan
|
35.0 to >28.0 pts
Meets Expectation
A detailed viable remote access plan, which includes user access, security, and efficiency.
|
28.0 to >21.0 pts
Approaches Expectation
The plan includes some details but not complete detailed viable remote access plan, which includes user access, security, and efficiency.
|
21.0 to >14.0 pts
Below Expectation
The plan includes 1 or 2 details but not complete detailed viable remote access plan, which includes user access, security, and efficiency.
|
14.0 to >0 pts
Limited Evidence
The plan includes NO details about viable remote access plan, which includes user access, security, and efficiency.
|
|
35.0 pts
|
This criterion is linked to a Learning OutcomeProtect Malware and other Malicious Attacks
|
35.0 to >28.0 pts
Meets Expectation
A detailed viable malware and malicious attack plan, which includes network protection.
|
28.0 to >21.0 pts
Approaches Expectation
The plan includes some details but not complete detailed malware and malicious attack plan, which includes network protection.
|
21.0 to >14.0 pts
Below Expectation
The plan includes 1 or 2 details but not complete malware and malicious attack plan, which includes network protection.
|
14.0 to >0 pts
Limited Evidence
The plan includes NO details about malware and malicious attack plan, which includes network protection.
|
|
35.0 pts
|
This criterion is linked to a Learning OutcomeApplication of Source Material
|
15.0 to >12.0 pts
Meets Expectation
Sources well or adequately chosen and applied to provide substance and perspectives on the issue; knowledge from the course linked properly to source material.
|
12.0 to >9.0 pts
Approaches Expectation
Some significant but not major problems with selection, application, and linkage of sources.
|
9.0 to >6.0 pts
Below Expectation
Major problems with selection, application, and linkage of sources.
|
6.0 to >0 pts
Limited Evidence
Source selection is seriously flawed; no linkage to knowledge from the course.
|
|
15.0 pts
|
This criterion is linked to a Learning OutcomeOrganization
|
15.0 to >12.0 pts
Meets Expectation
Project is clearly organized, well written, and in proper essay format including an introduction, body, and conclusion. Conforms to project requirements.
|
12.0 to >9.0 pts
Approaches Expectation
Small number of significant but not major flaws in organization and writing; is in proper essay format. In a minor way does not conform to project requirements.
|
9.0 to >6.0 pts
Below Expectation
Major problems in organization and writing; does not completely follow proper essay format. In a significant way does not conform to project requirements.
|
6.0 to >0 pts
Limited Evidence
Project is not well organized or well written and is not in proper essay format. Does not conform to project requirements.
|
|
15.0 pts
|
This criterion is linked to a Learning OutcomeGrammar and Style
|
15.0 to >12.0 pts
Meets Expectation
Strong sentence and paragraph structure; few or no minor errors in grammar and spelling; appropriate writing style; clear and concise with no unsupported comments.
|
12.0 to >9.0 pts
Approaches Expectation
Small number of significant but not major errors in grammar and spelling; generally appropriate writing.
|
9.0 to >6.0 pts
Below Expectation
Inconsistent to inadequate sentence and paragraph development; work needed on grammar and spelling; does not meet program expectations.
|
6.0 to >0 pts
Limited Evidence
Poor quality; unacceptable in terms of grammar and/or spelling; inappropriate writing style that interferes with clarity.
|
|
15.0 pts
|
This criterion is linked to a Learning OutcomeDemonstrates proper use of APA style
|
15.0 to >12.0 pts
Meets Expectation
Project contains proper APA formatting, according to the CSU-Global Guide to Writing and APA, with no more than one significant error.
|
12.0 to >9.0 pts
Approaches Expectation
Few errors in APA formatting, according to the CSU-Global Guide to Writing and APA, with no more than two to three significant errors.
|
9.0 to >6.0 pts
Below Expectation
Significant errors in APA formatting, according to the CSU-Global Guide to Writing and APA, with four to five significant errors.
|
6.0 to >0 pts
Limited Evidence
Numerous errors in APA formatting, according to the CSU-Global Guide to Writing and APA, with more than five significant errors.
|
|
15.0 pts
|
Total Points: 250.0
|