business proposal 26

Important! Read First

Choose one of the following two Portfolio Project options to complete by the end of Week 8. Do not do both assignments. Identify your assignment choice in the title of your submission. When you are ready to submit, click the Week 8 Portfolio Project header on the Assignments page to upload the document.

Option #1: XYZ Corporation

XYZ Corporation is a small organization of roughly 20 to 30 employees working in a simple office space using basic peer-to-peer type networking in which all employees keep their data on their own PCs and each has his or her own devices (i.e., printers, scanners, and other peripherals).

In the last few months, XYZ developed a revolutionary widget that will change technology as we know it. The company received a substantial investment and will quickly ramp up to 100 employees. They moved into a new building that was wired and set up for a local area network (LAN). They have implemented a client server-based network in which all printers, folders, and other resources are shared but everyone has access to everything and there is no security outside of the defaults in place when the system was set up.

You have been hired to secure XYZ Inc’s network and ensure that the company has the highest levels of security to prevent internal or external attacks. In an 8-10 page proposal, address the following items to provide a comprehensive secure environment:

  1. A plan to provide secure Access Control Methods for all user access
  2. A viable Password policy, which includes complexity, duration, and history requirements
  3. A cryptography method to ensure vital data is encrypted
  4. A remote access plan to ensure that users that access the network remotely do so in a secure and efficient manner
  5. A thorough plan to protect the network from Malware and other Malicious attacks

Your proposal should address all of the elements noted above with support, detail, and elaboration for each section explicitly grounded in knowledge from the assigned readings and media, along with any outside sources you may choose to bring into your writing. Your paper should be 8-10 pages in length, conform to CSU-Global Guide to Writing and APA (Links to an external site.), and include 3-5 scholarly references in addition to the course textbook to support your views. The CSU-Global Library is a good place to find these references.

Option #2: ABC Corporation

ABC Corporation is a small but global organization of roughly 200 to 250 employees working in a work-at-home type of office space around the world using Wide Area Network connectivity via VPNs. The company deals with lot of financial information to be shared between the offices that requires encrypted traffic as well as data-at-rest encryption.

You have been hired to secure ABC Inc’s network and ensure that the company has the highest levels of security to prevent internal or external attacks. In an 8-10 page proposal, address the following items to provide a comprehensive secure environment:

  1. A plan to provide secure Access Control Methods for all user access
  2. A viable Password policy, which includes complexity, duration, and history requirements
  3. A cryptography method to ensure vital data is encrypted, including recommendation on algorithms
  4. A VPN recommendation to access the network remotely do so in a secure and efficient manner
  5. A thorough plan to protect the network from Malware and other Malicious attacks

Your proposal should address all of the elements noted above with support, detail, and elaboration for each section explicitly grounded in knowledge from the assigned readings and media along with any outside sources you may choose to bring into your writing. Your paper should be 8-10 pages in length, conform to CSU-Global Guide to Writing and APA (Links to an external site.), and include 3-5 scholarly references in addition to the course textbook to support your views. The CSU-Global Library is a good place to find these references.

Rubric

ITS350 Module 8 Portfolio Project

ITS350 Module 8 Portfolio Project

Criteria Ratings Pts

This criterion is linked to a Learning OutcomeRequirements

15.0 to >12.0 pts

Meets Expectation

The Portfolio includes all of the required components, including paper length and submission of all required items and elements as specified in the assignment.

12.0 to >9.0 pts

Approaches Expectation

The Portfolio includes most of the required components, as specified in the assignment.

9.0 to >6.0 pts

Below Expectation

The Portfolio includes some of the required components, as specified in the assignment.

6.0 to >0 pts

Limited Evidence

The Portfolio includes few of the required components, as specified in the assignment.

15.0 pts

This criterion is linked to a Learning OutcomePlan to provide secure Access Control Methods

35.0 to >28.0 pts

Meets Expectation

A detailed plan to provide secure Access Control Methods for all user access.

28.0 to >21.0 pts

Approaches Expectation

The plan includes fewer details to provide secure Access Control Methods for all user access.

21.0 to >14.0 pts

Below Expectation

The plan includes less than 2 plan item details to provide secure Access Control Methods for all user access.

14.0 to >0 pts

Limited Evidence

The plan includes NO plan item details to provide secure Access Control Methods for all user access.

35.0 pts

This criterion is linked to a Learning OutcomeViable password policy

35.0 to >28.0 pts

Meets Expectation

A detailed viable Password policy, which includes complexity, duration, and history requirements.

28.0 to >21.0 pts

Approaches Expectation

The policy includes some details but not complete detailed viable Password policy, which includes complexity, duration, and history requirements.

21.0 to >14.0 pts

Below Expectation

The policy includes 1 or 2 details but not complete detailed viable Password policy, which includes complexity, duration, and history requirements.

14.0 to >0 pts

Limited Evidence

The policy includes NO details about viable Password policy, which includes complexity, duration, and history requirements.

35.0 pts

This criterion is linked to a Learning OutcomeCryptography

35.0 to >28.0 pts

Meets Expectation

A detailed viable cryptography method to ensure vital data is encrypted.

28.0 to >21.0 pts

Approaches Expectation

The plan includes some details but not complete detailed viable cryptography method to ensure vital data is encrypted.

21.0 to >14.0 pts

Below Expectation

The plan includes 1 or 2 details but not complete detailed viable cryptography method to ensure vital data is encrypted.

14.0 to >0 pts

Limited Evidence

The plan includes NO details about viable cryptography method to ensure vital data is encrypted.

35.0 pts

This criterion is linked to a Learning OutcomeRemote Access Plan

35.0 to >28.0 pts

Meets Expectation

A detailed viable remote access plan, which includes user access, security, and efficiency.

28.0 to >21.0 pts

Approaches Expectation

The plan includes some details but not complete detailed viable remote access plan, which includes user access, security, and efficiency.

21.0 to >14.0 pts

Below Expectation

The plan includes 1 or 2 details but not complete detailed viable remote access plan, which includes user access, security, and efficiency.

14.0 to >0 pts

Limited Evidence

The plan includes NO details about viable remote access plan, which includes user access, security, and efficiency.

35.0 pts

This criterion is linked to a Learning OutcomeProtect Malware and other Malicious Attacks

35.0 to >28.0 pts

Meets Expectation

A detailed viable malware and malicious attack plan, which includes network protection.

28.0 to >21.0 pts

Approaches Expectation

The plan includes some details but not complete detailed malware and malicious attack plan, which includes network protection.

21.0 to >14.0 pts

Below Expectation

The plan includes 1 or 2 details but not complete malware and malicious attack plan, which includes network protection.

14.0 to >0 pts

Limited Evidence

The plan includes NO details about malware and malicious attack plan, which includes network protection.

35.0 pts

This criterion is linked to a Learning OutcomeApplication of Source Material

15.0 to >12.0 pts

Meets Expectation

Sources well or adequately chosen and applied to provide substance and perspectives on the issue; knowledge from the course linked properly to source material.

12.0 to >9.0 pts

Approaches Expectation

Some significant but not major problems with selection, application, and linkage of sources.

9.0 to >6.0 pts

Below Expectation

Major problems with selection, application, and linkage of sources.

6.0 to >0 pts

Limited Evidence

Source selection is seriously flawed; no linkage to knowledge from the course.

15.0 pts

This criterion is linked to a Learning OutcomeOrganization

15.0 to >12.0 pts

Meets Expectation

Project is clearly organized, well written, and in proper essay format including an introduction, body, and conclusion. Conforms to project requirements.

12.0 to >9.0 pts

Approaches Expectation

Small number of significant but not major flaws in organization and writing; is in proper essay format. In a minor way does not conform to project requirements.

9.0 to >6.0 pts

Below Expectation

Major problems in organization and writing; does not completely follow proper essay format. In a significant way does not conform to project requirements.

6.0 to >0 pts

Limited Evidence

Project is not well organized or well written and is not in proper essay format. Does not conform to project requirements.

15.0 pts

This criterion is linked to a Learning OutcomeGrammar and Style

15.0 to >12.0 pts

Meets Expectation

Strong sentence and paragraph structure; few or no minor errors in grammar and spelling; appropriate writing style; clear and concise with no unsupported comments.

12.0 to >9.0 pts

Approaches Expectation

Small number of significant but not major errors in grammar and spelling; generally appropriate writing.

9.0 to >6.0 pts

Below Expectation

Inconsistent to inadequate sentence and paragraph development; work needed on grammar and spelling; does not meet program expectations.

6.0 to >0 pts

Limited Evidence

Poor quality; unacceptable in terms of grammar and/or spelling; inappropriate writing style that interferes with clarity.

15.0 pts

This criterion is linked to a Learning OutcomeDemonstrates proper use of APA style

15.0 to >12.0 pts

Meets Expectation

Project contains proper APA formatting, according to the CSU-Global Guide to Writing and APA, with no more than one significant error.

12.0 to >9.0 pts

Approaches Expectation

Few errors in APA formatting, according to the CSU-Global Guide to Writing and APA, with no more than two to three significant errors.

9.0 to >6.0 pts

Below Expectation

Significant errors in APA formatting, according to the CSU-Global Guide to Writing and APA, with four to five significant errors.

6.0 to >0 pts

Limited Evidence

Numerous errors in APA formatting, according to the CSU-Global Guide to Writing and APA, with more than five significant errors.

15.0 pts

Total Points: 250.0