CIS 550 Week 10 Term Paper: DigiNotar, Part 6B (Strayer University) To get this tutorial message *email not allowed* or click on the left Homework Request Term Paper: DigiNotar, Part 6B Due Week 10 and worth 200 points DigiNotar was a Certificate Authority (CA) whose security was breached in 2011. In your term paper, you are to play the role of a CIO and review the role CAs provide. Provide a historical perspective of CAs and their significance to the Internet and organizations. Your paper will review the events that lead to the breach of DigiNotar and the factors that would have mitigated it. Write a ten to sixteen (10-16) page paper in which you develop a security policy document for your mid-sized organization that will include measures to protect against breaches and act as a proactive defense. You may select a fictitious name for your organization for the purpose of this paper. Do not duplicate a companyâ€™s existing policy. Create your own unique work based on what you have learned in this course. Policy reference materials can be found in Part 6B of your textbook. There will be two (2) major sections of the handbook: Policy Introduction and Policy Criteria. Section 1: Policy Introduction In two to four (2-4) pages total, develop a policy introduction that secures the reason for the policy. It must include the following four (4) items: Document information Audience Purpose Scope Section 2: Policy Criteria In eight to twelve (8-12) pages total, develop a security policy to protect against breaches and act as a proactive defense. It must include the following five (5) policy items: Objectives Compliances Responsibilities Implementation Controls Use at least four (4) quality resources in this assignment. Note: Wikipedia and similar Websites do not qualify as quality resources. Your assignment must follow these formatting requirements: Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions. Include a cover page containing the title of the assignment, the studentâ€™s name, the professorâ€™s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length. The specific course learning outcomes associated with this assignment are: Develop policies and procedures to provide necessary countermeasures to common security threats and vulnerabilities. Use technology and information resources to research issues in information security. Write clearly and concisely about security management using proper writing mechanics and technical style conventions.
We employ a number of measures to ensure top quality essays. The papers go through a system of quality control prior to delivery. We run plagiarism checks on each paper to ensure that they will be 100% plagiarism-free. So, only clean copies hit customers’ emails. We also never resell the papers completed by our writers. So, once it is checked using a plagiarism checker, the paper will be unique.
FALL 2018 HOMEWORK HELP| ASSIGNMENT HELP,…