Information technology (IT) security policies.

        Purpose This course project is intended to assess your ability to identify, design, and organize information technology (IT) security policies. Learning Objectives and Outcomes Successful completion of this project will ensure that you can develop draft IT security policies for an organization and apply learning constructs from the course. By the end of this project, you will be able to do the following: § Evaluate compliance laws relevant to the U.S. Department of Defense. § Assess policy frameworks appropriate for an organization in a given scenario. § Evaluate security controls and standards for the seven domains of a typical IT infrastructure. § Develop DoD-compliant policies for an organization’s IT infrastructure. Required Source Information and Tools Web References: Links to Web references in this document and related materials are subject to change without prior notice. These links were last verified on August 26, 2020. The following tools and resources will be needed to complete this project: § Course textbook § Internet access § DoD instructions or directives https://www.esd.whs.mil/dd/ § Risk Management Framework (RMF) for DoD Information Technology (IT) https://www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodi/851001p.pdf?ver=2019-02-26-101520-300 § U.S. Department of Defense (DoD) Chief Information Office Library https://dodcio.defense.gov/Library/ § Department of Defense Information Security Program https://www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodm/520001m_vol1.pdf?ver=2020-08-04-092500-203 § Department of Defense Internet Services and Internet-Based Capabilities https://www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodi/817001p.pdf

Unlock Your Academic Potential with Our Expert Writers

Embark on a journey of academic success with Legit Writing. Trust us with your first paper and experience the difference of working with world-class writers. Spend less time on essays and more time achieving your goals.

Order Now