Information technology (IT) security policies.

 

 

 

 

Purpose
This course project is intended to assess your ability to identify, design, and organize information technology (IT) security policies.

Learning Objectives and Outcomes
Successful completion of this project will ensure that you can develop draft IT security policies for an organization and apply learning constructs from the course. By the end of this project, you will be able to do the following:

§ Evaluate compliance laws relevant to the U.S. Department of Defense.

§ Assess policy frameworks appropriate for an organization in a given scenario.

§ Evaluate security controls and standards for the seven domains of a typical IT infrastructure.

§ Develop DoD-compliant policies for an organization’s IT infrastructure.

Required Source Information and Tools
Web References: Links to Web references in this document and related materials are subject to change without prior notice. These links were last verified on August 26, 2020.

The following tools and resources will be needed to complete this project:

§ Course textbook

§ Internet access

§ DoD instructions or directives
https://www.esd.whs.mil/dd/

§ Risk Management Framework (RMF) for DoD Information Technology (IT) https://www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodi/851001p.pdf?ver=2019-02-26-101520-300

§ U.S. Department of Defense (DoD) Chief Information Office Library

https://dodcio.defense.gov/Library/

§ Department of Defense Information Security Program
https://www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodm/520001m_vol1.pdf?ver=2020-08-04-092500-203

§ Department of Defense Internet Services and Internet-Based Capabilities
https://www.esd.whs.mil/Portals/54/Documents/DD/issuances/dodi/817001p.pdf

This question has been answered.

Get Answer