Words of Wisdom:

"Never be bullied into silence. Never allow yourself to be made a victim. Accept no one's definition of your life; define yourself." - Diane

Issc 364 Course Project

  • Date Submitted: 10/21/2016 10:58 PM
  • Flesch-Kincaid Score: 25 
  • Words: 2140
  • Essay Grade: no grades
  • Report this Essay
ISSC 364 Course Project
ISSC 364 Course Project

Course Project (15%)
This course project is intended to assess your ability to comprehend and apply the basic concepts related to information security management, such as the following:
• The ability to discern when a risk assessment should be performed and carrying out the task
• Understanding user or customer access requirements, whether remote or local
• Using a layered security approach to establish and maintain access controls
• Working with other departments, such as the human resources department, to identify and implement methods to prevent unwarranted exposure to information by inappropriate personnel
Your ability to execute the tasks within these information security domains and others will be evaluated against the learning objectives as identified and described in previous lessons of instruction for this course.
Required Source Information and Tools
You will require the following resources to complete this project:
• Text sheet: Integrated Distributors Incorporated (provided in Week 1)
• A computer with:
• Access to the Internet
• Microsoft Office Suite—Word, PowerPoint, and Visio or any other comparable editing, presentation, and drawing software
User identification, authentication, and authorization are essential in developing, implementing, and maintaining a framework for information system security.   The basic function of an information system security framework is to ensure the confidentiality and the integrity, as well as the availability of systems, applications, and data.   Certain information security implementation and management knowledge is required of network administrators, IT service personnel, management, and IT security practitioners, such as information security officers, security analysts, and domain administrators.

You are provided with the text sheet named “Integrated...


Express your owns thoughts and ideas on this essay by writing a grade and/or critique.

  1. No comments