Best writers. Best papers. Let professionals take care of your academic papers

Order a similar paper and get 15% discount on your first order with us
Use the following coupon "FIRST15"
ORDER NOW

IT 380 Milestone Two Guidelines and Rubric

IT 380 Milestone Two Guidelines and Rubric Overview: For the final project in this course you will assume the role of a training manager at a cybersecurity firm needing to create a training manual for new information security analyst hires. For milestone two, complete the cybersecurity policy section of the manual. Remember, use the same manual you used to complete milestone one. Prompt: You will submit the cybersecurity policy section of the training manual. The training manual will include a discussion of the purpose and value of cybersecurity, illuminate core tenets of cybersecurity, and illustrate best practices for addressing common threat scenarios. Use the information on each of these topics to develop a customized training manual for newly hired cybersecurity professionals at CyberLeet. Specifically, the following critical elements must be addressed: I. How to Develop Cybersecurity Policies: In this part of the training manual, you will develop the cybersecurity policies in four distinct areas for new hires at CyberLeet. Based on information you have learned on cybersecurity use and governance, you will develop policies for end-user passwords, acceptable use, basic users, and user training. For each of these areas, follow the guiding questions to develop effective use policies that new hires will be trained on. Review the directions in each section of the manual template to guide your response. Be sure you delete all of the directions in each section prior to finalizing the information. A. What principles should the information security analyst apply in order to develop appropriate password policies for their clients? Make sure you address confidentiality, integrity, and availability of information. B. What principles should the information security analyst apply in order to develop appropriate acceptable use policies for the client? Make sure you address confidentiality, integrity, and availability of information. C. What principles should the information security analyst apply in order to develop appropriate user training policies for the client? Make sure you address confidentiality, integrity, and availability of information. D. What principles should the information security analyst apply in order to develop appropriate basic user policies for the client? Make sure you address confidentiality, integrity, and availability of information. Rubric Guidelines for Submission: Use the template provided to complete this assignment. Review each section and follow the prompts accordingly. All prompts should be deleted. Remember, you are responsible for every section of a completed training manual. Instructor Feedback: This activity uses an integrated rubric in Blackboard. Students can view instructor feedback in the Grade Center. For more information, review these instructions. Critical Elements Exemplary (100%) Proficient (85%) Needs Improvement (55%) Not Evident (0%) Value How To: Password Policies Meets “Proficient” criteria and demonstrates keen insight into best practices for defending the confidentiality, integrity, and availability of information Identifies specific principles for developing appropriate password policies that address confidentiality, integrity, and availability of information Identifies principles for developing password policies but fails to fully address all relevant aspects or there are gaps in logic or accuracy Does not identify principles for developing password policies 25 How To: Acceptable Use Policies Meets “Proficient” criteria and demonstrates keen insight into best practices for defending the confidentiality, integrity, and availability of information Identifies specific principles for developing appropriate acceptable use policies that address confidentiality, integrity, and availability of information Identifies principles for developing acceptable use policies but fails to fully address all relevant aspects or there are gaps in logic or accuracy Does not identify principles for developing acceptable use policies 25 How To: User Training Policies Meets “Proficient” criteria and demonstrates keen insight into best practices for defending the confidentiality, integrity, and availability of information Identifies specific principles for developing appropriate user training policies that address confidentiality, integrity, and availability of information Identifies principles for developing user training policies but fails to fully address all relevant aspects or there are gaps in logic or accuracy Does not identify principles for developing user training policies 25 How To: Basic User Policies Meets “Proficient” criteria and demonstrates keen insight into best practices for defending the confidentiality, integrity, and availability of information Identifies specific principles for developing appropriate basic user policies that address confidentiality, integrity, and availability of information Identifies principles for developing basic user policies but fails to fully address all relevant aspects or there are gaps in logic or accuracy Does not identify principles for developing basic user policies 25 Total 100%

"Order a similar paper and get 15% discount on your first order with us
Use the following coupon
"FIRST15"

Order Now