02 Dec Overview You have been hired as the Chief Security Officer for a l
Overview
You have been hired as the Chief Security Officer for a local University. For this role, you will be responsible for establishing and maintaining an enterprise-wide information security program to ensure that all information and data assets are not compromised. Knowing the concepts that are presented in the course, you will develop a plan to carry out a security program that deters computer crimes, establishes a process for investigation and outlines which laws are applicable for possible offenders.
Instructions
Write an 8–10 page paper in which you:
- Use your textbook, the Internet, and Strayer Library to research:
- Recent computer hacker attacks or other crimes that have been committed against higher educational institutions.
- Analyze the processes put in place by other higher education institutions in order to prevent these crimes from reoccurring.
- Recommend processes, methodologies, or technology that can be purchased to lower computer crime threats.
- Include specifics on pricing and the level of support and maintenance that would be required.
- Current laws and government agencies that exist in your region that address the threat of computer cyber-crimes.
- Identify the laws that would be effective to convict offenders.
- Determine what computer crime fighting government programs exist within your region that can complement your security operations.
- Computer forensics technology that can be used by the University.
- Identify the types and determine the costs of technology that can be used for gathering electronic evidence, evidence from hardware, evidence from Firewalls, or cell phones.
- Use the Strayer Library to find at least four academic resources. Note: Wikipedia and similar Websites are not considered quality references.
- Recent computer hacker attacks or other crimes that have been committed against higher educational institutions.
This course requires the use of Strayer Writing Standards. For assistance and information, please refer to the Strayer Writing Standards link in the left-hand menu of your course. Check with your professor for any additional instructions. The specific course learning outcome associated with this assignment:
- Formulate processes and plans for a security program that deters computer crime, including applicable laws, relevant government programs, and appropriate evidence-gathering technology.
Our website has a team of professional writers who can help you write any of your homework. They will write your papers from scratch. We also have a team of editors just to make sure all papers are of HIGH QUALITY & PLAGIARISM FREE. To make an Order you only need to click Ask A Question and we will direct you to our Order Page at WriteEdu. Then fill Our Order Form with all your assignment instructions. Select your deadline and pay for your paper. You will get it few hours before your set deadline.
Fill in all the assignment paper details that are required in the order form with the standard information being the page count, deadline, academic level and type of paper. It is advisable to have this information at hand so that you can quickly fill in the necessary information needed in the form for the essay writer to be immediately assigned to your writing project. Make payment for the custom essay order to enable us to assign a suitable writer to your order. Payments are made through Paypal on a secured billing page. Finally, sit back and relax.
Do you need help with this question?
Get assignment help from WriteEdu.com Paper Writing Website and forget about your problems.
WriteEdu provides custom & cheap essay writing 100% original, plagiarism free essays, assignments & dissertations.
With an exceptional team of professional academic experts in a wide range of subjects, we can guarantee you an unrivaled quality of custom-written papers.
Chat with us today! We are always waiting to answer all your questions.