Capstone Project Overview

The purpose of this Capstone Project is for students to examine and solve real world information assurance problems and apply associated techniques to create practical solutions. The course takes an integrative and senior security officer approach to address the policy, risk, and control opportunities within cyberspace and IT environments. Deliverables 1 through 5 focus on preparing students toward the final Capstone Project. Skills, experience, and knowledge gained through the completion of prerequisite courses will be used throughout each deliverable. The project contents to be addressed are as follows:
Project Deliverable 6: Information Assurance Compliance with Government Regulations
Due Week 10 and worth 200 points
Review the “Audit Program for Application Systems for Auditing” presented in Appendix B of the Cascarino text. Also, read the following articles, located in the course shell:

“A Framework for Health Care Information Assurance and Policy Compliance” by Sherrie Drye Cannoy and A.F. Salam
“Information Assurance and Corporate Strategy” by Elspeth McFadzean, Jean-Noël Ezingeard, and David Birchall
“Five Most Common Cybersecurity Mistakes” from the Toledo Business Journal

Submission Requirements

Case Study Plan (MS Word)

Write a six to ten (6-10) page paper in which you:

Discuss which employees and organizations have a deeper-level of information assurance (IA) policy compliance.
Examine the factors that increased the individual’s level of propensity for compliance.
Determine the internal and external factors affecting IA policy compliance.
Ascertain which of the organizational requirements poses difficulty in adopting technical features to enhance security policy.
Discuss factors related to IA and policy compliance that are affected by government regulations.
Suggest a framework that could be used to address the issues described in the “Five Most Common Cybersecurity Mistakes” article, based on the “Audit Program for Application Systems for Auditing”.
Use at least three (3) quality resources in this assignment. Note:Wikipedia and similar Websites do not qualify as quality resources.

Your assignment must follow these formatting requirements:

Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format. Check with your professor for any additional instructions.
Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date. The cover page and the reference page are not included in the required assignment page length.

The specific course learning outcomes associated with this assignment are:

Analyze the cybersecurity metrics and select a framework for government policy.
Discuss cybersecurity strategies and the various frameworks.
Discuss the threats of modern technology in the workplace.
Discuss from a strategic perspective one government’s approach to cybersecurity policy.
Use technology and information resources to research issues in information assurance.
Write clearly and concisely about information assurance topics using proper writing mechanics and technical style conventions.

Click here to view the grading rubric.

By submitting this paper, you agree: (1) that you are submitting your paper to be used and stored as part of the SafeAssign™ services in accordance with the Blackboard Privacy Policy; (2) that your institution may use your paper in accordance with your institution’s policies; and (3) that your use of SafeAssign will be without recourse against Blackboard Inc. and its affiliates.

 
 
“WE’VE HAD A GOOD SUCCESS RATE ON THIS ASSIGNMENT. PLACE THIS ORDER OR A SIMILAR ORDER WITH HOMEWORK AIDER AND GET AN AMAZING DISCOUNT”
The post The purpose of this Capstone Project is for students to examine and solve real world information assurance problems and apply associated techniques to create practical solutions. appeared first on Homeworkaider.


What Students Are Saying About Us

.......... Customer ID: 12*** | Rating: ⭐⭐⭐⭐⭐
"Honestly, I was afraid to send my paper to you, but you proved you are a trustworthy service. My essay was done in less than a day, and I received a brilliant piece. I didn’t even believe it was my essay at first 🙂 Great job, thank you!"

.......... Customer ID: 11***| Rating: ⭐⭐⭐⭐⭐
"This company is the best there is. They saved me so many times, I cannot even keep count. Now I recommend it to all my friends, and none of them have complained about it. The writers here are excellent."


"Order a custom Paper on Similar Assignment at essayfount.com! No Plagiarism! Enjoy 20% Discount!"