Identify Specific Information Technology Developi

Identify Specific Information Technology Developi

Imagine
that you are working for a startup technology organization that has had
overnight success. The organization’s immediate growth requires for it
to formulate a corporate strategy for information security. You have
been recruited to serve as part of a team that will develop this
strategy.

As
part of the information security strategy development, you are required
to identify specific information technology security roles that will
optimize and secure the organization’s data assets. Rationalize your
decision.

Once
roles are established, lay out the key the key policy and or
procedures, such as a security strategy, plans and or an assessments
that you would want to have in place or begin the process of
achieving.

Review
the following website titled, “Information Technology (IT) Security
Essential Body of Knowledge (EBK): A Competency and Functional
Frame-work for IT Security Workforce Development,” located at http://www.us-cert.gov/ITSecurityEBK/, for additional information necessary to complete this assignment. This
is not to be your only source, nor is it to be necessarily followed,
your company choice will determine your needs, not the EBK. I suggest
using a small start-up company or business to keep the paper
manageable.

Write a paper no less than five pages, though it may take more depending on the scope of your company.

As
with the first paper, how you approach the essay is unique to you,
there is no template. However, the basic essay format of an
introductory paragraph, drafted or revise after the finished draft to
reflect the final paper, a solid body laying out in good paragraphs the
key points and arguments you need to make, and most importantly, the
lessons you want the reader to learn, and any takeaway you may have, is
expected.

The
conclusion is the reason for most academic and real world papers, and
is never just a single block of text, or single paragraph. I expect
multiple paragraphs for your lessons and takeaway, along with a closing
paragraph. The body and conclusion are mutually supportive.

If
you discuss something in the body, then it must relate to or support
your lessons and takeaway, if you conclude something in the lessons and
takeaway, those must be developed and supported in the body.

  1. Note: Wikipedia
    and similar websites do not qualify as quality resources. You may have
    outside sources from the government, cybersecurity industry, etc. as
    well.

Your assignment must follow these formatting requirements:

  • Be
    typed, double spaced, using Times New Roman font (size 12), with
    one-inch margins on all sides; citations and references must follow SWS
    or school-specific format.
  • Include
    a cover page containing the title of the assignment, the student’s
    name, the professor’s name, the course title, and the date. The cover
    page and the reference page are not included in the required assignment
    page length.

The specific course learning outcomes associated with this assignment are:

-Write
clearly and concisely about topics associated with cybersecurity using
proper writing mechanics and technical style conventions.

Grading
for this assignment will be based on answer quality, logic /
organization of the paper, and language and writing skills. This is only a guideline for ideas, not a mandatory rubric. You choose how to respond to the above essay topic.

The most common problems are: Poor paragraph structure, pronoun usage –don’t use we or you, make sure when using they you have the proper antecedent. That is don’t use they with collective nouns or with he or she, make sure that the plural noun you are referring to was the last plural noun before the pronoun.
Use percent, not %, don’t use headers, don’t use bullets to write the paper, don’t use quotes to write the paper. Use quotes to support ideas.

Thank you.