WEEKLY PAPER and Final paper
Work on your weekly paper. Use APA guidelines.
Final Project – There is a research paper for this course. We will work on the sections of this paper in our weekly assignments. APA format will be followed for all writing submissions. The topic is based on questions, concerns, or recommendations driven by one of the chapter topics that will be covered in the course. You create the question, then you do the research to support an answer that would add to our body of knowledge on the topic. For this assignment, the student is to select one topic, and then for the next eight weeks write and research about the topic selected. Each week, you will work on the assignment building out the paper. At the end of seven weeks, you will have a research paper which you will submit for the eighth week in a Word Document. Any reference to a text other than the O’Hanley & Tiller Information Security Management Handbook is incorrect. Please see the attachment for text. You must use the Attached Text for the research paper. Any reference to a text other than the attached text is incorrect. This is the sole text for the paper. The chapter topics are in the text attached.
The chapter topics that will be covered in the course are as follows;
TELECOMMUNICATIONS AND NETWORK SECURITY
Securing the Grid
Network Attacks and Countermeasures
INFORMATION SECURITY AND RISK MANAGEMENT
Security in the Cloud
Getting the Best Out of Information Security Projects
Mobility and Its Impact on Enterprise Security
An Introduction to Digital rights Management
Information Security on the Cheap
Organizational Behavior (Including Institutions) Can Cultivate Your Information Security Program
Metrics for Monitoring
Security Implementations of Bring Your Own device, IT Consumerization, and Managing User Choices
Information Assurance: Open Research Questions and Future Directions
Protecting Us from Us: Human Firewall Vulnerability Assessments
APPLICATION DEVELOPMENT SECURITY
Service-Oriented Architecture, Managing the Security Testing Process, Security Resilience in the Software Development Life Cycle
CRYPTOGRAPHY
Cloud Cryptography
SECURITY ARCHITECTURE AND DESIGN
Identity and Access Management Architecture, FedRAMP: Entry or Exit Ramp for Cloud security?
OPERATIONS SECURITY
Data Storage and Network Security
LEGAL, REGULATIONS, COMPLIANCE, AND INVESTIGATIONS
Information Law, National Patient Identifier and patient Privacy in the Digital Era
Addressing Social Media Security and Privacy Challenges, Compliance, PCI Compliance
LEGAL, REGULATIONS, COMPLIANCE, AND INVESTIGATIONS
Investigations, What Is Digital Forensics and What Should You Know about It? eDiscovery
Overview of the Steps of the Electronic Discovery Reference Model, Cell Phone Protocols and Operating Systems, Categories of Computer Crime.
NOTE: After you have selected a topic from the above chapter topics. You follow the weekly instructions below:
Week 1 – Select your topic. Explain why you selected the topic and include a theological statement. (250 – 350 words)
Week 2 – What are the key issues about the topic you selected? (250 – 350 Words)
Week 3 – Compare and contrast your topic as it relates to information security management. (250 – 350 Words)
Week 4 – What information security management technologies can be applied to your topic? (250 – 350 Words)
Week 5 – How can you try to resolve the issues of the topic you selected? (250 – 350 Words)
Week 6 – What is the future of this topic in regard to technology? (250 – 350 Words)
Week 7 – What are future issues to be concerned with about your topic? (250 – 350 Words)
1. Turn-in of final project: Week 8 – Finalize your paper, develop an introduction and conclusion for the paper. Submit your paper (2,000 – 2,500 words). Be sure to address each of the following:
Use APA guidelines.
Check your spelling and grammar
Include at least 14 peer-reviewed sources.
Add narrative transitions where appropriate.
Incorporate what you have learned from the weekly Blackboard discussion questions.
Include a Table of Contents.
Include a References section in the back.
The post Information security management research paper appeared first on Perfect papers hoth.