{"id":92525,"date":"2022-02-07T22:40:13","date_gmt":"2022-02-07T22:40:13","guid":{"rendered":"https:\/\/papersspot.com\/blog\/2022\/02\/07\/abc-corporation-is-a-small-but-global-organization-of-roughly-200-to\/"},"modified":"2022-02-07T22:40:13","modified_gmt":"2022-02-07T22:40:13","slug":"abc-corporation-is-a-small-but-global-organization-of-roughly-200-to","status":"publish","type":"post","link":"https:\/\/papersspot.com\/blog\/2022\/02\/07\/abc-corporation-is-a-small-but-global-organization-of-roughly-200-to\/","title":{"rendered":"ABC Corporation is a small but global organization of roughly 200 to"},"content":{"rendered":"<p>ABC Corporation is a small but global organization of roughly 200 to 250 employees with work-at-home office spaces around the world using Wide Area Network connectivity via VPNs. The company deals with a lot of financial information to be shared between the offices that require encrypted traffic as well as data-at-rest encryption.<\/p>\n<p> You have been hired to evaluate e ABC Corp.\u2019s network and ensure that the company has the highest levels of security to prevent internal or external attacks. In an 8-to-10-page proposal, address the following items to provide a comprehensive secure environment:<\/p>\n<p> A plan to provide secure access control methods for all user access<\/p>\n<p> A viable password policy, which includes complexity, duration, and history requirements<\/p>\n<p> A method to ensure vital data is encrypted, including recommendations on algorithms<\/p>\n<p> A VPN recommendation for accessing the network remotely in a secure and efficient manner<\/p>\n<p> Your proposal should address all of the elements noted above with support, detail, and elaboration for each section explicitly grounded in knowledge from the assigned readings and media along with any outside sources you may choose to bring into your writing.<\/p>\n<p> There should be a minimum of 5 sources.<\/p>\n<p> ITS350 Mod 8 PP<\/p>\n<p> Criteria<\/p>\n<p> Ratings<\/p>\n<p> Pts<\/p>\n<p> This criterion is linked to a Learning OutcomeRequirements<\/p>\n<p> 30\u00a0to &gt;24.0\u00a0pts<\/p>\n<p> Meets Expectation<\/p>\n<p> The Portfolio includes all of the required components, as specified in the assignment.<\/p>\n<p> 24\u00a0to &gt;18.0\u00a0pts<\/p>\n<p> Approaches Expectation<\/p>\n<p> The Portfolio includes most of the required components, as specified in the assignment.<\/p>\n<p> 18\u00a0to &gt;12.0\u00a0pts<\/p>\n<p> Below Expectation<\/p>\n<p> The Portfolio includes some of the required components, as specified in the assignment.<\/p>\n<p> 12\u00a0to &gt;0\u00a0pts<\/p>\n<p> Limited Evidence<\/p>\n<p> The Portfolio includes few of the required components, as specified in the assignment.<\/p>\n<p> 30\u00a0pts<\/p>\n<p> This criterion is linked to a Learning OutcomeContent<\/p>\n<p> 50\u00a0to &gt;40.0\u00a0pts<\/p>\n<p> Meets Expectation<\/p>\n<p> Demonstrates strong or adequate knowledge of access control methods, password policies, cryptography, remote access planning, and how to protect the network from malware and malicious attacks; correctly represents knowledge from the readings and sources.<\/p>\n<p> 40\u00a0to &gt;30.0\u00a0pts<\/p>\n<p> Approaches Expectation<\/p>\n<p> Some significant but not major errors or omissions in demonstration of knowledge.<\/p>\n<p> 30\u00a0to &gt;20.0\u00a0pts<\/p>\n<p> Below Expectation<\/p>\n<p> Major errors or omissions in demonstration of knowledge.<\/p>\n<p> 20\u00a0to &gt;0\u00a0pts<\/p>\n<p> Limited Evidence<\/p>\n<p> Fails to demonstrate knowledge of the materials.<\/p>\n<p> 50\u00a0pts<\/p>\n<p> This criterion is linked to a Learning OutcomeCritical Thinking<\/p>\n<p> 30\u00a0to &gt;24.0\u00a0pts<\/p>\n<p> Meets Expectation<\/p>\n<p> Demonstrates strong or adequate critical thinking.<\/p>\n<p> 24\u00a0to &gt;18.0\u00a0pts<\/p>\n<p> Approaches Expectation<\/p>\n<p> Some significant but not major errors or omissions in critical thinking.<\/p>\n<p> 18\u00a0to &gt;12.0\u00a0pts<\/p>\n<p> Below Expectation<\/p>\n<p> Major errors or omissions in critical thinking.<\/p>\n<p> 12\u00a0to &gt;0\u00a0pts<\/p>\n<p> Limited Evidence<\/p>\n<p> Fails to demonstrate critical thinking.<\/p>\n<p> 30\u00a0pts<\/p>\n<p> This criterion is linked to a Learning OutcomeSynthesis and Evaluation<\/p>\n<p> 30\u00a0to &gt;24.0\u00a0pts<\/p>\n<p> Meets Expectation<\/p>\n<p> Demonstrates strong or adequate synthesis and evaluation of course concepts in access control methods, password policies, cryptography, remote access planning, and how to protect the network from malware and malicious attacks.<\/p>\n<p> 24\u00a0to &gt;18.0\u00a0pts<\/p>\n<p> Approaches Expectation<\/p>\n<p> Some significant but not major errors or omissions in synthesis and evaluation.<\/p>\n<p> 18\u00a0to &gt;12.0\u00a0pts<\/p>\n<p> Below Expectation<\/p>\n<p> Major errors or omissions in synthesis and evaluation.<\/p>\n<p> 12\u00a0to &gt;0\u00a0pts<\/p>\n<p> Limited Evidence<\/p>\n<p> Fails to demonstrate synthesis and evaluation.<\/p>\n<p> 30\u00a0pts<\/p>\n<p> This criterion is linked to a Learning OutcomeSources<\/p>\n<p> 15\u00a0to &gt;12.0\u00a0pts<\/p>\n<p> Meets Expectation<\/p>\n<p> Cites and integrates at least two credible sources in addition to the textbook.<\/p>\n<p> 12\u00a0to &gt;9.0\u00a0pts<\/p>\n<p> Approaches Expectation<\/p>\n<p> Cites and integrates two credible sources.<\/p>\n<p> 9\u00a0to &gt;6.0\u00a0pts<\/p>\n<p> Below Expectation<\/p>\n<p> Cites and integrates one credible source.<\/p>\n<p> 6\u00a0to &gt;0\u00a0pts<\/p>\n<p> Limited Evidence<\/p>\n<p> Cites and integrates no credible sources.<\/p>\n<p> 15\u00a0pts<\/p>\n<p> This criterion is linked to a Learning OutcomeOrganization<\/p>\n<p> 15\u00a0to &gt;12.0\u00a0pts<\/p>\n<p> Meets Expectation<\/p>\n<p> Project is clearly organized, well written, and in proper format, including an introduction, body, and conclusion. Conforms to project requirements.<\/p>\n<p> 12\u00a0to &gt;9.0\u00a0pts<\/p>\n<p> Approaches Expectation<\/p>\n<p> Small number of significant but not major flaws in organization and writing; follows proper format. In a minor way does not conform to project requirements.<\/p>\n<p> 9\u00a0to &gt;6.0\u00a0pts<\/p>\n<p> Below Expectation<\/p>\n<p> Major problems in organization and writing; does not completely follow proper format. In a significant way does not conform to project requirements.<\/p>\n<p> 6\u00a0to &gt;0\u00a0pts<\/p>\n<p> Limited Evidence<\/p>\n<p> Project is not well organized or well written and does not follow proper format. Does not conform to project requirements.<\/p>\n<p> 15\u00a0pts<\/p>\n<p> This criterion is linked to a Learning OutcomeGrammar and Style<\/p>\n<p> 15\u00a0to &gt;12.0\u00a0pts<\/p>\n<p> Meets Expectation<\/p>\n<p> Strong sentence and paragraph structure; few or no minor errors in grammar and spelling; appropriate writing style; clear and concise with no unsupported comments.<\/p>\n<p> 12\u00a0to &gt;9.0\u00a0pts<\/p>\n<p> Approaches Expectation<\/p>\n<p> Small number of significant but not major errors in grammar and spelling; generally appropriate writing.<\/p>\n<p> 9\u00a0to &gt;6.0\u00a0pts<\/p>\n<p> Below Expectation<\/p>\n<p> Inconsistent to inadequate sentence and paragraph development; work needed on grammar and spelling; does not meet program expectations.<\/p>\n<p> 6\u00a0to &gt;0\u00a0pts<\/p>\n<p> Limited Evidence<\/p>\n<p> Poor quality; unacceptable in terms of grammar and\/or spelling; inappropriate writing style that interferes with clarity.<\/p>\n<p> 15\u00a0pts<\/p>\n<p> This criterion is linked to a Learning OutcomeDemonstrates proper use of APA style<\/p>\n<p> 15\u00a0to &gt;12.0\u00a0pts<\/p>\n<p> Meets Expectation<\/p>\n<p> Project contains proper APA formatting, according to the CSU Global resources on APA citation style, with no more than one significant error.<\/p>\n<p> 12\u00a0to &gt;9.0\u00a0pts<\/p>\n<p> Approaches Expectation<\/p>\n<p> Few errors in APA formatting, according to the CSU Global resources on APA citation style, with no more than two to three significant errors.<\/p>\n<p> 9\u00a0to &gt;6.0\u00a0pts<\/p>\n<p> Below Expectation<\/p>\n<p> Significant errors in APA formatting, according to the CSU Global resources on APA citation style, with four to five significant errors.<\/p>\n<p> 6\u00a0to &gt;0\u00a0pts<\/p>\n<p> Limited Evidence<\/p>\n<p> Numerous errors in APA formatting, according to the CSU Global resources on APA citation style, with more than five significant errors.<\/p>\n<p> 15\u00a0pts<\/p>\n<p> Total Points:\u00a0200<\/p>\n<p> ITS350 Mod 8 PP<\/p>\n","protected":false},"excerpt":{"rendered":"<p>ABC Corporation is a small but global organization of roughly 200 to 250 employees with work-at-home office spaces around the world using Wide Area Network connectivity via VPNs. The company deals with a lot of financial information to be shared between the offices that require encrypted traffic as well as data-at-rest encryption. You have been [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[1],"tags":[10],"class_list":["post-92525","post","type-post","status-publish","format-standard","hentry","category-research-paper-writing","tag-writing"],"_links":{"self":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts\/92525","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/comments?post=92525"}],"version-history":[{"count":0,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/posts\/92525\/revisions"}],"wp:attachment":[{"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/media?parent=92525"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/categories?post=92525"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/papersspot.com\/blog\/wp-json\/wp\/v2\/tags?post=92525"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}