cis 534 Week 8 Assignment – System Security Monitoring, Patch Management, and Update Policies

Do Not plagiarize or copy info/ source from any student paper. I need 100 original works because my school uses an advance plagiarize checker!! 


Please read the rubric file and answer all the points on the paper! I need an A on this paper, please.

 

 

Week 8 Assignment – System Security Monitoring, Patch Management, and Update Policies 

 

Introduction

In this assignment, you will develop corporate policies for system security monitoring, patch management, and updates that cover both wired and wireless components. A web search will provide multiple examples of policy documents. The following resources may also be helpful as you draft your policy documents:

·       SANS. No date. CIS Critical Security ControlsLinks to an external site.. https://www.sans.org/critical-security-controls/?msc=main-nav

o   This resource provides a list of case studies highlighting how security professionals have made improvements in their security controls.

·       SANS. No date. Security Policy TemplatesLinks to an external site.. https://www.sans.org/information-security-policy/

o   This resource provides a number of security policy templates that might be helpful in drafting your policy documents.

The specific course learning outcome associated with this assignment is:

·       Recommend best practices for monitoring, updating, and patching systems.

Instructions

Write a 6-10 page paper in which you:

·       Establish a system security monitoring policy addressing the need for monitoring, policy scope, and exceptions and supported by specific, credible sources.

o   Justify the need for monitoring.

o   Define the scope of the policy (the personnel, equipment, and processes to which the policy applies).

o   Provide guidelines for policy exceptions, if approved by the IT and Security departments.

·       Establish a system security patch management and updates policy addressing the need for patch management and updates, policy scope, and exceptions and supported by specific, credible sources.

o   Justify the need for patch management and updates, aligned with ISO/IEC 27002.

o   Define the scope of the policy (the personnel, equipment, and processes to which the policy applies).

o   Provide guidelines for policy exceptions, if approved by the IT and Security departments.

·       Support your main points, assertions, arguments, or conclusions with at least four specific and credible academic sources synthesized into a coherent analysis of the evidence.

o   Cite each source listed on your source page at least one time within your assignment.

o   For help with research, writing, and citation, access the library or review library guides.

This course requires the use of Strayer Writing Standards (SWS). The library is your home for SWS assistance, including citations and formatting. Please refer to the Library site for all supports. Check with your professor for any additional instructions.

View Rubric

 

 

Are you struggling with your paper? Let us handle it - WE ARE EXPERTS!

Whatever paper you need - we will help you write it

Get started

Starts at $9 /page

How our paper writing service works

It's very simple!

  • Fill out the order form

    Complete the order form by providing as much information as possible, and then click the submit button.

  • Choose writer

    Select your preferred writer for the project, or let us assign the best writer for you.

  • Add funds

    Allocate funds to your wallet. You can release these funds to the writer incrementally, after each section is completed and meets your expected quality.

  • Ready

    Download the finished work. Review the paper and request free edits if needed. Optionally, rate the writer and leave a review.