Utilizing the attached Project Requirements, Template and Se.
Utilizing the attached Project Requirements, Template and Security Baseline Document. I need a minimum 6 pages to meet the requirements of the rubric below. System Security PlanExcellentOutstandingAcceptableNeeds ImprovementNeeds Significant ImprovementMissing or UnacceptableSections 1 8 (System Identification)10 pointsSections 1 8 present a thorough and complete identification of the system (Field Office General IT Support), the responsible individuals, and the system status. Key personnel (Section 5) roster contains three or more appropriate designated officials.8.5 pointsSections 1 8 identify the system (Field Office General IT Support), the responsible individuals, and the system status. Information was adapted from the Case Study. Key personnel (Section 5) roster contains at least two appropriate designated officials.7 pointsSections 1 8 were completed using information from the Case Study. Key personnel (Section 5) roster contains at least one appropriate designated official.6 pointsEntered information for 6 or more sections. Information was incomplete or incorrect.4 pointsCompleted less than 50% of the required information for sections 1-8. (Or, inappropriate or excessive copying from other authors work.)0 pointsInsufficient, missing, or no work submitted.Section 9: System Description / Purpose10 pointsProvided an excellent description of the Field Office General IT Support System. Integrated case study information to describe the business operations supported by the hardware, software, and networks which comprise the General IT Support system. Included information about the types and sensitivity of information processed by this system. Described the smart home and Internet of Things capabilities which are supported by the field office IT systems.8.5 pointsProvided an outstanding description of the Field Office General IT Support System. Integrated case study information to describe the business operations including mention of the types and sensitivity of information processed by this system. Mentioned the smart home and Internet of Things capabilities which are supported by the field office IT systems.7 pointsProvided an acceptable description of the Field Office General IT Support System. Integrated case study information to describe the business operations, mentioned the types of information processed, and the smart home / Internet of Things capabilities incorporated into the field offices.6 pointsDescribed the field office business operations supported by the Field Office General IT Support System. The description lacked details.4 pointsAttempted to describe a General IT Support System. Did not integrate information from the case study. (Or, inappropriate or excessive copying from other authors work.)0 pointsInsufficient, missing, or no work submitted.Section 10: System Environment10 pointsProvided an excellent description of the enterprise architecture for the Field Office General IT Support System. Integrated case study information to clearly and accurately describe the hardware, software, and networks which comprise the General IT Support system. Included information about the devices and controllers used for the smart home and Internet of Things capabilities which are used by the field office.8.5 pointsProvided an outstanding description of the enterprise architecture for the Field Office General IT Support System. Integrated case study information to describe the hardware, software, and networks which comprise the General IT Support system. Included information about the devices and controllers used for the smart home and Internet of Things capabilities which are used by the field office.7 pointsProvided an acceptable description of the Field Office General IT Support System. Integrated case study information to describe the business operations, mentioned the types of information processed, and the smart home / Internet of Things capabilities incorporated into the field offices.6 pointsDescribed the field office business operations supported by the Field Office General IT Support System. The description lacked details.4 pointsAttempted to describe a General IT Support System. Did not integrate information from the case study. (Or, inappropriate or excessive copying from other authors work.)0 pointsInsufficient, missing, or no work submitted.Section 11: System Interconnections / Information Sharing10 pointsUsed information from the case study to identify (name) 5 or more interconnected systems and networks (including the LAN/WAN network connections between the field office and the operations center). Provided an excellent description for each that included the types and sensitivity levels of information transmitted over the connection (e.g. company proprietary information, customer information, public Internet information). Named the owning organization and responsible ISSO.8.5 pointsUsed information from the case study to identify (name) 4 or more interconnected systems and networks (including the LAN/WAN network connections between the field office and the operations center). Provided an outstanding description for each that included the types and sensitivity levels of information transmitted over the connection (e.g. company proprietary information, customer information, public Internet information). Named the owning organization and responsible ISSO.7 pointsUsed information from the case study to identify (name) 3 or more interconnected systems and networks (including the LAN/WAN network connections between the field office and the operations center). Provided an acceptable description for each. Named the owning organization.6 pointsSection identified interconnected systems including the LAN / WAN network connections. Provided some information about the systems and networks.4 pointsSection named LAN / WAN network connections but provided no other information. (Or, inappropriate or excessive copying from other authors work.)0 pointsInsufficient, missing, or no work submitted.Section 12: Related Laws / Regulations / Policies10 pointsProvided an excellent overview of laws, regulations, and policies which establish specific requirements for the confidentiality, integrity, and availability of the data collected, processed, and/or stored in the Field Office General IT Support System. Named and described the applicability of 5 or more federal or state laws and regulations. Identified and described at least one internal policy which applies to the use of this system.8.5 pointsProvided an outstanding overview of laws, regulations, and policies which establish specific requirements for the confidentiality, integrity, and availability of the data collected, processed, and/or stored in the Field Office General IT Support System. Named and described the applicability of 4 or more federal or state laws and regulations. Identified and described at least one internal policy which applies to the use of this system.7 pointsProvided an acceptable list of laws, regulations, and policies which establish specific requirements for the confidentiality, integrity, and availability of the data collected, processed, and/or stored in the Field Office General IT Support System. Named and described the applicability of 3 or more federal or state laws and regulations. Identified and described at least one internal policy which applies to the use of this system.6 pointsNamed and described at least three legal (laws), regulatory (regulations or rules ), and/or policy sources for security requirements which apply to the Field Office IT General Support System.4 pointsNamed at least two laws, regulations, and/or policies as sources of security requirements for the Field Office IT General Support System. (Or, inappropriate or excessive copying from other authors work.)0 pointsInsufficient, missing, or no work submitted.Section 13: Introduction for Minimum Security Controls5 pointsProvided an excellent introduction for Section 13: Minimum Security Controls. Discussed the differences between management, operational, and technical categories of security controls. Used information from the case study and NIST SP 800-53.4 pointsProvided an outstanding introduction for Section 13: Minimum security controls. Discussed the use of management, operational, and technical categories of security controls. Used information from the case study and NIST SP 800-53.3 pointsProvided an acceptable introduction for Section 13: Minimum Security Controls. Mentioned the three categories (management, operational, technical). Used information from the case study and NIST SP 800-53.2 pointsProvided an introduction for Section 13: Minimum Security Controls. Introduction used information from the case study but lacked important details.1 pointProvided an introduction for section 13. Did not customize the introduction for the case study. (Or, inappropriate or excessive copying from other authors work.)0 pointsInsufficient, missing, or no work submitted.Section 13 (a) Minimum Security Controls: Management Controls Category10 pointsUsed the provided security controls baseline for the case study company. Named and described each of the required control families (e.g. CA) listed under the management controls category (in the baseline) using information from NIST SP 800-53. For each family listed in the baseline under this category, identified (listed) the specific controls (e.g. CA-1) and provided a excellent description of how the controls in each family work together to mitigate threats and vulnerabilities.8.5 pointsUsed the provided security controls baseline for the case study company. Named and described each of the required control families (e.g. CA) listed under the management controls category (in the baseline) using information from NIST SP 800-53. For each family listed in the baseline under this category, identified (listed) the specific controls (e.g. CA-1) and provided an outstanding description of how the controls in each family work together to mitigate threats and vulnerabilities.7 pointsUsed the provided security controls baseline for the case study company. Named and described each of the required control families (e.g. CA) listed under the management controls category (in the baseline) using information from NIST SP 800-53. Provided a brief description of how the controls in each family work together to mitigate threats and vulnerabilities.6 pointsListed and described three or more management controls (from NIST SP 800-53) which should be implemented for the Field Office IT General Support System.4 pointsListed and described one or more management controls (from NIST SP 800-53) which should be implemented for the Field Office IT General Support System.0 pointsInsufficient, missing, or no work submitted.Section 13 (b) Minimum Security Controls: Operational Controls Category10 pointsUsed the provided security controls baseline for the case study company. Named and described each of the required control families (e.g. AT) listed under the operational controls category (in the baseline) using information from NIST SP 800-53. For each family listed in the baseline under this category, identified (listed) the specific controls (e.g. AT-1) and provided a excellent description of how the controls in each family work together to mitigate threats and vulnerabilities.8.5 pointsUsed the provided security controls baseline for the case study company. Named and described each of the required control families (e.g. AT) listed under the operational controls category (in the baseline) using information from NIST SP 800-53. For each family listed in the baseline under this category, identified (listed) the specific controls (e.g. AT-1) and provided an outstanding description of how the controls in each family work together to mitigate threats and vulnerabilities.7 pointsUsed the provided security controls baseline for the case study company. Named and described each of the required control families (e.g. AT) listed under the operational controls category (in the baseline) using information from NIST SP 800-53. Provided a brief description of how the controls in each family work together to mitigate threats and vulnerabilities.6 pointsListed and described three or more operational controls (from NIST SP 800-53) which should be implemented for the Field Office IT General Support System.4 pointsListed and described one or more operational controls (from NIST SP 800-53) which should be implemented for the Field Office IT General Support System. (Or, inappropriate or excessive copying from other authors work.)0 pointsInsufficient, missing, or no work submitted.Section 13 (c) Minimum Security Controls: Technical Controls Category10 pointsUsed the provided security controls baseline for the case study company. Named and described each of the required control families (e.g. AC) listed under the technical controls category (in the baseline) using information from NIST SP 800-53. For each family listed in the baseline under this category, identified (listed) the specific controls (e.g. AC-1) and provided a excellent description of how the controls in each family work together to mitigate threats and vulnerabilities.8.5 pointsUsed the provided security controls baseline for the case study company. Named and described each of the required control families (e.g. AC) listed under the technical controls category (in the baseline) using information from NIST SP 800-53. For each family listed in the baseline under this category, identified (listed) the specific controls (e.g. AC-1) and provided an outstanding description of how the controls in each family work together to mitigate threats and vulnerabilities.7 pointsUsed the provided security controls baseline for the case study company. Named and described each of the required control families (e.g. AC) listed under the technical controls category (in the baseline) using information from NIST SP 800-53. Provided a brief description of how the controls in each family work together to mitigate threats and vulnerabilities.6 pointsListed and described three or more technical controls (from NIST SP 800-53) which should be implemented for the Field Office IT General Support System.4 pointsListed and described one or more technical controls (from NIST SP 800-53) which should be implemented for the Field Office IT General Support System. (Or, inappropriate or excessive copying from other authors work.)0 pointsInsufficient, missing, or no work submitted.Sections 14-15: Completion & Approval Dates5 pointsIncluded both sections from the template file (14 & 15) and entered the completion date for the plan.3 pointsIncluded section 14 from the template file and entered a completion date for the plan.0 pointsN/A0 pointsN/A0 pointsN/A0 pointsInsufficient, missing, or no work submitted.ProfessionalismExcellentOutstandingAcceptableNeeds ImprovementNeeds Significant ImprovementMissing or UnacceptableExecution10 pointsWork is professional in appearance and organization (appropriate and consistent use of fonts, headings, color). No word usage, grammar, spelling, or punctuation errors. All quotations (copied text) are properly marked and cited using a professional format (APA format recommended but not required.)8.5 pointsWork is professional in appearance and organization (appropriate and consistent use of fonts, headings, color). Work contains minor errors in word usage,grammar, spelling or punctuation which do not significantly impact professional appearance. All quotations (copied text) are properly marked and cited using a professional format (APA format recommended but not required.)7 pointsWork is professional in appearance and organization (minor issues allowable but overall the work contains appropriate and consistent use of fonts, headings, color). Errors in word usage, spelling, grammar, or punctuation which detract from professional appearance of the submitted work. All quotations (copied text) are properly marked and cited using a professional format (APA format recommended but not required.)6 pointsSubmitted work has numerous errors in formatting, organization, word usage, spelling, grammar, or punctuation which detract from readability and professional appearance. Punctuation errors may include failure to properly mark quoted or copied material (an attempt to name original source is required).4 pointsSubmitted work is difficult to read / understand and has significant errors in formatting, appearance / organization, spelling, grammar, punctuation, or word usage. Significant errors in presentation of copied text (lacks proper punctuation and failed to attribute material to original source).0 pointsNo work submitted. OR, work contains significant instances of cut-and-paste without proper citing / attribution to the original work or author.Overall ScoreExcellent90 or moreOutstanding80 or moreAcceptable70 or moreNeeds Improvement56 or moreNeeds Significant Improvement36 or moreMissing or Unacceptable Work0 or more
Utilizing the attached Project Requirements, Template and Se
Why Work with Us
Top Quality and Well-Researched Papers
We always make sure that writers follow all your instructions precisely. You can choose your academic level: high school, college/university or professional, and we will assign a writer who has a respective degree.
Professional and Experienced Academic Writers
We have a team of professional writers with experience in academic and business writing. Many are native speakers and able to perform any task for which you need help.
Free Unlimited Revisions
If you think we missed something, send your order for a free revision. You have 10 days to submit the order for review after you have received the final document. You can do this yourself after logging into your personal account or by contacting our support.
Prompt Delivery and 100% Money-Back-Guarantee
All papers are always delivered on time. In case we need more time to master your paper, we may contact you regarding the deadline extension. In case you cannot provide us with more time, a 100% refund is guaranteed.
Original & Confidential
We use several writing tools checks to ensure that all documents you receive are free from plagiarism. Our editors carefully review all quotations in the text. We also promise maximum confidentiality in all of our services.
24/7 Customer Support
Our support agents are available 24 hours a day 7 days a week and committed to providing you with the best customer experience. Get in touch whenever you need any assistance.
Try it now!
How it works?
Follow these simple steps to get your paper done
Place your order
Fill in the order form and provide all details of your assignment.
Proceed with the payment
Choose the payment system that suits you most.
Receive the final file
Once your paper is ready, we will email it to you.
Our Services
No need to work on your paper at night. Sleep tight, we will cover your back. We offer all kinds of writing services.
Essays
No matter what kind of academic paper you need and how urgent you need it, you are welcome to choose your academic level and the type of your paper at an affordable price. We take care of all your paper needs and give a 24/7 customer care support system.
Admissions
Admission Essays & Business Writing Help
An admission essay is an essay or other written statement by a candidate, often a potential student enrolling in a college, university, or graduate school. You can be rest assurred that through our service we will write the best admission essay for you.
Reviews
Editing Support
Our academic writers and editors make the necessary changes to your paper so that it is polished. We also format your document by correctly quoting the sources and creating reference lists in the formats APA, Harvard, MLA, Chicago / Turabian.
Reviews
Revision Support
If you think your paper could be improved, you can request a review. In this case, your paper will be checked by the writer or assigned to an editor. You can use this option as many times as you see fit. This is free because we want you to be completely satisfied with the service offered.