Free Essay

Project Part 5

In:

Submitted By bsamms
Words 2042
Pages 9
Security Proposal
Information security policies and procedures are the cornerstone of any information security program - and they are among the items that typically receive the greatest scrutiny from examiners and regulators. But beyond satisfying examiners, clear and practical policies and procedures define an organization's expectations for security and how to meet those expectations. With a good set of policies and procedures, employees, customers, partners and vendors all know where you stand and where they fit in the information security scheme. The key to creating effective policies and procedures is to start with a solid risk assessment, and then follow a measured program that includes implementation, monitoring, testing, and reporting.
Planning, implementing and monitoring security policies and procedures may vary from one network to the other, including different levels of security in LANs and WANs. There are logical and physical means to secure networks, and now we must pay special attention to securing the Internet, for instance web browsing and email. I have included a network access, procedure and policy proposal below:
ABC Company
Policy
Section of Corporate Security Policies | Target audience ABC Company |
Confidential | Page 1-5 |
ABC Company
Policy: Network Access and Authentication Policy Created: 8/15/2014
Section of: Corporate Security Policies Target Audience: CONFIDENTIAL Page: 1 of 5
ABC Company is now referred to as “the company.”
1.0 Overview
Consistent standards for network access and authentication are critical to the company’s information security and are often required by regulations or third-party agreements. Any user accessing the company’s computer systems has the ability to affect the security of all users of the network. An appropriate Network Access and
Authentication Policy reduces risk of a security incident by requiring consistent application of authentication and access standards across the network.
2.0 Purpose
The purpose of this policy is to describe what steps must be taken to ensure that users connecting to the corporate network are authenticated in an appropriate manner, in compliance with company standards, and are given the least amount of access required to perform their job function. This policy specifies what constitutes appropriate use of network accounts and authentication standards.
3.0 Scope
The scope of this policy includes all users who have access to company-owned or company-provided computers or require access to the corporate network and/or systems. This policy applies not only to employees, but also to guests, contractors, and anyone requiring access to the corporate network. Public access to the company’s
Externally reachable systems, such as its corporate website or public web applications, are specifically excluded from this policy.
4.0 Policy
4.1 Account Setup
During initial account setup, certain checks must be performed in order to ensure the integrity of the process.
The following policies apply to account setup:
* Positive ID and coordination with Human Resources is required.
* Users will be granted least amount of network access required to perform his or her job function.
* Users will be granted access only if he or she accepts the Acceptable Use Policy.
Policy: Network Access and Authentication Policy
Section of: Corporate Security Policies Target Audience: ABC Company
CONFIDENTIAL Page: 2 of 5
* Access to the network will be granted in accordance with the Acceptable Use Policy.
4.2 Account Use
Network accounts must be implemented in a standard fashion and utilized consistently across the organization. The following policies apply to account use:
* Accounts must be created using a standard format (i.e., first-name last-named, or first initial last name, etc.)
* Accounts must be password protected (refer to the Password Policy for more detailed information).
* Accounts must be for individuals only. Account sharing and group accounts are not permitted.
* User accounts must not be given administrator or ’root’ access unless this is necessary to perform his or her job function.
* Occasionally guests will have a legitimate business need for access to the corporate network. When a reasonable need is demonstrated, temporary guest access is allowed. This access, however, must be severely restricted to only those resources that the guest needs at that time, and disabled when the guest’s work is completed.
* Individuals requiring access to confidential data must have an individual, distinct account. This account may be subject to additional monitoring or auditing at the discretion of the IT Manager or executive team, or as required by applicable regulations or third-party agreements.
4.3 Account Termination
When managing network and user accounts, it is important to stay in communication with the Human Resources department so that when an employee no longer works at the company, that employee’s account can be disabled. Human Resources must create a process to notify the IT Manager in the event of a staffing change, which includes employment termination, employment suspension, or a change of job function (promotion, demotion, suspension, etc.).
4.4 Authentication
User machines must be configured to request authentication against the domain at startup. If the domain is not available or authentication for some reason cannot occur, then the machine should not be permitted to access the network.
4.5 Use of Passwords
When accessing the network locally, username and password is an acceptable means of authentication. Usernames must be consistent with the requirements set forth in this document, and passwords must conform to the company’s Password Policy.
ABC Company
Policy: Network Access and Authentication Policy Created: 8/15/2014
Section of: Corporate Security Policies Target Audience: Technical
CONFIDENTIAL Page: 3 of 5
4.6 Remote Network Access
Remote access to the network can be provided for convenience to users but this comes at some risk to security. For that reason, the company encourages additional scrutiny of users remotely accessing the network. The company’s standards dictate that username and password is an acceptable means of authentication as long as appropriate policies are followed. Remote access must adhere to the Remote Access Policy.
4.7 Inactive Passwords
Inactive passwords offer an easy way to strengthen security by removing the opportunity for a malicious user, curious employee, or intruder to access network resources through an idle computer. For this reason inactive passwords are required to be activated after 5 minutes of inactivity. It will also ask you to press cltr + alt + delete to unlock the computer. Will we enforce this via group policy. “Security settings incorporated into policies are rules that administrators configure on a computer or multiple computers for the purpose of protecting resources on a computer or network” (Security Policy Settings Overview. (2012, August 8). Retrieved August 15, 2015.)
4.8 Minimum Configuration for Access
Any system connecting to the network can have a serious impact on the security of the entire network. Vulnerability, virus, or other malware may be inadvertently introduced in this manner. For this reason, users must strictly adhere to corporate standards with regard to antivirus software and patch levels on their machines. Users must not be permitted network access if these standards are not met. This policy will be enforced with product that provides network admission control.
4.9 Encryption
Industry best practices state that username and password combinations must never be sent as plain text. If this information were intercepted, it could result in a serious security incident. Therefore, authentication credentials must be encrypted during transmission across any network, whether the transmission occurs internal to the company network or across a public network such as the Internet. Also any user that has a laptop should be encrypted with some sort of encryption software.
4.10 Failed Logons
Repeated logon failures can indicate an attempt to ’crack’ a password and surreptitiously access a network account. In order to guard against password guessing and brute-force attempts, the company must lock a user’s account after 3 unsuccessful logins. This can be implemented as a time-based lockout or require a manual reset at the discretion of the IT Manager. In order to protect against account guessing, when logon failures occur the error message transmitted to the user must not indicate specifically whether the account name or password were incorrect. The error can be as simple as “the username and/or password you supplied were incorrect.”
ABC Company
Policy: Network Access and Authentication Policy
Section of: Corporate Security Policies Target Audience: Technical
CONFIDENTIAL Page: 4 of 5
4.11 Non-Business Hours
While some security can be gained by removing account access capabilities during non-business hours, the company does not mandate time-of-day lockouts. This may be either to encourage working remotely, or because the company’s business requires all-hours access. Not many companies do this as they have many employees that work from home.
4.12 Applicability of Other Policies
This document is part of the company’s cohesive set of security policies. Other policies may apply to the topics covered in this document and as such the applicable policies should be reviewed as needed.
5.0 Enforcement
The IT Manager and/or Executive Team will enforce this policy. Violations may result in disciplinary action, which may include suspension, restriction of access, or more severe penalties up to and including termination of employment. Where illegal activities or theft of company property (physical or intellectual) are suspected, the company may report such activities to the applicable authorities.
6.0 Definitions
Antivirus Software An application used to protect a computer from viruses, typically through real time defenses and periodic scanning. Antivirus software has evolved to cover other threats, including Trojans, spyware, and other malware. Authentication a security method used to verify the identity of a user and authorize access to a system or network. Biometrics is the process of using a person’s unique physical characteristics to prove that person’s identity. Commonly used are fingerprints, retinal patterns, and hand geometry. Encryption is the process of encoding data with an algorithm so that it is unintelligible without the key. Used to protect data during transmission or while stored. Password is a sequence of characters that is used to authenticate a user to a file, computer, or network, also known as a passphrase or passcode. “A smart card is a device that includes an embedded integrated circuit that can be either a secure microcontroller or equivalent intelligence with internal memory or a memory chip alone. The card connects to a reader with direct physical contact or with a remote contactless radio frequency interface. With an embedded microcontroller, smart cards have the unique ability to store large amounts of data, carry out their own on-card functions (e.g., encryption and mutual authentication) and interact intelligently with a smart card reader. Smart card technology conforms to international standards (ISO/IEC 7816 and ISO/IEC 14443) and is available in a variety of form factors, including plastic cards, key fobs, watches, subscriber identification modules used in GSM mobile phones, and USB-based tokens.” (Smart Card Alliance. (n.d.). Retrieved August 15, 2015.)

ABC Company
Policy: Network Access and Authentication Policy Created: 8/15/2014
Section of: Corporate Security Policies Target Audience: Technical
CONFIDENTIAL
A good security scheme will include a policy and procedure proposal, a Business Continuity Plan (BCP), it will also include the securing of our systems, machines, equipment, and devices connected to the Internet. This presents new network security challenges, as the growing number and variety of connected devices increases the number of potential cyber threats. Securing ABC Company cannot be successful without integrated security for both the physical and network infrastructure.
Barracuda Load Balancer (SSL, HTTP, caching, Application Attack and DDoS Protection. If the Barracuda Load Balancer ADC detects issues, it automatically removes downed servers from the server pool and rebalances traffic among the remaining servers. It has the ability to group servers in the application groups so that if a server in a group fails, it can automatically failover all traffic to the remaining application groups.
Global Server Load Balancing
For scalability and high availability across data centers, Barracuda Load Balancer ADCs can be deployed to balance traffic among different sites in different geographic regions. Organizations can route traffic using a variety of methods such as primary disaster recovery (DR) or closest geographical data center. (Barracuda, 2014-2003)

References
Barracuda, C. (2014-2003). Barracuda Load Balancer. Retrieved from BarracudaNetworks: https://www.barracuda.com/products/loadbalancer/features http://www.smartcardalliance.org/smart-cards-faq/ https://technet.microsoft.com/en-us/library/Hh831424.aspx

Similar Documents

Free Essay

Ge273 Project Part 5

...I have research and analysis for Voter Victor need. My findings are as follows. This is how America economy was born; the fledgling thirteen colonies established their independence on ingenuity, the frontier, and support from France and her allies. That is how the United States and her national debt were born, and both have expanded seemingly without limits. However, in the years leading up to America independence there were serious questions about the unsustainability of America’s economic practices developed. Once the world’s leading economic superpower, in the twentieth century America assumed the role of financial capital of the world. As America’s trade deficit continues to increase, much of America’s massive debt is now controlled by China, and a transfer of power seems to be in progress. But even amidst recession, the model of the American Dream is still clinging to life. Whether America and her dream can emerge unscathed in the coming years remain to be seen. It is a complex economic question, and one that cannot be untangled from the global economy. (Conte) phrases What makes America a mixed economy is the economic system in which both the state and private sector direct the economy. Most mixed economies can be described as market economies with strong regulatory oversight, and many mixed economies feature a variety of government-run enterprises and governmental provision of goods. In my opinion because America has several levels of social and economic standing...

Words: 634 - Pages: 3

Premium Essay

Hcs 440 Week 5 Learning Team Health Care Reform Project Part Iii

...This paperwork contains HCS 440 Week 4 Individual - Economic Issues Simulation Paper General Questions - General General Questions Review the Health Care Economics Issues HMO Simulation exercise posted on your student web page. Follow the Wk 4 WEB LINK “Understanding Economic Issues for HMO’s”. This exercise is for your learning experience only. Do not post any screen short from the exercise as part of your assignment. Economic Issues Simulation Paper Prepare a 1,050- to ,1400 paper in which you present a profile of each company including the demographics of the employees, the health care risk factors (potential areas of high utilization), and the premiums the company is willing to pay. Apply each plan, Castor Standard and Castor Enhanced to each company, Constructit and E-editor, to determine which plan best meets the healthcare needs of the employees – ignore Dearden. As a representative of Castor insurance, your job is to maximize profit and minimize risk for the company. Based on your analysis of potential utilization, give at least two reasons why each plan could be selected for each company. Then select one of the two companies and state which plan you would select to sell to that company? What are the reasons for this decision? Why did you not select the other plan offered? Your paper should be organized so that each question serves as a subheading followed by the discussion, i.e. Two Reasons Why Each Plan Could Be Selected, Which...

Words: 374 - Pages: 2

Premium Essay

Project Management

...AMPM600 Project Management Assignment 2, Microsoft Project 2013 2015, Semester Two Due Date: 13 Nov 2015 Instructions: On the following page Student name/number ………………………………….……………………… SEMESTER 2, 2015 Individual Assignment AMPM600 Introduction to Project Management This individual assignment is a computer project derived from the POM+ Project exercises of the textbook Project Management the Managerial Process. DUE DATE: See course outline for due dates throughout the semester. INSTRUCTIONS:         This assignment must be completed individually, using MS Project 2010 or 2013 and MS Word. Answer ALL questions. All written work must be typed in 12 font, 1.5 line spacing and meet business standards. All PDF Reports must include your student ID in the footer. You may request feedback from your lecturer to verify the accuracy of your project files. However, you must be specific in your requests and any request must be in relation to the usage of Microsoft Project. You must upload your project files to Moodle, see your course outline for due dates. That is 1 MS Project file and 1 Word file for each part and PDF’s as required. All assignment work must be your own. You must save your project file after each part with the file name containing your Student ID, Last Name, First Name, Project Name, Assignment Part. E.G. 1234567_Rob Meadows_POM+Project_Part1.mmp  Refer to the Course Outline for the assignment submission schedules...

Words: 2401 - Pages: 10

Premium Essay

Hrm 599 Course Project: Benefit Plan Design Analysis

...HRM 599 Course Project: Benefit Plan Design Analysis Purchase here http://devrycourse.com/hrm-599-course-project-benefit-plan-design-analysis Product Description Course Project: Benefit Plan Design Analysis Objective - The course project is designed to provide you with a real-life practical application of an organization’s Human Resource benefits program. You will create a written analysis of a real-world organization’s benefit plan design with suggested opportunities for improvement that use the concepts and knowledge introduced in this course. The below 8 parts need to be completed Part 1: Select and profile an organization for the benefit plan (40 Points) Part 2: Statement of the issue (40 Points) Part 3: Literature Review (40 Points) Part 4. Issue Analysis (40 Points) Part 5. Issue Solutions (40 Points) Part 6. Solution and its Implementation (40 Points) Part 7: Justification (40 Points) Part 8: Reflection (30 Points) HRM 599 Course Project: Benefit Plan Design Analysis Purchase here http://devrycourse.com/hrm-599-course-project-benefit-plan-design-analysis Product Description Course Project: Benefit Plan Design Analysis Objective - The course project is designed to provide you with a real-life practical application of an organization’s Human Resource benefits program. You will create a written analysis of a real-world organization’s benefit plan design with suggested opportunities for improvement that use the concepts and knowledge...

Words: 1016 - Pages: 5

Premium Essay

Martial Arts Academy

...Conceptualizing and Initializing the IT Project Chapter 2 2-2 Copyright 2012 John Wiley & Sons, Inc. Strategic Planning Process and Project Alignment   Strategic Analysis Guiding Principles   Vision Mission Statement   Strategic Objectives Flow-down Objectives Strategic Analysis    Analysis of internal and external environments SWOT Analysis (Strengths, Weaknesses, Opportunities, and Threats) Elements within the project team’s control  What strengths and weaknesses the organization possesses in itself  Elements over which the project team has little/no control  What opportunities and threats are posed by competitors, suppliers, customers, regulatory agencies, technologies Guiding Principles  The vision describes the organization of the future    “vivid description of a preferred future” Require extra effort to be achieved Often multiyear goals that end in suggesting the need for a new vision  The mission statement provides a mechanism for achieving the vision  “organization’s core purpose, core values”, beliefs, culture, primary business, primary customers Mission Statement Considerations       Purpose – communicates why an organization exists Beliefs – what the leaders of an organization stand for Core values – how decisions will be made and how people will be treated Culture – how members should act Primary business areas – what business the organization engages in Primary customers...

Words: 3715 - Pages: 15

Premium Essay

Part 1

...Introduction The Course Project is an opportunity for you to apply concepts learned to a real-life simulation experience. Throughout the Course Project, you will assume that you work as a financial analyst for AirJet Best Parts, Inc. The Course Project is provided in two parts as follows: Part I – In Part I, you work with AirJet Best Parts, Inc. staff to identify the best loan options, as well as to valuate stocks and bonds. Part II – In Part II, you will provide the company with a recommendation for purchasing a new machine. You will base your recommendation on the Net Present Value (NPV) of the capital investment project using the cost of capital (WACC) as your discount rate. About AirJet Best Parts, Inc. AirJet Best Parts, Inc. is a company dedicated to the design and manufacturing of aviation and airplane technologies and parts. The company has commercial and military clients worldwide. Task 1: Assessing loan options for AirJet Best Parts, Inc. The company needs to finance $8,000,000 for a new factory in Mexico. The funds will be obtained through a commercial loan and by issuing corporate bonds. Here is some of the information regarding the APRs offered by two well-known commercial banks. Bank | APR | Number of Times Compounded | National First | Prime Rate + 6.75% | Semiannually | Regions Best | 13.17 | Monthly | 1. Assuming that AirJet Parts, Inc. is considering loans from National First and Regions Best, what are the EARs for these two banks...

Words: 2010 - Pages: 9

Premium Essay

Mcgee Carpet and Trim

...take. This paper will discuss project management, implementing change, and evaluating the techniques of the firm’s goals. McGee Carpet and Trim McGee Carpet and Trim is a business that installs carpet into commercial businesses. Several of their recent jobs have taken longer than expected and Andrea McGee is concerned with her unreliable employees. Andrea would like to find out if her employees are working hard or not. The steps to take in finding out is first get the optimistic, pessimistic, and most likely times of each activity. Program Evaluation and Review Technique (PERT) is a technique that estimates the amount of time an activity with take based on its optimistic, pessimistic, and mostly likely times when it is uncertain of the individual activity estimates. The PERT formula is tE = (tO + 4tM + tP) /6. The Expected activity duration (tE) equals the Optimistic activity duration (tO) plus four times the Most likely activity duration (tM) plus the Pessimistic activity duration (tP) divided by six (A Guide, 2008). Activities OT MT PT PERT 1 4 6 14 7 2 5 12 16 11.5 3 7 15 23 15 4 13 16 28 17.5 5 17 20 35 22 6 20 32 50 33 7 5 6 13 7 The work is not likely to be finished in 40 days because part two can only be done after part one is done and part seven can only be done after parts three, four, and five are done, therefore parts one, two, and seven can be added and make those parts of the project 47 days in total. Project Management is applying the tools...

Words: 874 - Pages: 4

Free Essay

It Decision Paper

...Rusty Rims IT Decision Paper Assignment Before you begin this assignment, be sure you have read the “Rusty Rims Wheels Case Study,” any feedback on your proposed IT project from your ITSP Part 2 assignment, and the previously assigned chapters in the textbook. Purpose of this Assignment This assignment gives you the opportunity to apply the course concepts to develop an IT Decision Paper to explain and defend an IT project at Rusty Rims Distribution Company (RR). This assignment specifically addresses the following course outcomes to enable you to:  Apply best practices in information technology management and governance to make, defend, and justify an IT decision. IT Decision Paper for Your Proposed IT Project For your ITSP, Part 2, you proposed an IT project for RR. Carol, the CIO at RR, has asked you to write an IT Decision Paper to explain your proposed project. She wants to use the Paper to gain approval from the Governance Board to move forward with the project. This assignment uses a format for a Decision Paper that has been tailored to the course material covered in this class. You may work for an organization that has a format for IT decision papers, and it would be a good idea for you to take a look at it, but it will likely be structured a little differently from this one. Each organization develops tools and techniques that will work for them. Assignment You will develop an IT Decision Paper, using the outline below. Each of the topics to be...

Words: 3201 - Pages: 13

Premium Essay

Target Corporation

...Company Overview In the first part of our analysis, we give a brief introduction about Target Corporation and its main competitors, Costco and Wal-Mart, so that we can set some decision rules to allocate the resources. Target Corporation Brand Strategy Target Corporation has a very strong brand, and their logo is recognized by more than 97% of the United States population. One of Target’s strength is that the corporation has more than 1,750 stores in the United States, and it has store in almost all the states of United States. Another of its strength is its ability to anticipate the demands of the customers and its ability to provide high-quality and innovative products which in return make their customers become loyal of availing all their services and products. Table 1 SWOT Analysis of Target Corp. Strengths Strong brand awareness and recognition Employee retention Design and innovation Opportunities Global expansion Focus on private label products Advised Future Strategy The threat faced by all these market players is the recession faced by the US economy, and since Target only operates in the United States, they don’t have the ability to fall back on their foreign markets. So Target must begin their career to the global markets. And It’s over emphasis upon the quality of products makes its products expensive than its competitor Wal-Mart. Therefore Target must devise effective strategies to ensure high quality at economic prices. Weakness Low global presence Quality obsession...

Words: 4236 - Pages: 17

Premium Essay

Pestel

...QUESTION 1 You need to make a decision on whether to invest RM146300 in Project Y or Project Z that guarantees the following cash flow and annual relevant cost at the end of each year as indicated in the table below. PROJECT Y Year | Cash Flow | Cost | 1 | 40% of your investment | 2% of your investment | 2 | 42% of your investment | 2.3% of your investment | 3 | 38% of your investment | 3% of your investment | 4 | 33% of your investment | 3% of your investment | 5 | 22% of your investment | 2% of your investment | PROJECT Z Year | Cash Flow | Cost | 1 | 22% of your investment | 1% of your investment | 2 | 28% of your investment | 3% of your investment | 3 | 34% of your investment | 2% of your investment | 4 | 38% of your investment | 2% of your investment | 5 | 45% of your investment | 1% of your investment | a) Compute the annual cash flow and relevant cast in RM. b) Compute the annual net cash flow. c) Assuming the discount rate is 10%; find the Net Present Value (NPV) for each project. d) From your answer in part (c), what is your decision? Why? e) Plot the annual present value calculated from part (c) on the same graph. ANSWER A) Compute the annual cash flow and relevant cost in RM. PROJECT Y Year | Cash Flow | Cost | 1 | 0.40*RM146300=RM58520 | 0.02*RM146300=RM2926 | 2 | 0.42*RM146300=RM61446 | 0.023*RM146300=RM3364...

Words: 691 - Pages: 3

Premium Essay

Gb550 Financial Management Unit 1 Final Project

...GB550 Financial Management Unit 1 Final Project Click Link Below To Buy: http://hwaid.com/shop/gb550-financial-management-unit-1-final-project/ Unit 1 Final Project Overview: The Final Project is due at the end of Unit 5. Overview The purpose of the Final Project Research Paper is to examine capital-structure theory, issues, and debates, while showing how capital-structure choices affect a firm’s return on investment (ROI) and its risk profile. Directions Your Assignment is to select a publicly-held company and to analyze its capital structure, applying the theories and principles found in Chapter 15 of the text. The structure of your research paper should include: • A preview of capital structure issues • Business and financial risks related to capital structure • Modigliani and Miller’s [MM] capital-structure theory • Criticisms of the MM model and assumptions • Capital structure evidence and implications • Estimating the firm’s optimal capital structure A firm’s optimal capital-structure is that mix of debt and equity that maximizes the stock price. At any point in time, management has a specific target capital structure in mind, presumably the optimal one, though this target may change over time. For example, financial management may choose a 50% equity financing [stock] and 50% debt [bond] financing. Several factors influence a firms’ capital structure, including: • Business risk • Tax position • The need for financial flexibility • Managerial...

Words: 637 - Pages: 3

Premium Essay

Sample Literature Review

...List the 5 projects you have selected to review and indicate why you selected each. Include the project title and author. The first project I reviewed was “How is Wind Farming Negatively Impacting Bat Populations in Texas” by Amy Burdette. I picked her project because I had never of wind farming hurting the bat population. The second project I reviewed was “Changing Patterns of Mosquito-Borne Diseases” by Felicia Castillo. I picked her project because I am learning about mosquito-borne diseases and illnesses, like malaria and filariasis, in another class. When I saw the title I was very intrigued to see how the patterns have changed. The third project I reviewed was “The Impact of Urbanization on the Indigenous People of Guyana” by Mason...

Words: 753 - Pages: 4

Free Essay

Econ545

...Part 2 of your course project is due this week. The second part of your research or course project is a discussion of both sides of the issue; that is, the pros and the cons. This section of the paper should be around five to six pages in length. Use APA citation format for all assignments submitted for DeVry undergraduate courses Juvenile Justice Course Project Objective | Requirements | Deliverables | Grading Rubrics | | Objective | | The learning objective of this course project is to help students gain an in-depth understanding of a selected topic or issue related to juvenile justice. In addition, students will demonstrate their critical thinking abilities by presenting both sides of an issue and developing their own position on the issue. The paper should represent your best professional writing and work. As such, students should pay careful attention to paragraphing, sentence structure, quotation conventions, spelling, appropriate citation, and other aspects of grammar. | | Requirements | | Each student will write an 8 – 10 page typed double-spaced position or issue paper on a particular juvenile justice issue. Students will select a relevant juvenile justice issue, such as the origins of juvenile justice, the differences between juvenile justice and adult criminal justice, constitutional rights and juvenile justice, the juvenile death penalty, juvenile delinquency prevention, juvenile gangs, and so forth. Once the issue has been selected and approved...

Words: 964 - Pages: 4

Premium Essay

Drew

...Syllabus NT2799 Network Systems Administration Capstone Project SYLLABUS Credit hours: 4.5 Contact hours: 56 (34 Theory, 22 Lab) Prerequisite(s): Completion of a minimum of 72 credits earned in the program of study including NT2640 IP Networking or equivalent. © ITT Educational Services, Inc. All Rights Reserved. -1- 13/01/2013 Network Systems Administration Capstone Project SYLLABUS COURSE SUMMARY COURSE DESCRIPTION This course provides an opportunity for students to work on a comprehensive project that includes the design, planning and implementation of a network solution for solving specific business problems. Common project management processes are applied to identify deliverables and outcomes of the project. MAJOR INSTRUCTIONAL AREAS 1. Project Management Techniques 2. A Fundamental Review of the Basics of Electronics in the AASNSA Program 3. Capstone Project 4. Research of Current and Emerging Technology COURSE OBJECTIVES 1. Apply important concepts of project management to the actual capstone project proposed for this course. 2. Use Microsoft Office Project to help plan and manage the actual capstone project. 3. Analyze the requirements for the capstone project. 4. Integrate and apply the knowledge acquired in the program to provide effective technological solutions for given problems. 5. Work in teams on a large-scope project. 6. Document solutions to a problem in detail by applying...

Words: 7871 - Pages: 32

Premium Essay

Intl Business

...|School/Portfolio: |The Business School | | |Course Code/ID: |BSMAN 3005 | | |Course Title: |Project Management | | |Teaching Location: |(Insert Teaching Location) | | |Program(s): |Bachelor of Applied Management | | |Author: |Alan Labas | | |Level: |Advanced...

Words: 3271 - Pages: 14