Instructions
Learning Objectives and Outcomes
Research and describe a selected automated IT security policy compliance system.
Assignment Requirements
Assume you are a security professional for a supplier of military products to the U.S. Department of Defense (DoD). Your organization has approximately 7,000 workers, which are located across the United States in 35 locations. You also have contractors.
A recent security breach exposed flaws in your company’s Internet use policy and physical access policy.
Your manager has asked you to research automated IT security policy compliance systems. She wants a description of a typical system with a bulleted list of benefits. She also wants to know specifically how it could mitigate or remediate the recent security compliance incidents.
For this assignment:
Research automated IT security policy compliance systems.
In a summary report to management:
Describe a typical system
Include a bulleted list of benefits
Describe how the system could mitigate or remediate the security compliance incidents
Cite 2 sources
Submission Requirements
Format: Microsoft Word (or compatible)
Font: Arial, size 12, double-space
Citation Style: Follow your school’s preferred style guide
Length: 2–4 pages
Self-Assessment Checklist
I researched automated IT security policy compliance systems.
I wrote a summary report that included a description of a typical system with a bulleted list of benefits, and a description of how the system can mitigate or remediate security compliance incidents.
I created a professional, well-developed report with proper documentation, grammar, spelling, and punctuation.
I followed the submission guidelines.
Leave a Reply
You must be logged in to post a comment.