ITS 350 Colorado State University Week 8 Access Control Methods Essay
Important! Read FirstChoose one of the following two Portfolio Project options to complete by the end of Week 8. Do not do both assignments. Identify your assignment choice in the title of your submission. When you are ready to submit, click the Week 8 Portfolio Project header on the Assignments page to upload the document.Option #1: XYZ CorporationXYZ Corporation is a small organization of roughly 20 to 30 employees working in a simple office space using basic peer-to-peer type networking in which all employees keep their data on their own PCs and each has his or her own devices (i.e., printers, scanners, and other peripherals).In the last few months, XYZ developed a revolutionary widget that will change technology as we know it. The company received a substantial investment and will quickly ramp up to 100 employees. They moved into a new building that was wired and set up for a local area network (LAN). They have implemented a client server-based network in which all printers, folders, and other resources are shared but everyone has access to everything and there is no security outside of the defaults in place when the system was set up.You have been hired to secure XYZ Inc’s network and ensure that the company has the highest levels of security to prevent internal or external attacks. In an 8-10 page proposal, address the following items to provide a comprehensive secure environment:A plan to provide secure Access Control Methods for all user accessA viable Password policy, which includes complexity, duration, and history requirementsA cryptography method to ensure vital data is encryptedA remote access plan to ensure that users that access the network remotely do so in a secure and efficient mannerA thorough plan to protect the network from Malware and other Malicious attacksYour proposal should address all of the elements noted above with support, detail, and elaboration for each section explicitly grounded in knowledge from the assigned readings and media, along with any outside sources you may choose to bring into your writing. Your paper should be 8-10 pages in length, conform to CSU-Global Guide to Writing and APA (Links to an external site.), and include 3-5 scholarly references in addition to the course textbook to support your views. The CSU-Global Library is a good place to find these references.Option #2: ABC CorporationABC Corporation is a small but global organization of roughly 200 to 250 employees working in a work-at-home type of office space around the world using Wide Area Network connectivity via VPNs. The company deals with lot of financial information to be shared between the offices that requires encrypted traffic as well as data-at-rest encryption.You have been hired to secure ABC Inc’s network and ensure that the company has the highest levels of security to prevent internal or external attacks. In an 8-10 page proposal, address the following items to provide a comprehensive secure environment:A plan to provide secure Access Control Methods for all user accessA viable Password policy, which includes complexity, duration, and history requirementsA cryptography method to ensure vital data is encrypted, including recommendation on algorithmsA VPN recommendation to access the network remotely do so in a secure and efficient manner A thorough plan to protect the network from Malware and other Malicious attacksYour proposal should address all of the elements noted above with support, detail, and elaboration for each section explicitly grounded in knowledge from the assigned readings and media along with any outside sources you may choose to bring into your writing. Your paper should be 8-10 pages in length, conform to CSU-Global Guide to Writing and APA (Links to an external site.), and include 3-5 scholarly references in addition to the course textbook to support your views. The CSU-Global Library is a good place to find these references.RubricITS350 Module 8 Portfolio ProjectITS350 Module 8 Portfolio ProjectCriteriaRatingsPtsThis criterion is linked to a Learning OutcomeRequirements15.0 to >12.0 ptsMeets ExpectationThe Portfolio includes all of the required components, including paper length and submission of all required items and elements as specified in the assignment.12.0 to >9.0 ptsApproaches ExpectationThe Portfolio includes most of the required components, as specified in the assignment.9.0 to >6.0 ptsBelow ExpectationThe Portfolio includes some of the required components, as specified in the assignment.6.0 to >0 ptsLimited EvidenceThe Portfolio includes few of the required components, as specified in the assignment.15.0 ptsThis criterion is linked to a Learning OutcomePlan to provide secure Access Control Methods35.0 to >28.0 ptsMeets ExpectationA detailed plan to provide secure Access Control Methods for all user access.28.0 to >21.0 ptsApproaches ExpectationThe plan includes fewer details to provide secure Access Control Methods for all user access.21.0 to >14.0 ptsBelow ExpectationThe plan includes less than 2 plan item details to provide secure Access Control Methods for all user access.14.0 to >0 ptsLimited EvidenceThe plan includes NO plan item details to provide secure Access Control Methods for all user access.35.0 ptsThis criterion is linked to a Learning OutcomeViable password policy35.0 to >28.0 ptsMeets ExpectationA detailed viable Password policy, which includes complexity, duration, and history requirements.28.0 to >21.0 ptsApproaches ExpectationThe policy includes some details but not complete detailed viable Password policy, which includes complexity, duration, and history requirements.21.0 to >14.0 ptsBelow ExpectationThe policy includes 1 or 2 details but not complete detailed viable Password policy, which includes complexity, duration, and history requirements.14.0 to >0 ptsLimited EvidenceThe policy includes NO details about viable Password policy, which includes complexity, duration, and history requirements.35.0 ptsThis criterion is linked to a Learning OutcomeCryptography35.0 to >28.0 ptsMeets ExpectationA detailed viable cryptography method to ensure vital data is encrypted.28.0 to >21.0 ptsApproaches ExpectationThe plan includes some details but not complete detailed viable cryptography method to ensure vital data is encrypted.21.0 to >14.0 ptsBelow ExpectationThe plan includes 1 or 2 details but not complete detailed viable cryptography method to ensure vital data is encrypted.14.0 to >0 ptsLimited EvidenceThe plan includes NO details about viable cryptography method to ensure vital data is encrypted.35.0 ptsThis criterion is linked to a Learning OutcomeRemote Access Plan35.0 to >28.0 ptsMeets ExpectationA detailed viable remote access plan, which includes user access, security, and efficiency.28.0 to >21.0 ptsApproaches ExpectationThe plan includes some details but not complete detailed viable remote access plan, which includes user access, security, and efficiency.21.0 to >14.0 ptsBelow ExpectationThe plan includes 1 or 2 details but not complete detailed viable remote access plan, which includes user access, security, and efficiency.14.0 to >0 ptsLimited EvidenceThe plan includes NO details about viable remote access plan, which includes user access, security, and efficiency.35.0 ptsThis criterion is linked to a Learning OutcomeProtect Malware and other Malicious Attacks35.0 to >28.0 ptsMeets ExpectationA detailed viable malware and malicious attack plan, which includes network protection.28.0 to >21.0 ptsApproaches ExpectationThe plan includes some details but not complete detailed malware and malicious attack plan, which includes network protection.21.0 to >14.0 ptsBelow ExpectationThe plan includes 1 or 2 details but not complete malware and malicious attack plan, which includes network protection.14.0 to >0 ptsLimited EvidenceThe plan includes NO details about malware and malicious attack plan, which includes network protection.35.0 ptsThis criterion is linked to a Learning OutcomeApplication of Source Material15.0 to >12.0 ptsMeets ExpectationSources well or adequately chosen and applied to provide substance and perspectives on the issue; knowledge from the course linked properly to source material.12.0 to >9.0 ptsApproaches ExpectationSome significant but not major problems with selection, application, and linkage of sources.9.0 to >6.0 ptsBelow ExpectationMajor problems with selection, application, and linkage of sources.6.0 to >0 ptsLimited EvidenceSource selection is seriously flawed; no linkage to knowledge from the course.15.0 ptsThis criterion is linked to a Learning OutcomeOrganization15.0 to >12.0 ptsMeets ExpectationProject is clearly organized, well written, and in proper essay format including an introduction, body, and conclusion. Conforms to project requirements.12.0 to >9.0 ptsApproaches ExpectationSmall number of significant but not major flaws in organization and writing; is in proper essay format. In a minor way does not conform to project requirements.9.0 to >6.0 ptsBelow ExpectationMajor problems in organization and writing; does not completely follow proper essay format. In a significant way does not conform to project requirements.6.0 to >0 ptsLimited EvidenceProject is not well organized or well written and is not in proper essay format. Does not conform to project requirements.15.0 ptsThis criterion is linked to a Learning OutcomeGrammar and Style15.0 to >12.0 ptsMeets ExpectationStrong sentence and paragraph structure; few or no minor errors in grammar and spelling; appropriate writing style; clear and concise with no unsupported comments.12.0 to >9.0 ptsApproaches ExpectationSmall number of significant but not major errors in grammar and spelling; generally appropriate writing.9.0 to >6.0 ptsBelow ExpectationInconsistent to inadequate sentence and paragraph development; work needed on grammar and spelling; does not meet program expectations.6.0 to >0 ptsLimited EvidencePoor quality; unacceptable in terms of grammar and/or spelling; inappropriate writing style that interferes with clarity.15.0 ptsThis criterion is linked to a Learning OutcomeDemonstrates proper use of APA style15.0 to >12.0 ptsMeets ExpectationProject contains proper APA formatting, according to the CSU-Global Guide to Writing and APA, with no more than one significant error.12.0 to >9.0 ptsApproaches ExpectationFew errors in APA formatting, according to the CSU-Global Guide to Writing and APA, with no more than two to three significant errors.9.0 to >6.0 ptsBelow ExpectationSignificant errors in APA formatting, according to the CSU-Global Guide to Writing and APA, with four to five significant errors.6.0 to >0 ptsLimited EvidenceNumerous errors in APA formatting, according to the CSU-Global Guide to Writing and APA, with more than five significant errors.15.0 ptsTotal Points: 250.0