Describe the implementation process and timeline for your


In this assignment, you will continue with the report for ABC, Inc. that you started in Week 1 Project and continued in Week 2 Project, Week 3 Project, and Week 4 Project.

Remember to review the scenario document for the company profile and overall security objectives. Modify and correct the plan you created for Week 4 Project to accommodate suggestions and recommendations from your instructor and your own changes based on the readings and activities for this week.

Use Track Changes or color code your changes and additions so that the changes are easy to identify.

In this week's assignment, you will complete the final security report for ABC, Inc. by considering fault tolerance mechanisms and incorporating a policy and redress system for employees regarding computer crimes and computer use within the organization.

Using the South University Online Library or the Internet, research about the following:

Mechanisms available for fault tolerance in a system

Computer crimes and legal implications for employees

Dispute resolution mechanisms when computer crimes occur Using your project report from Week 4 Project, complete the following tasks by adding 3 to 5 pages to the existing report:

Modify the plan created in Week 4 Project to accommodate suggestions and recommendations from your instructor and your own changes based on the readings and activities for this week.

Color code your changes to the report so that they are easy to identify.

Create a section of the report that describes the computer crimes and legal implications for the employees. This should include a point of contact for disputes, the process of appeal, and levels of severity and consequence.

This should just be an overview in general terms rather than a complete policy declaration.

Recommend a fault-tolerance mechanism or a combination of fault-tolerance mechanisms that needs to be implemented in the organization to ensure uninterrupted business.

What elements of the business need to be continuous for the business to survive? Justify your answer.

Make sure all prior areas of security for ABC Inc. have been sufficiently addressed along with implementation and verification details. Be sure you have referenced external sources for up-to-date information and comprehensive recommendations. This can include library and Internet research.

Describe the implementation process and timeline for your recommendations.

Try to give as reasonable a timeline as possible and explain your plan. Expand the section of your report for verifying the implementation of the security recommendations for this week.

Identify what is being tested for each verification activity. This should include testing activities to make sure the security system is working properly.

Attachment:- Report.rar

Solution Preview :

Prepared by a verified Expert
Computer Network Security: Describe the implementation process and timeline for your
Reference No:- TGS02797408

Now Priced at $40 (50% Discount)

Recommended (96%)

Rated (4.8/5)