Discuss the need for data governance


Assignment: Security Capstone

Length: 15 Pages (3 pages-section)/ References

Choose a topic that related to advances in information assurance security. High-level topics include (but are not limited to) the following:

• Information security and risk management
• Access controls
• Security architecture and design
• Physical and environmental security
• Telecommunications and network security
• Cryptography
• Business continuity and disaster recovery
• Legal, regulations, compliance, and investigations
• Application security
• Operations security

The topic of choice will be submitted to the instructor. This will include an annotated bibliography for review and approval. This should include at least 5 sources.

Your Advanced Research in IAS and Information Technology (IT) Management template document should be constructed in the following format:

• Use Word

• Title Page

o Course number and name
o Project name
o Student name
o Date

• Table of Contents (TOC)

o Autogenerated TOC
o Separate page
o Maximum of three levels deep
o Be sure to update the fields of the TOC so it is up-to-date before submitting your project.

• Abstract

• Paper Topic Background

• Section Headings (create each heading on a new page with TBD as content, except for sections listed under New Content below)

o Section 1: Policies, Procedures, Roles, and Responsibilities
o Section 2: Data Governance
o Section 3: Network Security
o Section 4: Asset Security Management
o Section 5: Compliance with Security Regulations

• Conclusion

• References

You will add to this document and submit it for grading.

Overview

Each section will contain the following:

• Section 1: Policies, Procedures, Roles, and Responsibilities

o Choose a topic
o List at least 5 references

• Section 2: Data Governance

o Submit an outline of the paper, including the following information (in addition to the weekly topics):

- Background and history on the topic
- Why the topic is applicable
- Details about the topic
- Solutions for how the topic can be used

o Description of any policies and procedures and their applicability
o Discuss the need for data governance

• Section 3: Network Security

o Discussion of the implementation any network security as appropriate to the topic
o Discussion of the need for layered security

• Section 4: Asset Security Management

o Risk assessment

- Risk identification
- Safeguard implementation

• Section 5: Compliance with Security Regulations

o Detailed discussion about any laws and regulations that apply to your topic

Add the outline to the Table of Contents of the paper, and be sure to include the Title Page, Table of Contents, and the section place holders for the following:

• Abstract
• Topic research
• Weekly material and sections
• Conclusion
• References

Format your assignment according to the following formatting requirements:

1. The answer should be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides.

2. The response also include a cover page containing the title of the assignment, the student's name, the course title, and the date. The cover page is not included in the required page length.

3. Also Include a reference page. The Citations and references should follow APA format. The reference page is not included in the required page length.

Solution Preview :

Prepared by a verified Expert
Computer Engineering: Discuss the need for data governance
Reference No:- TGS02961129

Now Priced at $95 (50% Discount)

Recommended (97%)

Rated (4.9/5)