Assessment Description It is essential as a security expert to be able to evaluate potential risks within the security infrastructure in order to position security controls/countermeasures. Create an

Get perfect grades by consistently using www.college-experts.com. Place your order and get a quality paper today. Take advantage of our current 20% discount by using the coupon code GET20


Order a Similar Paper Order a Different Paper

Assessment Description

It is essential as a security expert to be able to evaluate potential risks within the security infrastructure in order to position security controls/countermeasures.

Create an overall security architecture structure diagram with descriptions of the architecture components making sure to:

Identify all types of data and sensitive data the organization will store.

Define where that information is stored.

Record all hardware and software devices in your network.

Describe how the security controls are positioned and how they relate to the overall systems architecture.

Define security attacks, mechanisms, and services, and the relationships between these categories.

Specify when and where to apply security controls.

Present in-depth security control specifications.

Address restricting access, layering security, employing authentication, encrypting storage, automating security, and IT infrastructure.

Include the full scope of policy, procedural, and technical responsibilities.

APA style is not required, but solid academic writing is expected.

Refer to “CYB-690 Security Architecture Scoring Guide,” prior to beginning the assignment to become familiar with the expectations for successful completion.

You are not required to submit this assignment to LopesWrite.

Assessment Description It is essential as a security expert to be able to evaluate potential risks within the security infrastructure in order to position security controls/countermeasures. Create an
CYB- 690 Security Architecture Scoring Guide Performance Level Ratings Meets Expectations Performance consistently met expectations in all essential areas of the assignment criteria, at times possibly exceeding expectations, and the quality of work overall was very good. The most critical goals were met. Near Expectations Performance did not consistently meet expectations. Performance failed to meet expectations in one or more essential areas of the assignment criteria, one or more of the most critical goals were not met. Below Expectations Performance was consistently below expectations in most essential areas of the assignment criteria, reasonable progress toward critical goals was not made. Significant improvement is needed in one or more important areas. Criteria Below Expectations Near Expectations Meets Expectations Earned The student accurately creates an overall security architecture structure diagram with comprehensive descriptions of the architecture components making sure to: Identify all types of data and sensitive data the organization will store. 0 pts – 2 pts 3 pts – 4 pts 5 pts Define where that information is stored. 0 pts – 2 pts 3 pts – 4 pts 5 pts Record of all hardware and software devices in the network. 0 pts – 2 pts 3 pts – 4 pts 5 pts Describe how the security controls are positioned and how they relate to the overall systems architecture. 0 pts – 2 pts 3 pts – 4 pts 5 pts Define security attacks, mechanisms, and services, and the relationships between these categories. 0 pts – 6 pts 7 pts – 9 pts 10 pts Specify when and where to apply security controls. 0 pts – 2 pts 3 pts – 4 pts 5 pts Present in-depth security control specifications. 0 pts – 6 pts 7 pts – 9 pts 10 pts Address restricting access, layering security, employing authentication, encrypting storage, automating security, and IT infrastructure. 0 pts – 2 pts 3 pts – 4 pts 5 pts Include the full scope of policy, procedural and technical responsibilities. 0 pts – 6 pts 7 pts – 9 pts 10 pts Prose is largely free of mechanical errors. The writer uses a variety of effective sentence structures, figures of speech, and industry terminology. 0 pts – 2 pts 3 pts – 4 pts 5 pts TOTAL /65 Instructor Feedback © 2019. Grand Canyon University. All Rights Reserved.

Writerbay.net

Do you need help with this or a different assignment? We offer CONFIDENTIAL, ORIGINAL (Turnitin/LopesWrite/SafeAssign checks), and PRIVATE services using latest (within 5 years) peer-reviewed articles. Kindly click on ORDER NOW to receive an A++ paper from our masters- and PhD writers.

Get a 15% discount on your order using the following coupon code SAVE15


Order a Similar Paper Order a Different Paper