Your Perfect Assignment is Just a Click Away

We Write Custom Academic Papers

100% Original, Plagiarism Free, Customized to your instructions!


Capella University Protection of the Information Technology Resources Research Paper

Capella University Protection of the Information Technology Resources Research Paper

Question Description

Write 10 pages.

Assignment Description

Throughout this course you will be working on several aspects ofoperating systems security that will result in a complete OperatingSystems Security Policies document for an organization of your choosing.Operating systems security is vital to the operation of the computersystems infrastructure in any organization and provides the protectionof valuable data and information. Each week, you will complete a part ofthe Operating Systems Security Policies document, with the final draftdue at the end of the course.

You will select an organization and apply your research to theanalysis and development of operating systems security policies thatwould be appropriate for the organization and the needs it has for itssystems. Additional information and the deliverables for each IndividualProject will be provided in the assignment description for the project.This is the course Key Assignment that you will make contributions toeach week.

Project Selection

The first step will be to select an organization as the target foryour Operating Systems Security Policies document. This organizationwill be used as the basis for each of the assignments throughout thecourse and should conform to the following guidelines:

  • Nontrivial: The selected organizationshould be large enough to allow reasonable exercise of the operatingsystems security analysis process.
  • Domain knowledge:You should be familiar enough with the organization to allow focus onthe project tasks without significant time required for domaineducation.
  • Accessibility: You should have goodaccess to the people and other information related to the organizationbecause this will be an important part of the process.
  • Note:The selected organization may already have operating systems securitypolicies in place and may still be used as the basis for the projects inthis course.
  • Note: The selected organizationmust have a need for some type of operating systems security as part ofits operations. Therefore, you may feel free to identify a hypotheticalorganization that meets the requirements. Any necessary assumptions maybe made by you to fulfill the requirements of organization selection.

Select an existing organization or identify a hypotheticalorganization that fits these requirements, and submit your proposal toyour instructor before proceeding further with the assignments in thecourse. Approval should be sought within the first several days of thecourse. Your instructor will tell you how to submit this proposal andwhat notification will be given for project approval.


For the assignments in this course, you will not be implementing anoperating systems security policy; rather, you will be developing acomprehensive operating systems security policies document. Your firsttask in this process will be to select an organization or identify ahypothetical organization to use as the basis of your projects. You willalso create the shell document for the final project deliverable thatyou will be working on during each unit. As you proceed through eachproject phase, you will add contents to each section of the finaldocument to gradually complete the final project delivery. Appropriateresearch should be conducted to support the development of yourdocument, and assumptions may be made when necessary.

The following are the project deliverables:

  • Submit the organization proposal to your instructor for approval.
  • Operating Systems Security Policies document shell
    • Use MS Word
    • Title Page
      • Course number and name
      • Project name
      • Student name
      • Date
    • Table of Contents
      • Use autogenerated TOC
      • Separate page
      • Maximum of 3 levels deep
      • Be sure to update fields of TOC so it is up-to-date before submitting project
    • SectionHeadings (Create each heading on a new page with TBD as the contentexcept for the sections listed under New Content below.)
      • Project Outline
      • Operating System Security Tools
      • Security Threat Detection
      • Secure Communications
      • Virus Protection
      • Security Management
    • New Content
      • Project Outline and Requirements
        • Give a brief description of the organization (can behypothetical) where the operating systems security policies will beimplemented. Include company size, location(s), and other pertinentinformation.
        • Identify the systems in the organization (i.e., thetype and number of computer systems and operating systems used, alongwith a top-level view of the infrastructure). A network diagram would beuseful for this purpose, but the diagram should be pasted into yourWord document.
        • Your project must assume that the organizationhas UNIX, open source, and Windows operating systems in its computingenvironment, so be sure to include all 3 categories in the systemsoverview.
        • Identify and describe any outside connections to the internal systems.
        • Summarize the benefits the company would realize through the implementation of operating systems security policies.
        • Material can be taken from the approved proposal submitted to the instructor.
        • Be sure that this project is approved by the instructor.
      • Operating System Security Tools
        • Based on the systems overview, identify and describe at least 3security tools for each OS category (UNIX, open source, and Windows)that can be used at the operating system level to protect the systems,users, and data from security threats.
        • The tools can be part ofthe OS or third-party tools. Some examples would include firewalls,account management, and port access management.

Order Solution Now

Our Service Charter

1. Professional & Expert Writers: Gold Grades only hire the best. Our writers are specially selected and recruited, after which they undergo further training to perfect their skills for specialization purposes. Moreover, our writers are holders of masters and Ph.D. degrees. They have impressive academic records, besides being native English speakers.

2. Top Quality Papers: Our customers are always guaranteed papers that exceed their expectations. All our writers have +5 years of experience. This implies that all papers are written by individuals who are experts in their fields. In addition, the quality team reviews all the papers before sending them to the customers.

3. Plagiarism-Free Papers: All papers provided by Gold Grades are written from scratch. Appropriate referencing and citation of key information are followed. Plagiarism checkers are used by the Quality assurance team and our editors just to double-check that there are no instances of plagiarism.

4. Timely Delivery: Time wasted is equivalent to a failed dedication and commitment. Gold Grades is known for timely delivery of any pending customer orders. Customers are well informed of the progress of their papers to ensure they keep track of what the writer is providing before the final draft is sent for grading.

5. Affordable Prices: Our prices are fairly structured to fit all groups. Any customer willing to place their assignments with us can do so at very affordable prices. In addition, our customers enjoy regular discounts and bonuses.

6. 24/7 Customer Support: At Gold Grades, we have put in place a team of experts who answer all customer inquiries promptly. The best part is the ever-availability of the team. Customers can make inquiries anytime.