Description
For this assignment, you will write a technical paper that details the requirements for information control, perimeter protection, and physical security. Your target audience consists of technical managers and some business managers. While considering core requirements within the field, focus your attention on your selected organization so that you can provide a practical solution based on your knowledge.
Your technical paper should:
Address the different methods of containing data within the organization.
Set a controlled approach for internal and external identity management and data access.
Consider the protection of information and systems for business continuity.
Pay attention to the information perimeter and privilege access from remote locations.
Establish physical security for all information systems and network components.
Provide a logical diagram of the levels of protection and parameters. The diagram should only represent an overview, not the detailed components.
Length: 5 – 7 pages, including the diagram
References: Include sources within the course plus a minimum of 2 additional scholarly resources.
The completed assignment should address all the assignment requirements, exhibit evidence of concept knowledge, and demonstrate thoughtful consideration of the content presented in the course. The writing should integrate scholarly resources, reflect academic expectations and current APA standards,