CIS 565 W8 Case Study 4: Physical Security Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center Instructors, training on how to grade is within the Instructor Center...

CIS 565 W8 Case Study 4: Physical Security



Students, please view the “Submit a Clickable Rubric Assignment” in the Student Center


Instructors, training on how to grade is within the Instructor Center



Case Study 4: Physical Security


Due Week 8 and worth 110 points




Read the article titled, “How Cisco IT Controls Building

Security over the Enterprise WAN,” located here (original article located at

http://wwwciscocom/web/about/ciscoitatwork/?downloads/ciscoitatwork/pdf/Cisco_IT_Case_Study_Enterprise_Access_Controlpdf)

Use the Internet to research companies that have experienced problems and

challenges similar to the ones Cisco Systems experienced in the case study


Write a three to four (3-4) page paper in which you:



  1. Examine the security problems and challenges that Cisco Systems experienced

  2. Compare and contrast the environment at Cisco Systems when it experienced these security problems and challenges to the environment of at least one (1) other company who experienced similar issues Speculate as to whether or not the environment of the companies had anything to do with the problems and issues that they experienced

  3. Evaluate the effectiveness of two (2) of the solutions that Cisco Systems implemented in order to overcome the security problems and challenges that they experienced Provide a rationale for your response

  4. Compare and contrast Cisco Systems’ physical security program with one (1) of the researched organization’s physical security program Give your opinion as to which of the organizations has a more effective and successful physical security Provide a rationale for your response

  5. Use at least three (3) quality references in this assignment
    Note:
    Wikipedia and similar Websites do not qualify as quality resources


Your assignment must follow these formatting requirements:



  • Be typed, double spaced, using Times New Roman font (size 12), with one-inch margins on all sides; citations and references must follow APA or school-specific format Check with your professor for any additional instructions

  • Include a cover page containing the title of the assignment, the student’s name, the professor’s name, the course title, and the date The cover page and the reference page are not included in the required assignment page length


The specific course learning outcomes associated with this assignment are:



  • Examine the challenges of computer security, including different threats and types of attacks

  • Use technology and information resources to research issues in Cryptography

  • Write clearly and concisely about Cryptography using proper writing mechanics and technical style conventions



May 16, 2022
SOLUTION.PDF

Get Answer To This Question

Related Questions & Answers

More Questions »

Submit New Assignment

Copy and Paste Your Assignment Here