CS 652 KSU Operating Systems Security of Amazon Project Proposal Essay
I’m studying for my Computer Science class and need an explanation.
The first task in this process will be to select an organization or identify a hypothetical organization to use as the basis of the projects. Next, you will create the shell document for the final project deliverable that will be worked on during each unit. While you proceed through each project phase, content will be added for each section of the document to gradually complete the final project. Appropriate research should be conducted to support the development of the document, and assumptions may be made.
For the first phase of the Comprehensive Security Management Plan document, you will create an enterprise organizational chart in the first document section. A proposed security working group (WG) organization and its ties to the enterprise will be added. Finally, include a 1-page discussion of the flow of information, decision-making communication, and responsibilities of the chief security officer (CSO). Create the skeleton for the Comprehensive Security Management Plan as follows:
- Use Word
- Title Page
- Course number and name
- Project name
- Your name
- Date
- Table of Contents (TOC)
- Use an auto-generated TOC.
- This must be on a separate page.
- This must be a maximum of 3 levels deep.
- Be sure to update the fields of the TOC before submitting your project.
- Section Headings (Create each heading on a new page with “TBD” as content, except for the sections that are listed under “New Content.”)
- Project Outline (Week 1)
- Security Requirements (Week 1)
- Security Business Requirements (Week 2)
- Security Policy (Week 3)
- System Design Principles (Week 4)
- The Training Module (Week 5)
- References
XXXXXXXXXXXXXXXXXXXXX———————————XXXXXXXXXX———XXXXXXXXXXXXXXXXXXX
The following are the project deliverables for Week 1:
- New Content
- Project Outline and Security Requirements
- Include a brief description of the real or hypothetical organization in which the Comprehensive Security Management Plan will be implemented.
- Include the company’s size, location(s), and other pertinent information.
- Include a brief description of the real or hypothetical organization in which the Comprehensive Security Management Plan will be implemented.
- Initial Security Projects
- Corporate organizational chart
- WG structure and ties added to corporate organizational chart
- Memo discussing communication flows with WG
- Project Outline and Security Requirements
- Name the document “yourname_CS654_IP1.doc.”