Graduate Project 2:Policies, Procedures and PracticesDUE BY: 3/11/2016 @ 11:00pmIdentifying the ProblemIntroductionYou will complete a research project that will involve the writing of two security policy, procedure andpractices. Your job is to create and document two technical operations across two different areas oftechnology. For instance, you may choose from network, operating system, software development,application, data storage or information security (other areas with permission). You do not need to havetechnical hands-on experience, just the ability to review material and come up with a cohesive plan to solvethe problem, based on the recommendation of others.Once you have selected an area to research (ex. Data Storage/Destruction)Step 1: Identify the problem you need to solve (ex. Data destruction policy) – Authorized by me in advanceStep 2: Call out what is in-scope of the problem allowing you to be specific (ex. Physical media only)Step 3: Articulate what needs to be done (ex. Render the CD safe for general disposal)Step 4: Write the procedure (ex. CD: Fill out form DDR-101 with the user’s name, data on media and dateand time of submission for destruction. Run CD through Sentry Shredder ADA387 via the CD slot, opendischarge drawer and verify that CD has been destroyed, update DDR-101 with destroyer’s name and dateof destruction)Step 5: Identify the method for validating that the policy is followed (ex. Review process of the DDR-101system, or procedure for handling CDs place in the general trash)You might also want to talk about removable drives (thumb-drives and external drives which are harder toshred, but should be wiped before disposal.I do not expect this to be a completely original work. There are certainly many examples of not only actualprocedures, but also templates that may help you along the way. Please ensure that you give credit fortemplates. It will not affect your grade if you use someone else’s work as a base, but I expect you doenhance and add value.If you need guidance help understanding some of the technical pitfalls you are being asked to explore,please feel free to contact me. The length of the document is not as critical to me as the thought processthat goes into solving the problem identified. Please get authorization from me before you start to ensurethat your selection is acceptable.Grading as follows:• 10pts/each – for each of the key steps above for each of your two PPP documents• TOTAL – 100ptsYou must submit your project via the sakai assignment tool with a filename as follows 448-LASTNAME.xxx(where LASTNAME is replaced with your last name and the .xxx is replaced with a word processing fileextension).

Order Management

Premium Service
- 100% Custom papers
- Any delivery date
- 100% Confidentiality
- 24/7 Customer support
- The finest writers & editors
- No hidden charges
- No resale promise
Format and Features
- Approx. 275 words / page
- All paper formats (APA, MLA, Harvard, Chicago/Turabian)
- Font: 12 point Arial/Times New Roman
- Double and single spacing
- FREE bibliography page
- FREE title page
0% Plagiarism
We take all due measures in order to avoid plagiarisms in papers. We have strict fines policy towards those writers who use plagiarisms and members of QAD make sure that papers are original.