Security Policy Ethics

Briefly detail the appropriate business requirements, IT goals, and parameters for your selected organization, and then analyze the security framework and cryptography strategies, physical network security strategy, and operating system and application security strategies you developed in the prior assessments. Finally, develop and design your overall security policy ethics strategy.

Describe security vulnerabilities and threats found in an IT infrastructure and controls to mitigate the risks.
Identify a complete list of security standards that must be addressed in a comprehensive solution for the organization.
Discuss legal and regulatory issues that must be considered in relation to the management of information assets.
Identify the steps that you took throughout the quarter to ensure that your security solution will succeed internationally and describe how do you addressed globalization in your security design.
Review the feedback that your instructor provided throughout the quarter and use that to finalize the security solution for your organization.
You are encouraged to provide resources and citations. Any references should be formatted according to current APA style and formatting.

Additional Requirements

Use the following template: Assessment 5 format.docx
Length: Minimum of 3 pages.
Written communication: Written communication is free of errors that detract from the overall message.
APA formatting: If you use sources, ensure that resources and citations are formatted according to current APA style and formatting.
Font and font size: Times New Roman, 12 point.
Grading

Ensure you are following the scoring guide; this is how I will grade your paper:

Describe security vulnerabilities and threats found in an IT infrastructure and controls to mitigate the risks.         
Describe security standards and policies that must be addressed in a security solution.   
Discuss globalization concerns and legal issues that must be considered in relation to the management of information assets.     
Describe network and physical security threats and solutions to protect the infrastructure.
Design a comprehensive security solution that meets the needs of an organization.