Description
Devry SEC 360 Week 5 & 6 You Decide Latest
YOU DECIDE
Scenario, Your Role, Key Players
Information Systems Use Security Policy
ScenarioScenario descriptionRoleWhat is Your Role in this scenario?PlayersLearn more about the Key Players in this scenario.DeliverableWhat would you to resolve this scenario?
Scenario
Sunshine Machine Works, who recently expanded its infrastructure, now needs to ensure that any authorized employee can access the intranet. Sales people and management staff frequently travel to remote locations, and often require access to documents stored on the intranet file server.Play.equella.ecollege.com/file/7dd452b7-36a7-47d0-a6b6-cff6c42dacf7/1/SEC360_W5_YouDecide.html#”>00:00Mute.equella.ecollege.com/file/7dd452b7-36a7-47d0-a6b6-cff6c42dacf7/1/SEC360_W5_YouDecide.html#”>
Role
You are the IT Services manager for Sunshine Machine Works. You are to assess the information presented and provide a response to management on how remote access may be handled for Sunshine Machine Works.Play.equella.ecollege.com/file/7dd452b7-36a7-47d0-a6b6-cff6c42dacf7/1/SEC360_W5_YouDecide.html#”>00:00Mute.equella.ecollege.com/file/7dd452b7-36a7-47d0-a6b6-cff6c42dacf7/1/SEC360_W5_YouDecide.html#”>
Players
StoneChief Executive Officer Margie NelsonChief Financial Officer GarThomasGeneral Manager
Deliverable
Given the scenario, your role and the information provided by the key players involved, it is time for you to make a decision.<br><br>If you are finished reviewing this scenario, close this window and return to this Week’s You Decide tab, in eCollege, to complete the activity for this scenario.<br><br>You can return and review this scenario again at any time.
YOUDECIDE
Activity
Assignment |
Since you are responsible for IT Services and want to keep the systems and network functioning effectively, you will want to provide technical guidance and leadership on this issue.
Follow the instructions provided in the You Decide Exercise: Cryptographic Tunneling and the OSI Model.
|
Grading Rubric:
Category | Points | Description |
Understanding | 20 | Demonstrate a strong grasp of the problem at hand. Demonstrate understanding of how the course concepts apply to the problem. |
Analysis | 20 | Apply original thought to solving the business problem. Apply concepts from the course material correctly toward solving the business problem. |
Execution | 10 | Write your answer clearly and succinctly using strong organization and proper grammar. Use citations correctly. |
Total | 50 | A quality paper will meet or exceed all of the above requirements. |
Note!
Submit your assignment to the Dropbox located on the silver tab at the top of this page. For instructions on how to use the Dropbox
<pclass=”block_indent” style=”box-sizing: border-box; user-select: initial !important;”>Cryptographic Tunneling and the OSI Model
Write a paper consisting of 500-1,000 words (double-spaced) on the security effects of cryptographic tunneling based on an understanding of the OSI (Open Systems Interconnect) model (Review the OSI Simulation in the Week 3 Lecture).
Provide input on the type of cryptographic tunneling protocols (e.g., L2TP, IPSEC, SSL, etc.) that may be used, the layer(s) of the OSI at which each operates, and also recommend how they may be implemented. Cryptographic tunneling is inherent in building any common virtual private network (VPN).
.equella.ecollege.com/file/1c65cf51-db98-408b-ba0e-8305b53b1c2e/1/SEC360_W6_Assignments.html#”>View Grading Rubric
Submit your assignment to the Dropbox located on the silver tab at the top of this page. For instructions on how to use the Dropbox, read these .next.ecollege.com/default/launch.ed?ssoType=DVUHubSSO2&node=184″>step-by-step instructions
</pclass=”block_indent”>
DeVry Courses helps in providing the best essay writing service. If you need 100% original papers for Devry SEC 360 Week 5 & 6 You Decide Latest, then contact us through call or live chat.
Devry SEC 360 Week 5 & 6 You Decide Latest

Reviews
There are no reviews yet.