ISOL634 Cumberlands Information Security Manager for County of Rockdale PPT For this assignment, you are the information security manager for the county of

ISOL634 Cumberlands Information Security Manager for County of Rockdale PPT For this assignment, you are the information security manager for the county of Rockdale. The county just elected a new sheriff. He does not have a keen understanding of what is Physical Security. It is your responsibility to brief the sheriff on what is physical security and how it can be used to protect critical infrastructures throughout the county. Please provide a PowerPoint Presentation with no less than 15 informative slides. Further, you will use Zoom to record yourself, giving the presentation, and explaining the slides. You do not have to be in the video. The slides must include pictures and other graphics that will support the presentation. The presentation should address the following.

What is physical security?
What are the levels of physical security?
Detail all five levels on separate slides
What is the value of planning as it relates to the levels of physical security?
What are physical barriers and how they coincide with physical security?
Explain security or master plan and countermeasures
Expound on designing security and layout of site

Don't use plagiarized sources. Get Your Custom Essay on
ISOL634 Cumberlands Information Security Manager for County of Rockdale PPT For this assignment, you are the information security manager for the county of
Just from $13/Page
Order Essay

Requirements

You must have a minimum of 15 slides. This does not include your introduction or reference slide. Your presentation should be between 15 to 20 minutes in length. You should have a minimum of 14 citations with matching a reference list. Please upload your recording (mp4) to your assignment area upon completion.

—-2nd Question———————————————————————————————————

According to Fennelly (2017), The lack of standards often deludes responsible individuals into believing that the protection they provide (or are paying for) is of a higher level than is actually the case.

For this assignment, you will research and expound on the following questions?

Please list and fully explain the five levels of security?
As an information technology specialist what documents or programs would you embed in these security levels?
What is a design-reference threat?
Provide the name of a facility that you are the security director, list and explain at least four possible threats and risks to the chosen facility.

Assignment Requirements

Your reading assignment for this week is chapter four of the Fennelly text. Please write a minimum of two paragraphs on each question. Every paragraph must be indented, have at least four complete sentences, subtitled, and a different in-text citation. Do not continuously cite at the end of each paragraph. You are required to write and cite according to APA 6th Edition format. Your SafeAssign Score needs to be no more than 30%. Please ensure that you use the Individual Project Header for this and every IP assignment. Failure to comply with these requirements will result in a low or zero grade.

superadmin

Recent Posts

Consider the following information, and answer the question below. China and England are internation

Consider the following information, and answer the question below. China and England are international trade…

2 years ago

The CPA is involved in many aspects of accounting and business. Let’s discuss some other tasks, othe

The CPA is involved in many aspects of accounting and business. Let's discuss some other…

2 years ago

For your initial post, share your earliest memory of a laser. Compare and contrast your first percep

For your initial post, share your earliest memory of a laser. Compare and contrast your…

2 years ago

2. The Ajax Co. just decided to save $1,500 a month for the next five years as a safety net for rece

2. The Ajax Co. just decided to save $1,500 a month for the next five…

2 years ago

How to make an insertion sort to sort an array of c strings using the following algorithm: * beg, *

How to make an insertion sort to sort an array of c strings using the…

2 years ago

Assume the following Keynesian income-expenditure two-sector model:

Assume the following Keynesian income-expenditure two-sector model:                                                AD = Cp + Ip                                                Cp = Co…

2 years ago