Topic is Doctorondemand AppFill the Project Milestone 5 part , for the file attached “only Project Milestone 5 part ” Project Milestone 5—Network Security and Management ActivitiesSubmission: Network Security and Management Activities due by end of Week 7Please use the network security and management activities page of the project submission template, and save it as a Word document file called MIS589_Lastname_Firstname_Project.docx.Milestone 5/Network Security and Management activities is due by end of Week 5. You may begin to work on the identifying threats table and the threat scenario and control table by Week 6 itself.Please submit the entire project document (including all milestones) in the Dropbox for Week 7.I. Network Security and Management Activities1. Identifying ThreatsCreate a sample inventory of five main information assets in the company. Please follow the example in Figure 11-4 in the textbook. Complete the inventory of assets table provided in the Project Milestone 5/Network Security and Management page of the project template. 2. Threat Scenario and ControlFor any one of the assets identified in inventory of assets table, identify possible threats and create a threat scenario and control table provided in the Project Milestone 5/Network Security and Management page of the project template. Please refer to the examples provided in Figures 11-6 and 11-7 in the textbook to guide you in completing the table.3. Network Manager Job PostingCreate a job advertisement for a network manager for your proposed network. Please use the required skill set as needed from the sample network manager job requirements in Chapter 12 management focus insert 12.8 of the textbook. Please check out various job postings for network manager from the Internet, and modify that posting to suit your hypothetical company’s need. You need to give a very brief introduction (less than 200 words) of your company before posting the job requirements. Please mention any additional perks and benefits that may attract future employees at the very end of the job posting. You need to give a contact e-mail address or provide a link to apply.4. Project ExperiencePlease use this section to recount your project experience by answering the questions given in the template.II. Grading Rubric: Milestone 5—Network Security and Management Activities (60 points)Identifying threats—You need five different information assets and a completed table. (15 points)Threat scenario and control—Complete tables identifying possible threats for the assets. (20 points)Network manager job posting (10 points)Project experience (10 points)Quality work, editing, and clear language (5 points)
Delivering a high-quality product at a reasonable price is not enough anymore.
That’s why we have developed 5 beneficial guarantees that will make your experience with our service enjoyable, easy, and safe.
You have to be 100% sure of the quality of your product to give a money-back guarantee. This describes us perfectly. Make sure that this guarantee is totally transparent.
Read moreEach paper is composed from scratch, according to your instructions. It is then checked by our plagiarism-detection software. There is no gap where plagiarism could squeeze in.
Read moreThanks to our free revisions, there is no way for you to be unsatisfied. We will work on your paper until you are completely happy with the result.
Read moreYour email is safe, as we store it according to international data protection rules. Your bank details are secure, as we use only reliable payment systems.
Read moreBy sending us your money, you buy the service we provide. Check out our terms and conditions if you prefer business talks to be laid out in official language.
Read more