Instructions The deliverables for your Project Paper Assignment include a Word d

Instructions
The deliverables for your Project Paper Assignment include a Word document that answers the questions described below. Your final paper should be between 10 to 15 pages long (longer is perfectly acceptable without penalty). Be sure the report is in MS Word, Times New Roman 12-pt font, with double spacing and 1 inch margins all-around, no additional spaces allowed. Cover page and references pages are also required in proper APA format.  In text citations must match the reference list provided
Heavy Metal Engineering (HME), a manufacturing organization that creates metal shell casings for very high-end washer and dryer products has suppliers and customers world-wide, as well as world-wide offices. HME the US Corporate office in NY hires you as a professional Information Assurance consultant.
HME is looking to receive some significant third party funding for an international joint venture but was told they would be denied because they do not have any kind of Information Assurance plan to keep all data assets secure.  You are required to create a comprehensive IA strategy that includes the following:
A detailed overview of what Information Assurance entails covering all the basics for an IA strategy (what will be protected and from what)
A plan or strategy for IA implementation including a framework
A complete risk mitigation strategy that completely outlines your plans to mitigate risks associated with operating in the 21st century workplace.
Select an accrediting body to ensure IA is not only a process but a part of organizational culture going forward
An incident response and disaster recovery plan in the event of intrusion and disaster
All sections should be clearly labeled and a separate section in each area specifically for justifications of your selection/proposal.
Your thoughts must be solidified with viable sources consistent with graduate level work.  No more than 2 sources may be used with ND or no author.  Scholarly and Peer reviewed sources are expected to be used throughout the bulk of this paper. 

Week 8 Discussion  There are many methods, mechanisms, and practices discussed f

Week 8 Discussion 
There are many methods, mechanisms, and practices discussed for the management of security. Discuss what you deem is the most effective security management framework for your organization and why.  Peers in your responses, I encourage you to respectably rebut their selection and or point out the gaps/vulnerabilities?
Example: Use as example only.
Hello everyone, 
            Here we are again at the end of yet another course. Hope everyone had a great Thanksgiving holiday and didn’t eat too much. This week we are discussing what we perceive as the most effective security management framework for our organization and why. Being in the military the last 20+ years, I would have to select the defense in depth method. A defense in depth method leverages multiple overlapping security measures including administrative, physical, and logical / technical controls. Administrative controls include such mechanisms as access control restrictions, having employees sign acceptable use agreements, and posting regulations banning unauthorized employee activities. Separately, physical controls include the use of fences, gates, security cameras, badge readers, door locks and keypads. Physical access controls tend to garner much of the focus due to the ability to physically see the security mechanisms in place, as opposed to administrative or logical controls. Lastly, logical controls include the use of network firewalls, encryption, patch management, and antivirus/anti-malware protection. There are numerous other mechanisms and access control measures that are included in a defense in depth strategy, but as we learned in the first week’s reading regarding the multiple areas of security, each layer’s defense is complemented and reliant on all the other layers of security. 
-Chris
Reference:
Fortinet. (2022). Defense in depth. Fortinet, Inc. Retrieved November 26, 2022, from https://www.fortinet.com/resources/cyberglossary/defense-in-depth.
Jacobs, S. (2015). Engineering information security: The application of systems engineering concepts to achieve information assurance. John Wiley & Sons, Incorporated.

Briefly critique the article by identifying both its strong elements and those that were less compelling.

I attached the article and an example as well.
Instructions
This assignment requires that you select one of the mandatory reading resources assigned for either Week 1 or Week 2 and deconstruct it into its primary elements, namely:
The Research Question;
The Thesis;
The Claims or argument;
The Evidence or supporting facts; and,
The Conclusion(s)
1. After you choose the scholarly resource (from among the Week 1 or Week 2 required readings), download it into a Microsoft Word document. Locate the elements by annotating with the “highlight” tool and/or using the Comments tool (available on the “Review” tab on the top of the page) to provide remarks in the margins.
2. Briefly critique the article by identifying both its strong elements and those that were less compelling.
3. Finally, assess this resource’s utility to you after you have broken it down through this deconstruction process and understand the argument and facts that the author used to support his/her claims. You may write at the bottom of the article itself or provide your answers in a separate Word document. Your critique should be no longer than a single double-spaced written page.
Please provide a complete citation for your chosen resource in either Bluebook or APA format (do not mix the two styles).THIS EXERCISE WILL PREPARE YOU TO WRITE YOUR OWN PAPERS AND ARTICLES!THERE WILL BE AN EXAMPLE IN THE CONTENT SECTION.When you have completed your exercise, please title it NameW3.doc and upload it in the Assignments module.
Make sure to look at this example: Corporate Warriors. (attached)

As you do so, please be sure to address the application of this topic’s facts, relevant procedures (legal, ethical and/or technical), as well as the concepts that you believe link all of these concepts together within your legal analysis.

Critique the legal and ethical aspects of the Massachusetts Institute of Technology (MIT) analysis of the Aaron Swartz criminal case and subsequent suicide, which is outlined in one of this week’s readings.  As you do so, please be sure to address the application of this topic’s facts, relevant procedures (legal, ethical and/or technical), as well as the concepts that you believe link all of these concepts together within your legal analysis.