SlideShare a Scribd company logo
The final step in developing the network security plan is to
define how the plan that you have developed will be
implemented within the organization. Implementing security
controls and adding security devices can be a complex process
that will affect every aspect of the organization. A detailed plan
that phases in controls and new devices—and has a backup plan
for any problems—will greatly increase the success rate of
implementing a network security plan.
· For this assignment, you will add a detailed implementation
plan of 4–5 pages, which will describe your proposed solution
for the implementation of a network security plan in your
organization.
· Finally, you will refine the Network Security Plan
document to produce the final draft version. Updates may be
based upon peer and instructor feedback.
The project deliverables are the following:
· Update the Network Security Plan with a new date.
· Update the previously completed sections based upon your
peers' and instructor's feedback.
· Implementation Plan
· Develop a plan to implement the security controls and policies
that you identified in previous sections.
· Develop a plan to implement new security devices and modify
existing security devices that are required to monitor the
network and the polices that were created or updated.
· Describe how these controls, policies, and security devices
have addressed the key security areas of confidentiality,
integrity, authentication, authorization, and nonrepudiation
cryptographic services.
· Network Security Plan
· Revise the entire document, and make any necessary changes
and improvements.
· Ensure that the final version is sufficiently detailed to allow
the organization to confidently move forward with the
implementation of the security controls and devices based upon
your recommendations.
· Previous instructor feedback should be addressed with
appropriate changes.
· Update your table of contents before submission.
Network Security Plan
This course has been composed of a series of Individual Project
assignments that have contributed to a Key Assignment
submission at the end of the course. Each week, you have
completed a part of a network security plan. The full Key
Assignment should include the following tasks:
· Overview of Network and Existing Security (Week 1)
· Select an organization as the target for the analysis.
· Provide an overview of the organization's existing network
architecture.
· The overview will include description of the network, the
topology, protocols allowed, connectivity methods and network
equipment, number of routers, switches, and any other network
equipment, such as VPN concentrators, proxies, etc.
· Provide a summary of the current security devices currently in
use on the network.
· List the type of device, the vendor, and give a brief
description of how the device is used.
· Risk Assessment (Week 2)
· Conduct an inventory of the devices within your network.
Provide a summary of the number of desktops, laptops, network
printers, and servers.
· Identify key assets
· Assets also include records and sensitive information that
requires special protection.
· Prioritize each asset or group of assets, and assign a value to
each.
· Identify and describe the risks within your environment.
· Do not forget natural disasters.
· Determine the likelihood that the risk could occur.
· Identify the tools and methodology that you would use to
conduct the risk assessment.
· Security Architecture Plan (Week 3)
· Based upon the risk assessment and your analysis, create an
action plan to mitigate the risks that you have identified.
· Identify and select appropriate technologies to protect the
network and the organization’s information, and explain why
you chose each technology.
· Describe where you plan to place these technologies in the
network, and explain why.
· The plan should cover all layers of the OSI model.
· Identify additional software that will be required to monitor
the network and protect key assets.
· Identify security controls that need to be implemented to assist
in mitigating risks.
· Security Policies (Week 4)
· Create the Key Assignment first draft for peer review.
· Continue the development of the plan.
· Create a fourth section in the plan to list all of the policies
you would have for your organization and a brief description of
what each policy will contain.
· Each policy will address how you plan to monitor the policy
and what the appropriate punishments should be for violators.
· Provide a timetable for when these policies should be
reviewed and updated.
· Continue development of the Network Security Plan with an
Incident Response Plan of 2–3 pages.
· Include the actions that need to occur when an incident is in
progress.
· Include how your organization will identify and classify
incidents, what the response will be, and the plan to recover.
· Implementation and Incident Response (Week 5)
· Analyze previous submissions, and make changes as necessary
to the final paper.
· Submit a detailed implementation plan of 4–5 pages that will
describe your proposed solution for the implementation of the
Network Security Plan for the organization.
· This is the last and final section of the Key Assignment and
should bring together all aspects of the implementation in one
cohesive paper.
· Revise the previous sections so that the entire plan flows and
has a strong introduction and conclusion.
· Submit the final Key Assignment.
Human Services Professional Worksheet
BSHS/355 Version 4
1
University of Phoenix Material
Human Services Professional Worksheet
Resource: Review theHelp Guide and Ch. 2 of Human Services
in Contemporary America.
Select three agency types from the following list:
· A drug and alcohol treatment program
· A homeless shelter
· A day treatment drop-in center for teenagers
· A hospital rehabilitation center
· A physical rehabilitation center
· A crisis intervention center
· An outpatient mental health center
· Centers to help transitioning immigrants
· Adult daycare centers
· Emergency response agencies
Complete the table for the chosen agencies by providing a 60-
to 85-word response in each column. An example has been
completed as a guide. Include properly formatted APA in-text
citations in the table, as well as an APA reference at the end of
the worksheet. An example has been completed as a guide.
The agency
Description of the agency
Who they serve
Professionals involved with the agency
The professional’s role
A domestic violence program
A domestic violence program provides protection and resources
to individuals treated violently by their spouses or partners.
These programs can have many components. Shelters are
available for individuals needing protection from violence.
Additionally, some services provide resources to individuals
once they leave the shelter to help them regain independence.
As mentioned, this program may provide protection for affected
individuals, but it may also provide protection for children in
the individual’s care. There are generally a large percentage of
young children in need of protection in addition to the
individual seeking help. These programs generally do not
provide service for males, as outpatient services are generally
offered to the female population. Although the majority of
domestic violence victims are women, as many as 24,000 men
report being abused each year (Burger, 2014, pg 76)
In many residential programs, counselors provide advice and
counseling. They assist residents to lead their lives away from
their abusers.
Victims in the program wishing to move on with their lives,
away from the perpetrator, will find advocates available to work
with them. These advocates help program participants find
work, housing, legal support, and other community services.
Some shelters can provide some form of legal assistance.
The role of professionals working in shelters is to help program
participants cope with the abuse, as well as losing their home
and community. This is often a traumatic time for victims.
Oftentimes, victims come to the shelter with nothing and need
help putting their lives back together. The role of the
professional is to help them find work and shelter, rebuild their
lives, and assist in their emotional recovery.
References
Burger, W. R. (2014). Human services in contemporary America
(9th ed.). Belmont, CA: Brooks/Cole, Cengage Learning.
The final step in the planning phase is to review the plan to
ensure that the Information Security Assurance Implementation
Plan adequately addresses the requirements and that it is
sufficiently detailed to allow the organization to move forward
with the implementation phase based on your plan. This is also
a good time to identify a model to ensure the development of
secure Web-based and platform-based applications. In addition,
you should identify methods to assess compliance with your
plan.
For this assignment, you will add 3–4 pages describing a
security-driven life cycle development model to prevent
security holes for Web-based and platform-based applications,
as well as methods to assess compliance with your plan and to
assure the security of the organization’s information. Finally,
you will further refine the Information Security Assurance
Implementation Plan to produce the final draft version. Updates
may be based on peer and instructor feedback.
The project deliverables for Week 5 are as follows:
· Update the Information Security Assurance Implementation
Plan title page with the new date.
· Update the previously completed sections based on the
instructor's feedback.
· Assessment and Assurance
· Describe a security-driven life cycle development model to
prevent security holes in applications for the organization.
· Describe methods that will be used to assess compliance with
the implementation plan and policies outlined in your plan and
to assure the security of the organization’s information.
· Information Security Assurance Implementation Plan final
draft
· Review the entire document for any changes and
improvements that you would like to make.
· Ensure that this final version of the plan is sufficiently
detailed to allow the organization to move forward with the
implementation phase based on your plan.
· Any previous instructor feedback should be addressed with
appropriate changes.
· Be sure to update your table of contents before submission.
· Name the document "yourname_CS661_IP5.doc."
· Be sure to cite all references in APA format.
The final step in developing the network security plan is to defin.docx

More Related Content

DOCX
7Crisis Response PortfolioYour NameWalden Univer.docx
DOCX
The Rookie Chief Information Security OfficerDue Week 10 and w.docx
DOCX
Bolton Health Service Secure Network Design.docx
DOCX
CYB610 Project Common computing platforms.docx
DOCX
Term Paper The Rookie Chief Information Security OfficerD
DOCX
Careers in PsychologyPSY215 Version 4University of Phoeni.docx
DOCX
The Rookie Chief Information Security OfficerThis assignment c.docx
DOCX
Running Head CIGO .docx
7Crisis Response PortfolioYour NameWalden Univer.docx
The Rookie Chief Information Security OfficerDue Week 10 and w.docx
Bolton Health Service Secure Network Design.docx
CYB610 Project Common computing platforms.docx
Term Paper The Rookie Chief Information Security OfficerD
Careers in PsychologyPSY215 Version 4University of Phoeni.docx
The Rookie Chief Information Security OfficerThis assignment c.docx
Running Head CIGO .docx

Similar to The final step in developing the network security plan is to defin.docx (20)

DOCX
Project 7 Organization Security PlanChoose an organization from.docx
DOCX
Term Paper The Rookie Chief Information Security OfficerThis assi.docx
DOCX
The Rookie Chief Information Security OfficerWorth 200 poi
DOCX
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docx
DOCX
This assignment consists of five (5) parts     Part 1 Organi.docx
DOCX
Running Head SECURITY AWARENESSSecurity Awareness .docx
DOCX
MODULE 7 UNIT 3Ongoing projectHAR CYB Module 7 Unit 3 Ongoin.docx
DOCX
PurposeThis course project is intended to assess your abilit
PDF
Ch08 8 Information Security Process it-slideshares.blogspot.com
DOCX
The Rookie Chief Information Security OfficerThis assignme
DOCX
ISOL 533 - Information Security and Risk Management R.docx
DOCX
Responses needed, a paragraph per bullet question (7-8 sentences).docx
DOCX
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
DOCX
ISSC368_Final_Project Proposal_Wk8_Intindolo
DOCX
Project 7 - Organization Security PlanChoose an organization fro.docx
DOCX
ISE 620 Final Project Guidelines and Rubric Overview .docx
DOCX
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx
DOCX
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx
DOCX
Term Paper The Rookie Chief Information Security Officer.docx
DOCX
Cis 333 Success Begins / snaptutorial.com
Project 7 Organization Security PlanChoose an organization from.docx
Term Paper The Rookie Chief Information Security OfficerThis assi.docx
The Rookie Chief Information Security OfficerWorth 200 poi
Running Head STATEMENT OF WORKSTATEMENT OF WORK .docx
This assignment consists of five (5) parts     Part 1 Organi.docx
Running Head SECURITY AWARENESSSecurity Awareness .docx
MODULE 7 UNIT 3Ongoing projectHAR CYB Module 7 Unit 3 Ongoin.docx
PurposeThis course project is intended to assess your abilit
Ch08 8 Information Security Process it-slideshares.blogspot.com
The Rookie Chief Information Security OfficerThis assignme
ISOL 533 - Information Security and Risk Management R.docx
Responses needed, a paragraph per bullet question (7-8 sentences).docx
Assignment 1 Designing Compliance within the LAN-to-WAN DomainN.docx
ISSC368_Final_Project Proposal_Wk8_Intindolo
Project 7 - Organization Security PlanChoose an organization fro.docx
ISE 620 Final Project Guidelines and Rubric Overview .docx
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx
Running head FEASIBILITY REPORT1FEASIBILITY REPORT6.docx
Term Paper The Rookie Chief Information Security Officer.docx
Cis 333 Success Begins / snaptutorial.com
Ad

More from mehek4 (20)

DOCX
Accident Up Ahead!Listen to this text being read aloud by a hu.docx
DOCX
Access the annual report provided in Course Materials to complete .docx
DOCX
Access the Internet to acquire a copy of the most recent annual re.docx
DOCX
Acc 290 Final Exam MCQs) Which financial statement is used to de.docx
DOCX
AC2760Week 2 Assignment.docx
DOCX
AC1220 Lab 5.1IntroductionJake determines that owning the .docx
DOCX
Abstract(Provide the main generalizable statement resulting .docx
DOCX
Abusive relationships are at the core of the Coetzee novel, whether .docx
DOCX
Abraham, J., Sick, B., Anderson, J., Berg, A., Dehmer, C., & Tufano,.docx
DOCX
Abraham, J., Sick, B., Anderson, J., Berg, A., Dehmer, C., & Tufan.docx
DOCX
A.Da la correcta conjugación para cada oración.(Give the corre.docx
DOCX
Abraham Lincoln is considered by many historians to be the greatest .docx
DOCX
About half of the paid lobbyists in Washington are former government.docx
DOCX
ABC sells 400 shares of its $23 par common stock for $27. The entry .docx
DOCX
ABC company is increasing its equity by selling additional shares to.docx
DOCX
A.The unification of previously fractious and divided Arab tribes.docx
DOCX
A.Escribe la forma correcta del verbo en españolNosotros siem.docx
DOCX
A.Both countries fought for independence from Great Britain, b.docx
DOCX
a.A patent purchased from J. Miller on January 1, 2010, for a ca.docx
DOCX
A.) Imagine that astronomers have discovered intelligent life in a n.docx
Accident Up Ahead!Listen to this text being read aloud by a hu.docx
Access the annual report provided in Course Materials to complete .docx
Access the Internet to acquire a copy of the most recent annual re.docx
Acc 290 Final Exam MCQs) Which financial statement is used to de.docx
AC2760Week 2 Assignment.docx
AC1220 Lab 5.1IntroductionJake determines that owning the .docx
Abstract(Provide the main generalizable statement resulting .docx
Abusive relationships are at the core of the Coetzee novel, whether .docx
Abraham, J., Sick, B., Anderson, J., Berg, A., Dehmer, C., & Tufano,.docx
Abraham, J., Sick, B., Anderson, J., Berg, A., Dehmer, C., & Tufan.docx
A.Da la correcta conjugación para cada oración.(Give the corre.docx
Abraham Lincoln is considered by many historians to be the greatest .docx
About half of the paid lobbyists in Washington are former government.docx
ABC sells 400 shares of its $23 par common stock for $27. The entry .docx
ABC company is increasing its equity by selling additional shares to.docx
A.The unification of previously fractious and divided Arab tribes.docx
A.Escribe la forma correcta del verbo en españolNosotros siem.docx
A.Both countries fought for independence from Great Britain, b.docx
a.A patent purchased from J. Miller on January 1, 2010, for a ca.docx
A.) Imagine that astronomers have discovered intelligent life in a n.docx
Ad

Recently uploaded (20)

PPTX
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
PDF
Trump Administration's workforce development strategy
PPTX
202450812 BayCHI UCSC-SV 20250812 v17.pptx
PPTX
Cell Structure & Organelles in detailed.
PDF
A systematic review of self-coping strategies used by university students to ...
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
Chinmaya Tiranga quiz Grand Finale.pdf
PDF
Computing-Curriculum for Schools in Ghana
PPTX
UNIT III MENTAL HEALTH NURSING ASSESSMENT
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
Practical Manual AGRO-233 Principles and Practices of Natural Farming
PPTX
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
PDF
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PPTX
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
PDF
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
PDF
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
PDF
Weekly quiz Compilation Jan -July 25.pdf
PPTX
History, Philosophy and sociology of education (1).pptx
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
1st Inaugural Professorial Lecture held on 19th February 2020 (Governance and...
Trump Administration's workforce development strategy
202450812 BayCHI UCSC-SV 20250812 v17.pptx
Cell Structure & Organelles in detailed.
A systematic review of self-coping strategies used by university students to ...
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Chinmaya Tiranga quiz Grand Finale.pdf
Computing-Curriculum for Schools in Ghana
UNIT III MENTAL HEALTH NURSING ASSESSMENT
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
Practical Manual AGRO-233 Principles and Practices of Natural Farming
UV-Visible spectroscopy..pptx UV-Visible Spectroscopy – Electronic Transition...
2.FourierTransform-ShortQuestionswithAnswers.pdf
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
Radiologic_Anatomy_of_the_Brachial_plexus [final].pptx
RTP_AR_KS1_Tutor's Guide_English [FOR REPRODUCTION].pdf
The Lost Whites of Pakistan by Jahanzaib Mughal.pdf
Weekly quiz Compilation Jan -July 25.pdf
History, Philosophy and sociology of education (1).pptx
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student

The final step in developing the network security plan is to defin.docx

  • 1. The final step in developing the network security plan is to define how the plan that you have developed will be implemented within the organization. Implementing security controls and adding security devices can be a complex process that will affect every aspect of the organization. A detailed plan that phases in controls and new devices—and has a backup plan for any problems—will greatly increase the success rate of implementing a network security plan. · For this assignment, you will add a detailed implementation plan of 4–5 pages, which will describe your proposed solution for the implementation of a network security plan in your organization. · Finally, you will refine the Network Security Plan document to produce the final draft version. Updates may be based upon peer and instructor feedback. The project deliverables are the following: · Update the Network Security Plan with a new date. · Update the previously completed sections based upon your peers' and instructor's feedback. · Implementation Plan · Develop a plan to implement the security controls and policies that you identified in previous sections. · Develop a plan to implement new security devices and modify existing security devices that are required to monitor the network and the polices that were created or updated. · Describe how these controls, policies, and security devices have addressed the key security areas of confidentiality, integrity, authentication, authorization, and nonrepudiation cryptographic services. · Network Security Plan · Revise the entire document, and make any necessary changes and improvements. · Ensure that the final version is sufficiently detailed to allow the organization to confidently move forward with the
  • 2. implementation of the security controls and devices based upon your recommendations. · Previous instructor feedback should be addressed with appropriate changes. · Update your table of contents before submission. Network Security Plan This course has been composed of a series of Individual Project assignments that have contributed to a Key Assignment submission at the end of the course. Each week, you have completed a part of a network security plan. The full Key Assignment should include the following tasks: · Overview of Network and Existing Security (Week 1) · Select an organization as the target for the analysis. · Provide an overview of the organization's existing network architecture. · The overview will include description of the network, the topology, protocols allowed, connectivity methods and network equipment, number of routers, switches, and any other network equipment, such as VPN concentrators, proxies, etc. · Provide a summary of the current security devices currently in use on the network. · List the type of device, the vendor, and give a brief description of how the device is used. · Risk Assessment (Week 2) · Conduct an inventory of the devices within your network. Provide a summary of the number of desktops, laptops, network printers, and servers. · Identify key assets · Assets also include records and sensitive information that requires special protection. · Prioritize each asset or group of assets, and assign a value to each. · Identify and describe the risks within your environment. · Do not forget natural disasters. · Determine the likelihood that the risk could occur.
  • 3. · Identify the tools and methodology that you would use to conduct the risk assessment. · Security Architecture Plan (Week 3) · Based upon the risk assessment and your analysis, create an action plan to mitigate the risks that you have identified. · Identify and select appropriate technologies to protect the network and the organization’s information, and explain why you chose each technology. · Describe where you plan to place these technologies in the network, and explain why. · The plan should cover all layers of the OSI model. · Identify additional software that will be required to monitor the network and protect key assets. · Identify security controls that need to be implemented to assist in mitigating risks. · Security Policies (Week 4) · Create the Key Assignment first draft for peer review. · Continue the development of the plan. · Create a fourth section in the plan to list all of the policies you would have for your organization and a brief description of what each policy will contain. · Each policy will address how you plan to monitor the policy and what the appropriate punishments should be for violators. · Provide a timetable for when these policies should be reviewed and updated. · Continue development of the Network Security Plan with an Incident Response Plan of 2–3 pages. · Include the actions that need to occur when an incident is in progress. · Include how your organization will identify and classify incidents, what the response will be, and the plan to recover. · Implementation and Incident Response (Week 5) · Analyze previous submissions, and make changes as necessary to the final paper. · Submit a detailed implementation plan of 4–5 pages that will describe your proposed solution for the implementation of the
  • 4. Network Security Plan for the organization. · This is the last and final section of the Key Assignment and should bring together all aspects of the implementation in one cohesive paper. · Revise the previous sections so that the entire plan flows and has a strong introduction and conclusion. · Submit the final Key Assignment. Human Services Professional Worksheet BSHS/355 Version 4 1 University of Phoenix Material Human Services Professional Worksheet Resource: Review theHelp Guide and Ch. 2 of Human Services in Contemporary America. Select three agency types from the following list: · A drug and alcohol treatment program · A homeless shelter · A day treatment drop-in center for teenagers · A hospital rehabilitation center · A physical rehabilitation center · A crisis intervention center · An outpatient mental health center · Centers to help transitioning immigrants · Adult daycare centers · Emergency response agencies
  • 5. Complete the table for the chosen agencies by providing a 60- to 85-word response in each column. An example has been completed as a guide. Include properly formatted APA in-text citations in the table, as well as an APA reference at the end of the worksheet. An example has been completed as a guide. The agency Description of the agency Who they serve Professionals involved with the agency The professional’s role A domestic violence program A domestic violence program provides protection and resources to individuals treated violently by their spouses or partners. These programs can have many components. Shelters are available for individuals needing protection from violence. Additionally, some services provide resources to individuals once they leave the shelter to help them regain independence. As mentioned, this program may provide protection for affected individuals, but it may also provide protection for children in the individual’s care. There are generally a large percentage of young children in need of protection in addition to the individual seeking help. These programs generally do not provide service for males, as outpatient services are generally offered to the female population. Although the majority of domestic violence victims are women, as many as 24,000 men report being abused each year (Burger, 2014, pg 76) In many residential programs, counselors provide advice and counseling. They assist residents to lead their lives away from their abusers. Victims in the program wishing to move on with their lives, away from the perpetrator, will find advocates available to work with them. These advocates help program participants find work, housing, legal support, and other community services. Some shelters can provide some form of legal assistance.
  • 6. The role of professionals working in shelters is to help program participants cope with the abuse, as well as losing their home and community. This is often a traumatic time for victims. Oftentimes, victims come to the shelter with nothing and need help putting their lives back together. The role of the professional is to help them find work and shelter, rebuild their lives, and assist in their emotional recovery. References Burger, W. R. (2014). Human services in contemporary America (9th ed.). Belmont, CA: Brooks/Cole, Cengage Learning. The final step in the planning phase is to review the plan to ensure that the Information Security Assurance Implementation Plan adequately addresses the requirements and that it is sufficiently detailed to allow the organization to move forward with the implementation phase based on your plan. This is also a good time to identify a model to ensure the development of secure Web-based and platform-based applications. In addition, you should identify methods to assess compliance with your plan. For this assignment, you will add 3–4 pages describing a
  • 7. security-driven life cycle development model to prevent security holes for Web-based and platform-based applications, as well as methods to assess compliance with your plan and to assure the security of the organization’s information. Finally, you will further refine the Information Security Assurance Implementation Plan to produce the final draft version. Updates may be based on peer and instructor feedback. The project deliverables for Week 5 are as follows: · Update the Information Security Assurance Implementation Plan title page with the new date. · Update the previously completed sections based on the instructor's feedback. · Assessment and Assurance · Describe a security-driven life cycle development model to prevent security holes in applications for the organization. · Describe methods that will be used to assess compliance with the implementation plan and policies outlined in your plan and to assure the security of the organization’s information. · Information Security Assurance Implementation Plan final draft · Review the entire document for any changes and improvements that you would like to make. · Ensure that this final version of the plan is sufficiently detailed to allow the organization to move forward with the implementation phase based on your plan. · Any previous instructor feedback should be addressed with appropriate changes. · Be sure to update your table of contents before submission. · Name the document "yourname_CS661_IP5.doc." · Be sure to cite all references in APA format.