This is a two-part deliverable using MS Word and MSVisio, or

This is a two-part deliverable using MS Word and MSVisio, or their open source equivalents. You are the Chief SecurityOfficer (CSO) of a law office that occupies four (4) floors of ahigh-rise building in downtown Washington, D.C. There are approximately50 PCs on the first floor, 150 PCs on the second floor, and 40 PCs onboth the third and fourth floors. The servers for each department resideon their respective floors. The director of the accounting departmenthas expressed concerns about the security of his files. For thisassignment, you will explain the key functions of a cyber-securitypolicy catalog. Note: You may create and / or make all necessary assumptions needed for the completion of this assignment.Submission RequirementsDocument (MS Word)Microsoft Visio Plan (MS Visio)Section 1Write a three to four (3-4) page deliverable in which you:Explain the major cyber governance issues in an organization and,because of those issues, examine how organizations develop communicationprotocols.Describe the security issues found on a network, and arrange themfrom highest to lowest, mapping out security loopholes to justify youranswer.Differentiate between intellectual property theft and cyberespionage. Determine how you, as the CSO of an organization, would dealwith both cases and what standard operating procedures you would follow.Section 2 4. Using Microsoft Visio, or an open source alternative such asDia, illustrate the flow of data for both input and output informationin an infrastructure. The diagram must map any issues in terms of acyber-infrastructure.Your assignment must follow these formatting requirements:Be typed, double spaced, using Times New Roman font (size 12), withone-inch margins on all sides; citations and references must follow APAor school-specific format. Check with your professor for any additionalinstructions.Include a cover page containing the title of the assignment, thestudent’s name, the professor’s name, the course title, and the date.The cover page and the reference page are not included in the requiredassignment page length.The specific course learning outcomes associated with this assignment are:Discuss the threats of modern technology in the workplace.Discuss how policies play an important role in techniques adopted for cybersecurity.Discuss the various issues related to cyber governance, cyber users, cyber management, and cyber infrastructure.Use technology and information resources to research issues in information assurance.Write clearly and concisely about information assurance topics using proper writing mechanics and technical style conventions.