Q1. Research paper: 5 pages - Separate Document You have been hired as the CSO (Chief Security Officer) for an organization. Your job is to develop a computer and internet security policy for the organization that covers the following areas: a)Computer and email acceptable use policy b)Internet acceptable use policy c)Password protection policy Make sure you are sufficiently specific in addressing each area. There are plenty of security policy and guideline templates available online for you to use as a reference or for guidance. Your plan should reflect the business model and corporate culture of a specific organization that you select. Include at least 3 scholarly references in addition to the course textbook. At least of the references cited need to be scholarly journal articles from the library. Your paper should meet the following requirements: Q2. Research paper: 5 pages This week, you have to read about in chapter 6 of your textbook. For your written assignment this week, complete a case study of the organization you work for (use a hypothetical or other organization if more applicable) that will address the following prompts: a)Describe the organizations environment, and evaluate its preparedness for virtualization. b)Explain Microsoft (or another product) licensing for virtualized environments. c)Recommend a configuration for shared storage; make sure to discuss the need for high availability and redundancy for virtualization for the organization. d)Explain Windows Azure capabilities for virtual machines and managing a hybrid cloud, including Windows Azures Internet as a Service (IaaS) and storage capabilities Your paper should meet the following requirements: Q3. Research paper : 5 pages - Separate Document The COSO framework of internal controls is practiced within companies around the world. The objectives of the COSO framework are closely related to its five components. For this weeks activity, please discuss these five components of the COSO framework. Be sure to include each components impact on each of the COSO framework objectives. What do you feel an auditor would most be concerned with during an IT audit? Lastly, discuss suggestions for integrating COSO framework compliance into a company in which you are familiar. Your paper should meet the following requirements: