Design a robust security plan for the company.

Assignment Help Basic Computer Science
Reference no: EM131324095

You are the information technology senior analyst at your company. Your company can be a real business where you work or a virtual business that you would like to start. In both cases, you should be familiar with the business environment and the nature of work performed at your selected company. If you need help with selecting an appropriate company, please contact your instructor.
Your CEO meets with you and assigns you the following tasks, which you will assemble in a written report to the CEO:

  • Review the company's infrastructure and identify of all types of vulnerabilities: environmental, physical, and human.
  • Suggest and discuss security models that can be used to overcome the associated security risks.
  • Design a robust security plan for the company.
  • Design a code of ethics related to the IT profession that can be applied at the company.

Describe the company you will be analyzing for the project. Include size, industry, and location. (25 Points)
Your well-written paper should meet the following requirements:

  • Paper length: 8-10 pages not including the required cover and reference pages.
  • Include at least five references in addition to the course textbook. The CSU-Global Library is a good place to find these references.
  • Format the entire paper according to the CSU-Global Guide to Writing and APA.

Reference no: EM131324095

Questions Cloud

Find moments of inertia with respect to the x and y axes : An aluminum extrusion was created in the shape at the right as shown with the origin at the lower left corner. Show all work in finding the centroid (4). Find moments of inertia with respect to the x and y axes
What is convergent evolution : What is convergent evolution? use evidence from the trees to explain how the Anolis lizards are an example of this concept.
Internalization important for respiration in animals : Why is internalization important for respiration in animals? and what does it mean?
Discuss about the conducting communication training : You are given the task of conducting communication training for new first line supervisors. Write a plan where you outline three suggestions that you will offer the supervisors to become more effective communicators. Explain each suggestion with d..
Design a robust security plan for the company. : Review the company's infrastructure and identify of all types of vulnerabilities: environmental, physical, and human.
Respiratory and gastrointestinal systems : Objective:  Discuss a disease, condition or syndrome affecting the cardiovascular system and current research, events, or interesting facts about the disease/condition/syndrome.
Identify competitor analysis with respect to oman : Identify the Mode of entry of Toyota with discuss aboutToyota mode of entry had chosen to enter into various countries - Identify 3-4 Reasons behind internationalization and justify that Toyota go internationally
Glands of the endocrine system : 1. Explain how insulin regulates glucose levels in the blood? 2. What is unique about the glands of the endocrine system?
What techniques could you use to improve the outcome : What techniques could you use to improve the outcome of this negotiation? Outline your techniques fully, incorporating suggestions from your research and readings. Explain whether you used distributive bargaining approach or integrative bargainin..

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Describe the purpose of a risk assessment risk scope and id

1. Describe the purpose of a risk assessment , risk scope and identify critical areas for an assessment. 2. Select risk assessment methodology and give your rationale behind the one you chose

  Fixed focal length f to focus

In order for a film camera with a fixed focal length F to focus on an object located a distance x from the lens, the film must be placed a distance y behind the lens. F, y, and x are related as follows

  Ip currently uses 32-bit addresses

If we could redesign IP to use the 6-byte MAC address instead of the 32-bit address, would we be able to eliminate the need for ARP? Explain why or why not.

  Identify and define device and user identity concepts

Identify and define at least two types of Application Design Considerations and explain in detail how they are carried out. Identify and define Device and User Identity concepts.

  Locate a hosted distributed database service

Locate a hosted, distributed database service. Explore its features and talk about your experiences. In what situations would an organization consider using it?

  What are quality of service metrics?

What are Quality of Service metrics?

  Comprised of a two-dimensional grid of cells

The farm area that is operated on during the game is comprised of a two-dimensional grid of cells, each representing a plot of land. These cells are referenced by a coordinate pair; e.g. (2, 3). This land can be used to cultivate crops or graze li..

  How base64 encoding handles binary data of a length

Consult the MIME RFC to find out how base64 encoding handles binary data of a length not evenly divisible by three bytes.

  Feet long and the string makes

Maria is flying a kite. If the kite string is 90 feet long and the string makes an angle of 65 degree with the ground, how high, to the nearest tenth of a foot, is the kite? (Assume that Maria is 5ft tall)

  Which of the following is a feature of .net framework

Which of the following is a feature of .net framework

  System using rsa one intercept the ciphertext

In a public-key system using RSA one intercept the ciphertext C=10 sent to a user whose public key is {e=5, n=35} Show all the work to answer te following questions:

  Computing fit into the types of traffic flow

Does cloud computing fit into the types of traffic flow discussed in the lectures (terminal/host, client/server, peer-to-peer, server/server, etc) or is it a new type of traffic flow? Why?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd