Reference no: EM131121847
Security Policies
Required 3-4 pages.
You were hired as the manager for network services at a medium-sized firm. This firm has 3 offices in 3 American cities. Recently, the firm upgraded its network environment to an infrastructure that supports converged solutions. The infrastructure now delivers voice, data, video, and wireless solutions. Upon assuming the role of network manager, you started reviewing the documentation and policies in place for the environment to ensure that everything is in place for the upcoming audit. You notice that a formal network security policy is nonexistent. You need one. The current network environment and services are listed below:
• The environment hosts a customer services database.
• The e-mail service is available, with each user having his or her own mailbox.
• There is a sales team of 20 staff. They work remotely using laptops.
• A routed voice network exists between offices.
• Web services are available to clients on the Internet.
• Wireless services cover public areas and conferences rooms.
Considering the network environment, services, and solutions that are supported, develop a network security policy of 3-4 pages for the environment.
• Give consideration to each service, and recommend protection measures.
• Risk mitigation is of extreme importance.
• Confidentiality and integrity are important factors of network security. However, it should not affect availability.
Discuss the arguments for and against the capitalization
: Calculate Darby Sporting Goods Inc.'s 2011 depreciation expense, for book purposes, for each of the properties acquired from Encino Athletic Equipment Company.
|
Scheduling and the interchange argument
: (Scheduling and the Interchange Argument) In some scheduling problems it is useful to try to characterize a globally optimal solution based on the fact that it is locally optimal with respect to the 2-OPT heuristic.
|
Result in the process with six- sigma capability
: Natural Foods sells Takeoff, a breakfast cereal, in one-pound boxes. According to Food and Drug Administration (FDA) regulations, a one- pound box must contain at least 15.5 ounces of cereal. However, Natural Food’s box- filling process is not perfec..
|
Scheduling problems viewed as assignment problems
: (Scheduling Problems Viewed as Assignment Problems) A machine can be used to perform a subset of N given tasks over T time periods. At each time period t, only a subset A(t) of tasks can be performed. Each task j has value j (t) when performed at ..
|
Develop a network security policy for environment
: Give consideration to each service, and recommend protection measures. Risk mitigation is of extreme importance. Confidentiality and integrity are important factors of network security. However, it should not affect availability.
|
Despite social differences among individuals-culture-race
: Sociologists explain that despite social differences among individuals, such as language, culture, race, ethnicity, religion, age, gender, and social class, we all have the capacity to communicate with one another. Discuss the following: What are som..
|
Rollout algorithms based on greedy algorithms
: Rollout Algorithms Based on Greedy Algorithms) In the context of the rollout algorithm, suppose that given a partial solution
|
Assume that the roads are usable only for logging
: Compute the amount of depreciation and depletion expense for each of the 3 years (2010, 2011, 2012). Assume that the roads are usable only for logging and therefore are included in the depletion base.
|
Determine the tension in the cable
: A 50-kg acrobat pedals her unicycle across the taut but slightly elastic cable. If the deflection at the center of the 18-m span is 75 mm, determine the tension in the cable. Neglect the effects of the weights of the cable and unicycle
|