Evaluate security policy clauses

Assignment Help Basic Computer Science
Reference no: EM131412078

Hands-On Project 13-2: Conducting Security Policy Analysis

Objective: Evaluate security policy clauses, identify deficiencies, and update policies in response to events or changes.

Description: Security policies should be revised to address security breaches or new threats. In this project, you evaluate the theft of proprietary information and identify some obvious deficiencies in a security policy. Then you recommend changes to the security policy to prevent similar incidents from recurring.

A local branch office of a major national stock brokerage had no policy that required the termination of user ID and password privileges after employees leave. A senior trader left the brokerage and was hired by a competing brokerage. Shortly thereafter, the first brokerage lost two clients who said they were moving to a competing firm; their personal data files disappeared mysteriously from the company's databases. In addition, a year-end recommendations report that the senior trader had been preparing was released two weeks early by the competing brokerage. An investigation of the company's access logs revealed that the employee records file had been accessed by someone outside the company. The job records, however, did not reveal whether the report had been stolen because they had not been set up to record object accesses in a log.
The existing security policy states the following:

"On termination, employees shall surrender any laptops, disks, or computer manuals they have in their possession. They are no longer authorized to access the network, and they shall not take any hardware or software when they leave the office."

1. What changes would you make to the existing security policy so that security is improved after employees are terminated?

2. Brainstorm for ideas to develop a security policy clause that covers access of company records and helps track when files are accessed.

Reference no: EM131412078

Questions Cloud

Analyze the impact of narration on storys tone and meaning : In light of contemporary issues and writing style, analyze the impact of narration/voice on each story's tone and meaning. How does the narrative style help to define the characters? How does it help to convey meaning? In your post, make specifi..
Consider the recent performance : Describe the company, consider the recent performance (take five years) of the shares have selected. That means that you have to research the price of the chosen share five years ago and today.
Which one would generally give a better estimate : If you have a choice between two estimates, the sample mean from a sample of size 5 and a sample mean from a sample of size 10, which one would generally give a "better" estimate? Clearly state your definition of "better."
Calculate the amount of money : Emma place euro 8000in a bank account that pays nominal interest rate of 5 percent per annum, compounded quarterly. Calculate the amount of money that Emma would have in her account after 15 years.
Evaluate security policy clauses : Evaluate security policy clauses, identify deficiencies, and update policies in response to events or changes
Prepare a journal entry to record completed production : Accounting 103 Midterm Examination Part 1. Assume the completed production for August includes Job 317, 318, and 319 with total costs of $31,000, $18,000, and $22,000 respectively. Determine the cost of unfinished jobs at August 31 and prepare a jou..
Find the margins of error associated with a given chance : If you have studied the central limit theorem, find the margins of error associated with a chance of .90 and a chance of .95. Compare these values with those calculated in step 2.
Shares of abc corporation stock : Mr. R. owns20,000 shares of ABC Corporation stock. The company is planning to issue a stock dividend. Before the dividend Mr. R. owned 10 percent of the outstandingstock, which had a market value of$200,000, or$10 per share. Upon receiving the 10 ..
What are primary and secondary markets : What are primary and secondary markets? What is the difference between a primary market and a secondary market? Your response should be at least 200 words in length.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd