Explain ten security policies procedures and technologies

Assignment Help Computer Network Security
Reference no: EM131717472

LAB Assignment: Network Security & Recovery

Part 1: Security Issues

American Insurance does not have a computer security specialist. In the last two years the company has experienced the following security problems:

• Terminated an employee for using her supervisor's password to print confidential payroll information
• Losing productivity because employees use the Internet for personal use instead of doing their job
• An employee accidentally downloaded a computer virus from a web site that damaged his computer
• Confidential customer data was stolen from the company's server by an outside hacker
• An employee's laptop computer was stolen off his desk while he was at lunch

1. Start a new Word document with the name YourLastName Security Recovery

2. Hearing how much you learned about computer security in CISB 11, American Insurance has decided to pay you $50,000 per year to be its new "Director of Information Security".

i. Type the title: Security Policies and enter a blank line before you type your response.

ii. Using bullet points, briefly explain ten security policies, procedures, and/or technologies you would put into place during your first year on the job.

a. For each strategy, you must explain one type of security problem that the strategy would attempt to prevent.

iii. The security problem does not have to be from the list provided above.

Part 2: Disaster Recovery Plan (DRP)

Assume that American Insurance does not have a disaster recovery plan (DRP). A disaster recovery plan contains information about how to get a business back up and running AFTER a natural (earthquake, flood, tornado) or man-made (bombing, fire) disaster occurs.

3. Under your answer to Part 1 enter a few blank lines, type Disaster Recovery Plan and then type your answer to the following:

4. Assume that American Insurance does not have a disaster recovery plan. A DRP is used to restore business operations after a catastrophic event. You will probably need to research the Internet for this answer.

i. After you finish part 1, enter a two blank lines
ii. Type the title: Disaster Recovery Plan and enter a blank line before you list your response.
iii. Briefly list five (5) tasks that should be included in a disaster recovery plan (DRP) for American Insurance.
a. Bullet points are OK as long as they include enough detail to explain the task/item you are listing for the DRP.
iv. You will probably need to research using the Internet for this lab.

Reference no: EM131717472

Questions Cloud

Explain whether existential-humanistic therapy : How often are you receiving clinical supervision from your preceptor - How are you translating these sessions to your clinical practice
Apply critical thinking and communication skills : Apply critical thinking and communication skills to draw three conclusions from the visual data presented
How will the bank roe change : Monarch State Bank reports total operating revenues of $135 million, with total operating expenses of $121 million, and owes taxes of $2 million.
Define sexually attractive and why is tied into culture : Who we find sexually attractive and why is tied into culture, but there are also multiple biological factors to consider
Explain ten security policies procedures and technologies : Using bullet points, briefly explain ten security policies, procedures, and/or technologies you would put into place during your first year on the job.
What are the primary information needs of each manager : Tenrack is a fairly large manufacturing company located in the southern United States. What are the primary information needs of each manager
Determine the tax management efficiency ratio : Wilmindtom hills state bank has just submitted its report of condition and report of income to its principal supervisory agency.
Demonstrate caring in your current professional practice : Take a moment to reflect on how you demonstrate caring in your current professional practice - Create an artistic representation of your perception on caring
Develop metabolic acidosis : Explain at the cellular level, about cellular aerobic (an anaerobic) respiration, and why this patient will soon develop metabolic acidosis.

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd