Explain ten security policies procedures and technologies

Assignment Help Computer Network Security
Reference no: EM131717472

LAB Assignment: Network Security & Recovery

Part 1: Security Issues

American Insurance does not have a computer security specialist. In the last two years the company has experienced the following security problems:

• Terminated an employee for using her supervisor's password to print confidential payroll information
• Losing productivity because employees use the Internet for personal use instead of doing their job
• An employee accidentally downloaded a computer virus from a web site that damaged his computer
• Confidential customer data was stolen from the company's server by an outside hacker
• An employee's laptop computer was stolen off his desk while he was at lunch

1. Start a new Word document with the name YourLastName Security Recovery

2. Hearing how much you learned about computer security in CISB 11, American Insurance has decided to pay you $50,000 per year to be its new "Director of Information Security".

i. Type the title: Security Policies and enter a blank line before you type your response.

ii. Using bullet points, briefly explain ten security policies, procedures, and/or technologies you would put into place during your first year on the job.

a. For each strategy, you must explain one type of security problem that the strategy would attempt to prevent.

iii. The security problem does not have to be from the list provided above.

Part 2: Disaster Recovery Plan (DRP)

Assume that American Insurance does not have a disaster recovery plan (DRP). A disaster recovery plan contains information about how to get a business back up and running AFTER a natural (earthquake, flood, tornado) or man-made (bombing, fire) disaster occurs.

3. Under your answer to Part 1 enter a few blank lines, type Disaster Recovery Plan and then type your answer to the following:

4. Assume that American Insurance does not have a disaster recovery plan. A DRP is used to restore business operations after a catastrophic event. You will probably need to research the Internet for this answer.

i. After you finish part 1, enter a two blank lines
ii. Type the title: Disaster Recovery Plan and enter a blank line before you list your response.
iii. Briefly list five (5) tasks that should be included in a disaster recovery plan (DRP) for American Insurance.
a. Bullet points are OK as long as they include enough detail to explain the task/item you are listing for the DRP.
iv. You will probably need to research using the Internet for this lab.

Reference no: EM131717472

Questions Cloud

Explain whether existential-humanistic therapy : How often are you receiving clinical supervision from your preceptor - How are you translating these sessions to your clinical practice
Apply critical thinking and communication skills : Apply critical thinking and communication skills to draw three conclusions from the visual data presented
How will the bank roe change : Monarch State Bank reports total operating revenues of $135 million, with total operating expenses of $121 million, and owes taxes of $2 million.
Define sexually attractive and why is tied into culture : Who we find sexually attractive and why is tied into culture, but there are also multiple biological factors to consider
Explain ten security policies procedures and technologies : Using bullet points, briefly explain ten security policies, procedures, and/or technologies you would put into place during your first year on the job.
What are the primary information needs of each manager : Tenrack is a fairly large manufacturing company located in the southern United States. What are the primary information needs of each manager
Determine the tax management efficiency ratio : Wilmindtom hills state bank has just submitted its report of condition and report of income to its principal supervisory agency.
Demonstrate caring in your current professional practice : Take a moment to reflect on how you demonstrate caring in your current professional practice - Create an artistic representation of your perception on caring
Develop metabolic acidosis : Explain at the cellular level, about cellular aerobic (an anaerobic) respiration, and why this patient will soon develop metabolic acidosis.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Explain how you would handle the given situation

You, the security officer, noticed that employees resisted the policy and chose to continue downloading peer-to-peer software. In an initial post, explain how you would handle this situation.

  Companys needs for these types of security

Details on physical security, you have to make sure you include the basics. Make sure you detail what will deter hackers from breaking in. Be sure to include your references -

  Perform a scan of your home and business network

Perform a scan of your home and/or business network. Take note of the results. Perform the test several times through the day, and note any differences.

  What security model would you select

What Security Model would you select when create an Enterprise Architecture? You may include a particular security situation that would justify the Security of Model of choice.

  Report about bank of america organization information plan

Prepare a report about BANK OF AMERICA ORGANIZATIOn information assurance plan. Assume that you are the lead network security expert in your organization.

  What are some of the concerns of mobile device users

Microsoft has announced its Surface tablets, due out late this year, at a time when security is a growing concern for users of mobile devices. What are some of the concerns of mobile device users? What are some of their options to ease their con..

  Security awareness on the internet

Search for security awareness on the internet. Describe the available materials. Choose one of the web sites that might work for security awareness program at your school

  A friend is interested in installing a wireless lan in her

a friend is interested in installing a wireless lan in her small business. she has about a dozen employees. she is

  Screen element of ms word

A screen element of MS Word that is usually located below the title bar that provides categorized options is known as ?

  Information systems security policy

From the e-Activity, discuss how the National Security Telecommunications and Information Systems Security Policy (NSTISSP) national policies facilitate the confidentiality, integrity, authentication, and non-repudiation of computing security

  Find the product cipher obtained by using the

1 if the two most common letters in a long ciphertext encrypted by an affine transformation c equiv ap b mod 26 are x

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd