Explaining statement for security policy

Assignment Help Basic Computer Science
Reference no: EM1347793

Q1) Write a statement for security policy for the following:

Let LAN for small 100-person business, Pixel Inc. Business occupies one floor in office building. Everybody has a computer on his or her desk, and there are servers for the Web, file & print sharing, email, database, and a small 3D render farm, a rack of 20 dual processor Xeon servers running Red Hat Linux that generates the actual high-resolution video animations that Pixel produces for its clients. The desktop systems consist of Apple Mac Pro desktops running Mac OS X Leopard for the creative staff, and Windows Vista PC computers for general use. The servers are Windows Server 2003 running Microsoft Exchange, Web server, and file & print service. The network is gigabit Ethernet and the network hardware is a mixture from Cisco and Hewlett-Packard.
Employees, business partners, and clients may visit Pixel's office with laptop computers in order to collaborate on projects. The laptops will obtain their IP configuration from the DHCP server at Pixel.
Pixel has 10 megabit/second Internet access, and uses a SOHO firewall that doubles as a DHCP server. This firewall filters out Internet-based attempts to access Pixel's servers and desktop computers, but admits email, web, and SFTP (Secure FTP) traffic destined for specifically hardened servers.
Pixel produces short animation movies for advertiser clients. These clients are located worldwide and need to communicate securely with Pixel as they collaborate on their advertising shorts. Pixel uses its high- speed Internet connection both to support the exchange of movie shorts as well as for email and general Internet web connectivity.

The network has the following additional specifications:

1. The network is all TCP/IP based
2. The network is based on Cisco routers and switches
3. All desktop computers include email, Web, database access, and office productivity software
4. Creative users also have multimedia authoring software installed
5. All server and critical network equipment is in a secure server room
6. Printers are located around the office area
7. The multimedia department uses high-end workstations for video rendering and animation
8. A load-balancing dual firewall connects the network to the Internet
There is a wee security policy in place:
1. All email must be secure so it cannot be inadvertently sent to the wrong party or intercepted
2. All network resources and equipment must be password protected
3. Company equipment may not be used for personal business
4. All Windows-based PCs must run approved anti-virus and anti-spyware programs
5. All servers and desktops should run host-based intrusion detection software
6. Clients may use the Secure FTP (SFTP) server to send or receive multimedia files but under no circumstances should one client be able to view the files of any other client
7. The mail server must be configured not to forward email that originated on the Internet
8. Password aging must be enforced on all servers and desktops
9. All server configurations must be readily available to rebuild a failed system
10. Off-site backup is required, with 24x7 access to that location
11. All employees will demonstrate they understand the security policy
12. The security officer reports directly to Pixel's CEO

Reference no: EM1347793

Questions Cloud

Illustrate what is the change in taxes cause by an increase : Suppose that tax and aggregate expenditur income for an economy. Illustrate what is the change in taxes cause by an increase in government spending.
Banker must be satisfied : Before approving a loan to a small business, banker must be satisfied with the owner's character. Why is this? Do you agree or disagree?  Explain your answer.
Find out the width of the slit : Two point charges q1 = 3.40 nC and q2 = -5.50 nC are 0.100m apart. Point A is midway between them; point B is 0.080 m from q1 and 0.060 m from q2. Take an electric potential to be zero at infinity.
Rewarding production department employees : A company rewards its production department employees for meeting budgeted cost levels by giving out bonuses. If department's cost exceeds the budget, employees don't get a bonus. What problems may arise with such a plan?
Explaining statement for security policy : Write a statement for security policy for the following:Let LAN for small 100-person business, Pixel Inc. Business occupies one floor in office building. Everybody has a computer on his or her desk.
Find the number of new common stock issue : Taggart Technologies is planning issuing new common stock and using proceeds to decrease its outstanding debt. The stock issue would have no effect on assets.
Illustrate is there a nash equilibrium : I hereby offer you $5,001 if both you and my other creditor agree to cancel my debt. If either or both of you decline this offer, I will be legally in default and you will receive $5,000." So, what happens.
Static budget versus flexible budget : Why do you think companies make mistake of only paying close attention to the static budget? Is it just not wanting to spend the time and money?
Important forecast of master budget : A master budget is the compilation of forecasts for coming year or operating cycle made of many departments or function in an organization. What is the most significant forecast made in the master budget? Mention the reasons for your answer.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Drawing class diagram to show instructor serves department

One instructor also serves a department chair. Draw a detailed class diagram to represent the above information.

  Assigning value to last array of array list

Write a statement that assigns the value 160000 to the last element of the ArrayList salaryStep.

  Explaining data-tlb hit and data-cache hit

Upon a load instruction, event "data-TLB hit" followed by "data-cache hit" is the most probable to occur among four possibilities of Cartesian product.

  Probability and set theory questions

COMP 2804 Assignment 3,  The Fibonacci numbers are defined as follows,  Assume we roll each of D1, D2, and D3 once, independently of each other. Let R 1 , R2, and R3 be the numbers on the top face of D1, D2, and D3, respectively.

  Tcp procedure for estimating rtt

Let the TCP procedure for evaluating RTT. Assume that α = 0:5. Let SampleRTT1 be the Most recent sample RTT, let SampleRTT2 be the next most recent sample.

  Finding content of top of stack-call instruction is executed

Specify the content of PC, SP, and the top of the stack in the following situations: After the call instruction is executed.

  Explaining formal risk assessment of desktop systems

As apart of a formal risk assessment of desktop systems in small accounting firm with limited IT Support, you have identified asset "integrity of customer and financial data files on desktop systems" and threat.

  Information security problem or issue in organisation

Illustrate how the work breakdown structure would identify and plan an information security problem or issue in the organisation.

  Creating report by city and by product to record sales

Create a report by city and another by product, including details of the sales and sub-totals and totals for quantity.

  Explaining quasi-legal activities over internet

Online gambling and buying of pharmaceutical drugs over the Internet are quasi-legal activities which can only take place as Internet allows the parties offering gambling.

  Explaining physical material on which computer keeps data

Storage is the physical material on which a computer keeps data, instructions, and information?

  Design patterns in today-s development environments

In System Analysis and Design: Design Patterns - How widely used are design patterns in today's development environments?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd