Handles highly classified intellectual property

Assignment Help Basic Computer Science
Reference no: EM133056513

Your group is working for a global organization that handles highly classified intellectual property. In many situations and scenarios, the implementation and operations teams have been creating and setting up environments that violate your vision for security. After discussing the situation with various parties, they all admit they do not fully know or understand what is expected from them as they set up and configure the environment. To solve this situation, your group has been asked to create a network security policy for the organization.

Each group member will choose an element of the policy to design, and the group will collaborate on what the overall design and outline should look like and include components from end-user behavior, a training plan, file and folder access, social engineering safeguards, bring-your-own-device policies, use of external drives on company assets, security hardware, penetration testing, and affiliation of the information security department with law enforcement agencies. Students may either interview someone in the local FBI field office or research the FBI and DHS Web sites related to information-sharing programs that the government offers; this could be advantageous to the organization's information security program.

To keep the scope narrow, your group should first describe what should be included and what should not be included in the policy (remember that a policy should clearly set management's expectations).

After the scope has been defined, research the various components, and create an appropriate policy.

Reference no: EM133056513

Questions Cloud

Research component-it service level agreement : An effective way to communicate the IS/IT requirements for this major strategic shift is to specify a Service Level Agreement (SLA) for IT Service Management
Analysis of components of information security : Categorizes the components of information security. Describes the consequences of the conflict. Contains a breakdown of the budget report
Digital media and society : Has your impression of digital media and society changed after taking this class? How? What in your opinion is the future of digital media and the Internet?
The waterfall project management model : The waterfall project management model is often used for non-IT projects, while the Agile project management model is often used for IT projects.
Handles highly classified intellectual property : Your group is working for a global organization that handles highly classified intellectual property.
Which form of encryption would ensure spreadsheet : Which form of encryption would ensure the spreadsheet is always stored on the disk in encrypted format? More than one form may be correct.
Accessing company files and databases : Mobile devices are used by employees throughout the day, whether it is placing calls, accessing company files and databases,
What is the most dangerous hacker tool : How has the term hacking changed meaning over the years? What is the most dangerous hacker tool? What do you think of hactivism?
Mitigate the risk of ransomware attack : Summary on how the hospital can mitigate the risk of a ransomware attack and how the hospital can respond if it does face such an attack.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Discuss issue and provide different examples of component

MPEG 21 is organized into several independent parts to allow various slices of the technology. Discuss this issue and provide five different examples

  Treasury bond over a corporate bond

Will a risk averse investor always choose a Treasury bond over a corporate bond (assume the maturities are the same)? Explain your answer.

  Distinguish between vulnerability-threat and control

Distinguish between vulnerability, threat, and control. List at least three kinds of damage a company could suffer when the integrity of a program

  Computing the ethical and cultural differences on website

For this Critical Thinking assignment, you are a technical communications project manager for BCG working on the CSIC project. Read the following scenario and review the requirements for writing a proposal:

  Create three arrays of int with the same size

A company has 10 stores. Input the annual sales for each store. Find the store with the maximum sales, the one with the minimum sales, and find the average annual sales for the 10 stores. Print the maximum, minimum sales and their store index, and..

  Cyber development life cycle compare

How do the systems development life cycle and the cyber development life cycle compare?

  Describe the tasks and business functions

Describe the tasks and business functions that users, managers, and IT staff members perform to achieve specific results

  Develop system in-house or to purchase COTS system

Determining when to develop a system in-house or to purchase a COTS system is not always clear.

  Information systems lifecycle and the database system

Discuss the relationship between the information systems lifecycle and the database system development lifecycle?

  What role does the it leadership team in access control

What role does the IT leadership team in access control? What proactive actions can be taken to avoid a breach?

  Likelihood or severity of a cyber attack

Thus, it is almost impossible for an insurance company to set the level of premiums for a cyber insurance policy. Do you agree?

  What happens if there is no index defined for a query

What happens if there is no index defined for a query? What is its impact?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd