How a company-wide policy program could help the situation

Assignment Help Computer Network Security
Reference no: EM13649338

Peak View Sound Sources is a public company based in Denver, Colorado and is focused on providing digital media and Web sites to music companies and musicians through the Mountain and West Coast regions. The company has a solid reputation and is starting to get some national and worldwide attention, with new prospective companies wanting to take advantage of the quality services they have see on other existing Web sites.

Your company has been hired to assist Peak View Sound Sources (PVSS) to ascertain the security posture of the company's Information Systems resources and services. You are heading the team of auditors tasked to perform the audit and assessment.

You enter the company offices of PVSS and begin your analysis of the environment and situation.

Initial analysis has allowed you to determine that the company is made up of the following divisions:

• Corporate Management and Support Staff: This organization contains the executive management, human resources, and accounting teams. All company decisions are directed from the management team.

• Information Technology: This team manages the networks, servers, Web sites, and desktop environments for the company. The team has a perception of being difficult to work with, as they are slow to adopt new technology and slow to implement new offerings. The reality is that the team has resources and wants to uptake the newest and greatest technology, but they spend most of their time putting out fires and reacting to issues.

• Media Content and Design: This team is in charge of working with the record companies and musicians to create the Web Sites and implement the product offerings that are sold.

• Sales and Marketing: This team works with the musicians and record companies to offer and sell the services of PVSS.

There is a concern about the security of the infrastructure with respect to the ability to protect the copyrighted material that PVSS is given to host, because a single incident several years ago took place in which an entire new CD was released prematurely via the Internet. Although PVSS was not directly linked to the leak, there are suspicions surrounding PVSS.
Assignment Deliverables

As you continue your analysis, you see that the Information Technology (IT) department has developed several guidelines and procedures about how various systems should be considered and set up, but this is internal only to the IT department. Every time a new machine is set up and deployed, within a month, the configuration is changed.

• Explain why you think the use of these guidelines and procedures is not sufficient and may not solve the problem. Consider how a company-wide policy program could help the situation.

• As you begin to prepare your game plan to conduct an Information Security Audit, talk about why you think this current situation makes it difficult to identify the controls that need to be examined.

• If you were performing this security audit, with which regulations would you want to ensure that PVSS complies? Why?

Reference no: EM13649338

Questions Cloud

Determine velocity as function if time for raindrop of mass : Determine the velocity as a function if time for a raindrop of mass m = 4x10-6 kg that reaches a terminal velocity ofvt = 6m/s, for which the resistive force is given by f = bv where bis the proportionality constant. Evaluate the constant b
Describe what is the position of the image : An object is 7.94 cm from the surface of a reflective spherical Christmas-tree ornament 7.8 cm in diameter. What is the position of the image
What angle does the light leave the water : A diver shines a flashlight upward from beneath the water ata 38.0^\circ angle to the vertical. At what angle does the light leave the water?
What power does the engine develop : An engine moves a boat throughthe water at a constant speed of 15 m/s. What power does the engine develop
How a company-wide policy program could help the situation : Explain why you think the use of these guidelines and procedures is not sufficient and may not solve the problem. Consider how a company-wide policy program could help the situation.
What is the rotational inertia of wheel about rotation axis : A constant horizontal force F of magnitude 20 N is applied to awheel of mass 20 kg and radius 0.5 m. The wheel rolls withoutslipping on the horizontal surface, and the acceleration of its center of mass has magnitude 0.5 m/s^2.
Find what was the initial speed of the bullet : A 12 g bullet moving horizontally strikes and remains in a 3.0 kg block initially at rest on the edge of table. What was the initial speed of the bullet
Determine what is the high speed : A motor has a constant angular acceleration of 5rev/sec2. If the motor goes from low speed of 1200RPM tohigh speed in 5 seconds, what is the high speed
How much kinetic energy is lost in this collision : A 2.0 kg object moving with a velocity of 5.0 m/s in the positive x direction strikes and sticks to a 3.0 kg object moving with a speed of 2.0 m/s in the same direction. How much kinetic energy is lost in this collision

Reviews

Write a Review

Computer Network Security Questions & Answers

  An overview of wireless lan security - term paper

Computer Science or Information Technology deals with Wireless LAN Security. Wireless LAN Security is gaining importance in the recent times. This report talks about how vulnerable are wireless LAN networks without any security measures and also talk..

  Computer networks and security against hackers

This case study about a company named Magna International, a Canada based global supplier of automotive components, modules and systems. Along with the company analysis have been made in this assignment.

  New attack models

The Internet evolution is and is very fast and the Internet exposes the connected computers to attacks and the subsequent losses are in rise.

  Islamic Calligraphy

Islamic calligraphy or Arabic calligraphy is a primary form of art for Islamic visual expression and creativity.

  A comprehensive study about web-based email implementation

Conduct a comprehensive study about web-based email implementation in gmail. Optionally, you may use sniffer like wireshark or your choice to analyze the communication traffic.

  Retention policy and litigation hold notices

The purpose of this project is to provide you with an opportunity to create a document retention policy. You will also learn how to serve a litigation hold notice for an educational institute.

  Tools to enhance password protection

A report on Tools to enhance Password Protection.

  Analyse security procedures

Analyse security procedures

  Write a report on denial of service

Write a report on DENIAL OF SERVICE (DoS).

  Phising email

Phising email It is multipart, what are the two parts? The HTML part, is it inviting the recepient to click somewhere? What is the email proporting to do when the link is clicked?

  Express the shannon-hartley capacity theorem

Express the Shannon-Hartley capacity theorem in terms of where is the Energy/bit and is the psd of white noise.

  Modern symmetric encryption schemes

Pseudo-random generators, pseudo-random functions and pseudo-random permutations

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd