How would organize sensitivity levels for this client

Assignment Help Computer Network Security
Reference no: EM133361632

Assignment:

Scenario: Orwell's Opus is a medium-sized local bookstore in Global Springfield. The store sells books, stationery, greeting cards, and literature-themed T-shirts, and sales are good in the store. CEO Quincy Orwell intends to expand the business to additional locations and to have the store's website updated for better online sales as well. The website potential will be addressed in this unit's assignment. The collection of data both in the store and online through the website has Orwell rather nervous; he understands the classification of each piece of information needs to be better defined.

Research online to learn about the sensitivity of data and classification levels.

For your initial post:

  • Explain how you would organize sensitivity levels for this client. Consider classifications such as high-medium-low, numbered levels, and labels such as public, private, and confidential.
  • For each classification or category, provide examples (such as how you would label driver's license numbers).
  • Lastly, mention data that should not be gathered for this scenario.
  • Since much of this post will be generated by your own creativity, do not use in-text citation, but do include a full APA 7th edition reference entry at the end of the post for at least one source that provided you with some ideas.

Reference no: EM133361632

Questions Cloud

Role of a business case as utilized in the systems analysis : What is the value, importance and role of a business case as utilized in the systems analysis and design process?
Identify a top concern with compliance : We might find that the actions of individuals can dictate the success or failure of compliance efforts throughout the organization.
How would you triage a suspicious outbound dns request : Why would you get an alert from a previously blocked domain on the same device? And what level of the cyber kill chain will this attack fall under?
Concepts of it security and privacy : The principles and concepts of IT security and privacy; How key events in history that have contributed to modern IT security and privacy;
How would organize sensitivity levels for this client : Explain how you would organize sensitivity levels for this client. Consider classifications such as high-medium-low, numbered levels, and labels such as public.
Discuss concept map for systems monitoring : A concept map is a way to put ideas into a picture and show how those concepts relate. It is a way for you to absorb new information in a visual way.
Review article about the fbis cybercrime : What we see is that cyber criminal strategy keep evolving so the FBI have to stay one step ahead of the criminals in order to fight their work.
Introduction to project management : In two to three paragraphs describe what you thought of the introduction to project management and project management certification in the video.
Why is ssh version 2 is preferred over ssh version 1 : Why is SSH version 2 is preferred over SSH version 1? Why do you think one of the main functions of a LAN switch is not to route IP packets?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain the new threat of ransomware to the organization

The security manager of your organization has approached you to explain the new threat of ransomware to the organization.

  Controversial topic in recent media stories

The escalation in computer crime is becoming an increasingly controversial topic in recent media stories. However, the way in which cybercrime is handled differs depending upon the country that has jurisdiction.

  What is the minimum password length enforced by the password

What is the minimum password length enforced by the Password must meet complexity requirements policy? What sources could you use as a source to perform the MBSA security scan?

  Audit program for application systems for auditing

Discuss which employees and organizations have a deeper-level of information assurance (IA) policy compliance and examine the factors that increased the individual's level of propensity for compliance.

  Demonstrate a good cryptanalysis process

Discuss your cryptanalysis process as you attempt to decipher the message. Note - it is more important that you demonstrate a good cryptanalysis process than that you are able to decrypt the message.

  Sdlc gets translated during the design stage

The requirements definition that is completed in the analysis stage of the SDLC gets translated during the design stage into

  Explain and plan server deployments and images

Explain and plan server deployments and images. Compare and contrast deployment strategies among different application servers and server roles.

  Analyse the problem of providing security of campus network

Analyse the problem of providing security of the above campus network using WPA or WPA2 - Create a design part of the proposed solution with suitable diagram

  What steps you will take if your network has been hacked

Explain what steps you will take if you discover your network has been hacked. Your paper should be AT LEAEST A 1,000 words OF CONTENT and should include citations

  Give a formal definition of strong one-time secure signature

CS 555-Spring 2017 Homework. Give a formal definition of strong one-time secure signatures. Show a simple way to fix this and get a CPA-secure method

  Discuss the business requirement for UVW

MN502 Overview of Network Security Assessment - Analysis of network security tools. Discuss the business requirement for UVW in terms of their security

  Do you suspect any difference in security

Was this easier or more difficult than encrypting/decrypting in CBC mode? Do you suspect any difference in security? Why or why not?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd