Networks and computers to support business functions

Assignment Help Basic Computer Science
Reference no: EM131002763

Part 1:

Think about a business you are familiar with that uses networks and computers to support business functions.

Create a list of ten important, specific items such as computers, disks, equipment, and information such as sales data, client data, and network configuration. Identify the threats these important items are subject to.

Devise a security policy to mitigate that threat. Document your analysis process. Note that this information will be useful moving forward, so develop it fully at this time.

Part 2:

Read the following mini-security policy. Assess this security policy in four major areas. What is missing, incomplete, inaccurate, or ill-advised?

Acme Security Policy

Each document should have a footer or header identifying the level of sensitivity. Suggested sensitivity levels are unrestricted and client sensitive.

Email clients should enable SSL encryption both for POP and SMTP. That way, regardless of where we work, our email traffic will not expose any data to network eavesdropping techniques. If client confidential data must be emailed amongst Pixel Inc. consultants, the file should be encrypted, perhaps using a cross-platform product such as PGP Desktop 9.0 or S/MIME, so that data cannot be read from email servers along the way.

File servers with shared folders should have access controls enabled to only members of the authorized group.

Shared folders should also be encrypted so that physical theft of the server, its hard drives, or the backups will not compromise data confidentiality.

Periodic backups will be made of server hard drives and stored offsite in a secure location such as a safety deposit box. Access to the backups will be shared.

Only a select few consultants under contract to Pixel Inc. will be given the file server Administrator account password. Laptop computers will not automatically login the administrator and each account will be password protected. Local folders containing client sensitive data should be encrypted so that theft of the laptop or its hard drive will not
compromise data confidentiality.

Portable storage devices such as USB and Firewire disk drives or flash disks and thumb drives may be used to store client sensitive documents if they're stored in encrypted folders or drive images.

Laptop computers will have screen savers enabled with password protection. Users will switch on their screen saver to lock the computer when they walk away from it.

Passwords should be chosen wisely, i.e., common dictionary words would not be used.

Assignment Requirements:

Answers contain sufficient information to adequately answer the questions

No spelling errors

No grammar errors

*Two points will be deducted from grade for each occurrence of not meeting these requirements.

For more information and examples of APA formatting, see the resources in Doc sharing or visit the KU Writing Center from the KU Homepage.

Reference no: EM131002763

Questions Cloud

What will be its new speed : A merry-go-round in a park consists of an essentially uniform 200-kg solid disk rotating about a vertical axis. The radius of the disk is 6.0 m. The merry-g0-round is rotating at 0.20 rev/s. If now a 100-kg man quickly sits down on the edge of it,..
The capital budgeting decision techniques : The capital budgeting decision techniques that we've discussed all have strengths and weaknesses, but they do comprise the most popular rules for valuing projects. Valuing entire businesses, on the other hand, requires that some adjustments be made t..
Calculate the moment of inertia of the merry-go-round : The boy then crawls towards the center of the merry-go-round along a radius. What is the angular speed in radians/second of the merry-go-round when the boy is half way between the edge and the center of the merry go round?
Describe friedman''s viewpoint towards csr and his policies : Describe Friedman's viewpoint towards CSR and his policies
Networks and computers to support business functions : Periodic backups will be made of server hard drives and stored offsite in a secure location such as a safety deposit box. Access to the backups will be shared.
Environmental laws : you are very interested in how public opinion and economics play a role in determining how many and what type of environmental laws are passed. The research paper you prepare this week should be directed toward the general public to raise awareness o..
Which measure of central location is meaningful : Which measure of central location is meaningful when the data are categorical
What would the speed of the pellet have to be in order : A 30-g pellet of this metal at 16oC hits a solid wall and comes to a complete stop. What would the speed of the pellet have to be in order for it to melt completely when it hits the wall, assuming that all of its kinetic energy is transformed into..
Sachs brands defined benefit pension plan : Calculate the effect of the change in the assumed discount rate on the PBO at the beginning of 2012 with respect to Davenport.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Identifies the cost of computer

identifies the cost of computer components to configure a computer system (including all peripheral devices where needed) for use in one of the following four situations:

  Input devices

Compare how the gestures data is generated and represented for interpretation in each of the following input devices. In your comparison, consider the data formats (radio waves, electrical signal, sound, etc.), device drivers, operating systems suppo..

  Cores on computer systems

Assignment : Cores on Computer Systems:  Differentiate between multiprocessor systems and many-core systems in terms of power efficiency, cost benefit analysis, instructions processing efficiency, and packaging form factors.

  Prepare an annual budget in an excel spreadsheet

Prepare working solutions in Excel that will manage the annual budget

  Write a research paper in relation to a software design

Research paper in relation to a Software Design related topic

  Describe the forest, domain, ou, and trust configuration

Describe the forest, domain, OU, and trust configuration for Bluesky. Include a chart or diagram of the current configuration. Currently Bluesky has a single domain and default OU structure.

  Construct a truth table for the boolean expression

Construct a truth table for the Boolean expressions ABC + A'B'C' ABC + AB'C' + A'B'C' A(BC' + B'C)

  Evaluate the cost of materials

Evaluate the cost of materials

  The marie simulator

Depending on how comfortable you are with using the MARIE simulator after reading

  What is the main advantage of using master pages

What is the main advantage of using master pages. Explain the purpose and advantage of using styles.

  Describe the three fundamental models of distributed systems

Explain the two approaches to packet delivery by the network layer in Distributed Systems. Describe the three fundamental models of Distributed Systems

  Distinguish between caching and buffering

Distinguish between caching and buffering The failure model defines the ways in which failure may occur in order to provide an understanding of the effects of failure. Give one type of failure with a brief description of the failure

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd