Os and database security for an organization

Assignment Help Management Information Sys
Reference no: EM13813774

Using the South University Online Library or the Internet, research about the following:

Planning and implementing security for mobile computers and mobile devices

Planning and implementing a secure database

Verification testing for security mechanisms that are in place

Modify the report from W2 Assignment 2 to accommodate suggestions and recommendations from your instructor and your own changes based on the readings and activities for this week. Color code your changes to the report so that they are easy to identify.
Provide recommendations to secure the computers in the Marketing department of this organization. These computers travel outside of the network, so you need to consider how they will connect to the home server, and what should be done to protect them. You should consider the level of access they have to the network and the consequence if they are stolen or used by someone outside of the organization.

Provide recommendations for securing network traffic between the workstations within the building and the server. Identify trust boundaries for the organization and recommend security measures for each trust boundary. Characterize which trust boundaries represent the highest level of trust and those that represent the lowest; what is the distinction between these levels?

Recommend measures to harden the server OS to prevent outsiders from accessing the networked computers. Identify the services for your recommended OS that will aid in the security effort. Explain the policy that should be used for patches and updated on both the server and the workstation OSs. Why is this an important consideration?

Secure the database of the organization and assign the required permissions to the users. You should create a chart of groups and permissions for this portion of the assignment (you do not need to identify specific tables, just information groups).

Describe the implementation process and timeline for your recommendations. Try to give as reasonable a timeline as possible and explain the timeframe you choose.

Expand the section of your report for verifying the implementation of the previously suggested security recommendations from Week 1 and 2. Identify what is being tested for each verification activity and what is proven by each activity. This should include testing activities to make sure the security system is working properly. An example of this would be using an intentionally incorrect password to make sure the system does not allow the login.

Be sure to include your references and citations for the measures and activities you suggest. You should have gathered this from the research in the library or on the Internet.

Reference no: EM13813774

Questions Cloud

Downloading the financial report from the walt disney : Your responsibility will be to do three ratios from the Activity Ratios. The three being: Inventory Turnover, Accounts Receivable Turnover, and Total Asset Turnover. Either by downloading the financial report from the Walt Disney website, or on the N..
Pros and cons of raising the prices at bulls eye : Despite having some market power, Bulls Eye is currently suffering losses. An analyst at Bulls Eye is recommending to the manager to raise prices, so that profitability can be improved. The manager is unsure of this strategy as recent data points ..
Critique the civilan review board : Critique the Civilan review board and answer the following question: Citizen review of police are designed to look over police discretion throughout history in determining the proper discipline. The citizen oversight
What happen when margaret sanger opened birth control clinic : What happened when Margaret Sanger opened the first birth control clinic?
Os and database security for an organization : OS and Database Security for an Organization
Prepare a term paper on current economic topic : For the term paper, you are required to pick a current economic topic.
Describe the virtue of intellectual courage : Describe the virtue of Intellectual Courage. Describe a moment in your life when you showed Intellectual Courage. What belief did you question? Why were you willing to give up that belief?
Round off to the nearest tenths place : Findthe following for an input of 120 VAC(RMS), 60 hertz, given a 17:1 stepdown transformer, and a full-wave bridge rectifier. Rload is 120 ohms. Round off to the nearest tenths place.
Write a paper about gurung girls and women subordination : Write a paper about Gurung girls and women subordination due to traditional roles.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Information technology and the changing fabric

Illustrations of concepts from organizational structure, organizational power and politics and organizational culture.

  Case study: software-as-a-service goes mainstream

Explain the questions based on case study. case study - salesforce.com: software-as-a-service goes mainstream

  Research proposal on cloud computing

The usage and influence of outsourcing and cloud computing on Management Information Systems is the proposed topic of the research project.

  Host an e-commerce site for a small start-up company

This paper will help develop internet skills in commercial services for hosting an e-commerce site for a small start-up company.

  How are internet technologies affecting the structure

How are Internet technologies affecting the structure and work roles of modern organizations?

  Segregation of duties in the personal computing environment

Why is inadequate segregation of duties a problem in the personal computing environment?

  Social media strategy implementation and evaluation

Social media strategy implementation and evaluation

  Problems in the personal computing environment

What is the basic purpose behind segregation of duties a problem in the personal computing environment?

  Role of it/is in an organisation

Prepare a presentation on Information Systems and Organizational changes

  Perky pies

Information systems to adequately manage supply both up and down stream.

  Mark the equilibrium price and quantity

The demand schedule for computer chips.

  Visit and analyze the company-specific web-site

Visit and analyze the Company-specific web-site with respect to E-Commerce issues

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd