Question about security policy

Assignment Help Operating System
Reference no: EM1379465

ABC corporation is a small but growing manufacturing corporation with revenues of approximately $25 million. Until now, the corporation has had a single headquarters and production facility in a Midwestern city, but it is building a separate sales office on the east coast which will open in a few months.

You are the Manager of IT at ABC, and you have been responsible for operating a basic set of computer applications in the Midwest office: order entry and fulfillment, financial and accounting systems, e-mail, and general office automation (word processing, etc.) You have been maintaining a Local Area Network connecting the office desktop computers to each other and to the applications running on the company servers, but there has been no access to these systems from outside the office.

You have been told by senior management that when the new sales office opens, the east coast staff must be able to enter new orders directly into the home office system using their desktop computers. They also need access to customer records and order status information. Furthermore, management wants to implement a new company website for customers to place orders online and to view their ordering history, current order status, and financial statement information without calling customer service.

You realize there are huge security implications implied by these changes. You have been uneasy in the past because the company has lacked a comprehensive computer security policy. Furthermore, most employees have not really understood all the security issues in the old "internal" computing environment. The new configuration with its networked offices and Internet-accessible elements will require more security awareness than ever. You see this as your opportunity, and imperative, to move the company to accept a formal corporate security standard. In the weeks ahead, you will begin to educate both management and system users regarding the components, necessity, and use of security standards for all of the new technologies that will be used, as well as for the current technology they have been using. In the end, you will develop all of this together into a complete corporate security program proposal.

Please help so that I can complete the work:

Before you start this project, you need to sell senior management on investing in a security plan and associated software. You know that evolutionary changes in computing environments have created security concerns for IT managers. How to create/implement adequate computer system security policies and procedures to adapt to these changes has become an urgent task for top corporate IT executives, including you. Use the Library and the Internet to research the history and evolution of computer security. Prepare for a discussion with the CEO and other senior management by summarizing your research, listing the key trends/events and the nature of the challenges they present.

Reference no: EM1379465

Questions Cloud

Consider the numerous economic systems of the world : Consider the numerous economic systems of the world capitalism, socialism and communism and the related free market economies and a command economy. With this in mind debate the following question.
Find probability that the return for common stocks : Describe the effect of an outlier or extreme value on the confidence interval - Find the probability that the return for common stocks
Find a current online business magazine : Go to the World Wide Web on the Internet as well as find a current online business magazine. Select an article on international business.
Internet communications to an overseas location : What would you say to a CEO of an organization that is seeing moving their customer service that is done through telephone as well as Internet communications to an overseas location
Question about security policy : ABC Corporation is a small but growing manufacturing corporation with revenues of approximately $25 million. Until now, the corporation has had a single headquarters and production facility in a Midwestern city,
Mature stage of the product lifecycle : By studying the product lifecycle tell me what you think the differences would be in managing distribution if you compare as well as contrast the introduction stage versus the mature stage
Find a research-based article in a business journal : Prepare a paper which evaluates the use of the scientific method in an actual research project. Find a research-based article in a business journal
Difference between data and information : Describe the difference between data and information and provide an example of each. Also define an operating system.
What are few of the challenges experienced by governments : What are few of the challenges experienced by governments that are associated with globalization

Reviews

Write a Review

Operating System Questions & Answers

  Implementation of algorithms for process management

The Shortest Job Next (SJN) algorithm queues processes in a way that the ones that use the shortest CPU cycle will be selected for running rst.

  Develop a user mode command interpreter

Develop a user mode command interpreter which support list-short.

  Memory allocation in operating system

Analysis and implementation of algorithms for memory allocation in operating system, Explain First- t and best- t methods are used in memory allocation in operating systems.

  Stand alone child process

Forking the child process

  Write a multi-threaded program

Write a multi-threaded program to solve producer and consumer problem

  Marginal and average cost curves

n a competitive market place (pure competition) is it possible to continually sell your product at a price above the average cost of production.

  Simulating operating systems scheduling

Simulate the long-term scheduler, the short-term scheduler and the I/O scheduler of the computer using the First-Come-First-Serve algorithm.

  Issues with trusted platform module

Research paper discussing the issues with Trusted Platform Module (TPM)

  Threads

Explain a complication that concurrent processing adds to an operating system.

  Design and programming

Use the semaphore methods to control the concurrency of the solution

  Virtual machines

Virtual machines supported by a host operating system

  Discuss an application that benefits barrier synchronization

Discuss an application that would benefit from the use of barrier synchronization

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd