Question about security policy

Assignment Help Operating System
Reference no: EM1379465

ABC corporation is a small but growing manufacturing corporation with revenues of approximately $25 million. Until now, the corporation has had a single headquarters and production facility in a Midwestern city, but it is building a separate sales office on the east coast which will open in a few months.

You are the Manager of IT at ABC, and you have been responsible for operating a basic set of computer applications in the Midwest office: order entry and fulfillment, financial and accounting systems, e-mail, and general office automation (word processing, etc.) You have been maintaining a Local Area Network connecting the office desktop computers to each other and to the applications running on the company servers, but there has been no access to these systems from outside the office.

You have been told by senior management that when the new sales office opens, the east coast staff must be able to enter new orders directly into the home office system using their desktop computers. They also need access to customer records and order status information. Furthermore, management wants to implement a new company website for customers to place orders online and to view their ordering history, current order status, and financial statement information without calling customer service.

You realize there are huge security implications implied by these changes. You have been uneasy in the past because the company has lacked a comprehensive computer security policy. Furthermore, most employees have not really understood all the security issues in the old "internal" computing environment. The new configuration with its networked offices and Internet-accessible elements will require more security awareness than ever. You see this as your opportunity, and imperative, to move the company to accept a formal corporate security standard. In the weeks ahead, you will begin to educate both management and system users regarding the components, necessity, and use of security standards for all of the new technologies that will be used, as well as for the current technology they have been using. In the end, you will develop all of this together into a complete corporate security program proposal.

Please help so that I can complete the work:

Before you start this project, you need to sell senior management on investing in a security plan and associated software. You know that evolutionary changes in computing environments have created security concerns for IT managers. How to create/implement adequate computer system security policies and procedures to adapt to these changes has become an urgent task for top corporate IT executives, including you. Use the Library and the Internet to research the history and evolution of computer security. Prepare for a discussion with the CEO and other senior management by summarizing your research, listing the key trends/events and the nature of the challenges they present.

Reference no: EM1379465

Questions Cloud

Consider the numerous economic systems of the world : Consider the numerous economic systems of the world capitalism, socialism and communism and the related free market economies and a command economy. With this in mind debate the following question.
Find probability that the return for common stocks : Describe the effect of an outlier or extreme value on the confidence interval - Find the probability that the return for common stocks
Find a current online business magazine : Go to the World Wide Web on the Internet as well as find a current online business magazine. Select an article on international business.
Internet communications to an overseas location : What would you say to a CEO of an organization that is seeing moving their customer service that is done through telephone as well as Internet communications to an overseas location
Question about security policy : ABC Corporation is a small but growing manufacturing corporation with revenues of approximately $25 million. Until now, the corporation has had a single headquarters and production facility in a Midwestern city,
Mature stage of the product lifecycle : By studying the product lifecycle tell me what you think the differences would be in managing distribution if you compare as well as contrast the introduction stage versus the mature stage
Find a research-based article in a business journal : Prepare a paper which evaluates the use of the scientific method in an actual research project. Find a research-based article in a business journal
Difference between data and information : Describe the difference between data and information and provide an example of each. Also define an operating system.
What are few of the challenges experienced by governments : What are few of the challenges experienced by governments that are associated with globalization

Reviews

Write a Review

Operating System Questions & Answers

  Difference between data and information

Describe the difference between data and information and provide an example of each. Also define an operating system.

  Explian wired and wireless media

Discuss and explian wired and wireless media along with the drawbacks and benefits of each also Discuss the channel signaling systems used in voice communication along with the drawbacks and benefits of each.

  Solving problem by ipv6

Discuss and explain some of the problems NATs develop for IPsec security. Solve this problems through using IPv6?

  Solving hipaa privacy issues

Suppose if we learned anything from Katrina and Joplin, paper records are susceptible to loss en masse. Can you assume having 50,000 paper records blown for miles across Joplin and trying to recreate those records later

  Simulating operating systems scheduling

Simulate the long-term scheduler, the short-term scheduler and the I/O scheduler of the computer using the First-Come-First-Serve algorithm.

  Define critical path and cpm

Define Critical Path and CPM. Define Networks & Network scheduling

  Identify the costs associated with security requirement

A year after your 1st visit to credit union the manager calls you once again. His business is experiencing tremendous growth and requires to either open another branch office.

  Ddos attack on router

Recently had a DDoS attack on border router. Discuss how would you estimate where the attack came from and what would you put in place to save it from happening again?

  Write the start-up steps in windows nt

Write the start-up steps in Windows NT. Provide estimate for the capital investment needed in computer forensics for a 2,000,000 population.

  Page fault with lru page replacement policy

Computer has 16 pages of virtual address space but only three physical pages frames. Initially physical memory is empty. Program references virtual pages in order 1,2,3,4,5,3,4,1,6,7,8,7,8,9,7,8,9,5,4,5,4,2 Which references a page fault with LRU ..

  Formulate the linear programming model for this problem

Formulate the linear programming model for this problem Plot a graph indicating and labelling clearly all the constraints, the feasible region (R) and the optimal point (X)

  Discussion on dns for internet operations

Discuss how do you think the DNS is important for internet operations and what would happen if the DNS of your company/orgnization or your provider or root DNS fails?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd