Read the following mini security policy.

Assignment Help Operating System
Reference no: EM13944618

Part 1:

Think about a business you are familiar with, one that uses networks and computers to support business functions. Create a list of ten important, specific items such as computers, disks, equipment, and information such as sales data, client data, and network configuration. Identify the threats these important items are subject to. Devise a security policy to mitigate that threat. Document your analysis process. Note that this information will be useful moving forward, so develop it fully at this time.

Part 2:

Read the following mini security policy. Assess this security policy in four major areas. What is missing, incomplete, inaccurate, or ill advised?

Acme Security Policy
Each document should have a footer or header identifying the level of sensitivity. Suggested sensitivity levels are unrestricted and client sensitive.

Email clients should enable SSL encryption both for POP and SMTP. That way regardless of where we work, our email traffic will not expose any data to network eavesdropping techniques. If client confidential data must be emailed amongst Pixel Inc. consultants, the file should be encrypted, perhaps using a cross-platform product such as PGP Desktop 9.0 or S/MIME, so that data cannot be read from email servers along the way.

File servers with shared folders should have access controls enabled to only members of the authorized group. Shared folders should also be encrypted so that physical theft of the server, its hard drives, or the backups will not compromise data confidentiality.
Periodic backups will be made of server hard drives and stored offsite in a secure location such as a safety deposit box. Access to the backups will be shared.

Only a select few consultants under contract to Pixel Inc. will be given the file server Administrator account password.
Laptop computers will not automatically login the administrator and each account will be password protected. Local folders containing client sensitive data should be encrypted so that theft of the laptop or its hard drive will not compromise data confidentiality.
Portable storage devices such as USB and Firewire disk drives or flash disks and thumb drives may be used to store client sensitive documents if they're stored in encrypted folders or drive images.

Laptop computers will have screen savers enabled with password protection. Users will switch on their screen saver to lock the computer when they walk away from it.

Passwords should be chosen wisely, i.e., common dictionary words would not be used.

Reference no: EM13944618

Questions Cloud

What is the beta of your portfolio : You own 500 shares of Stock A at a price of $60 per share, 405 shares of Stock B at $80 per share, and 500 shares of Stock C at $41 per share. The betas for the stocks are .8, 1.8, and .7, respectively. What is the beta of your portfolio?
Expected return on the market : A stock has an expected return of 12.6 percent, its beta is 1.30, and the risk-free rate is 2.5 percent. What must the expected return on the market be?
Prototyping part of a database systems application : The assignment comprises designing and prototyping part of a database systems application. Students should form themselves into groups of up to 4 members and pass details of the members of their group to the course leader.
Is di in compliance with its bond covenants : Dallas Instruments has a large bond issue whose covenants require: (1) that DI' s interest coverage ratio exceeds 4.0; (2) that DI' s ratio of tangible assets to long-term debt exceeds 1.50; Is DI in compliance with its bond covenants
Read the following mini security policy. : Each document should have a footer or header identifying the level of sensitivity. Suggested sensitivity levels are unrestricted and client sensitive.
Case nintendo-fighting the video game console wares : In groups of 2 people, analyze the case Nintendo: Fighting the Video Game Console Wares (p. 618) using the case analysis process below. Provide a strategic recommendation.
Best estimate of CDBs cost of equity : Stock in CDB Industries has a beta of 1.10. The market risk premium is 7 percent, and T-bills are currently yielding 4.0 percent. CDB’s most recent dividend was $3.40 per share, and dividends are expected to grow at a 5 percent annual rate indefinite..
What is the tax implication on the sale : A machine will reach the end of its useful life in year 5. The realizable salvage value is expected to be $50,000 with a book value of zero. The company's marginal tax rate is 34%. What is the tax implication on the sale of the new machine at year 5?
Confidence interval estimate for the population mean : Construct a 95% confidence interval estimate for the population mean turnover time. Interpret the interval constructed in (a). Do you think the quality improvement project was a success?

Reviews

Write a Review

Operating System Questions & Answers

  Implementation of algorithms for process management

The Shortest Job Next (SJN) algorithm queues processes in a way that the ones that use the shortest CPU cycle will be selected for running rst.

  Develop a user mode command interpreter

Develop a user mode command interpreter which support list-short.

  Memory allocation in operating system

Analysis and implementation of algorithms for memory allocation in operating system, Explain First- t and best- t methods are used in memory allocation in operating systems.

  Stand alone child process

Forking the child process

  Write a multi-threaded program

Write a multi-threaded program to solve producer and consumer problem

  Marginal and average cost curves

n a competitive market place (pure competition) is it possible to continually sell your product at a price above the average cost of production.

  Simulating operating systems scheduling

Simulate the long-term scheduler, the short-term scheduler and the I/O scheduler of the computer using the First-Come-First-Serve algorithm.

  Issues with trusted platform module

Research paper discussing the issues with Trusted Platform Module (TPM)

  Threads

Explain a complication that concurrent processing adds to an operating system.

  Design and programming

Use the semaphore methods to control the concurrency of the solution

  Virtual machines

Virtual machines supported by a host operating system

  Discuss an application that benefits barrier synchronization

Discuss an application that would benefit from the use of barrier synchronization

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd