What applications will be included in baseline

Assignment Help Computer Network Security
Reference no: EM133440213

The Chief Information Security Officer (CISO) has come to you to improve the security of the company. As a small-to-medium-size company, you've been chosen to not only lead the OS security process, but to actually conduct the work.

The CISO is concerned about the amount of variation between each device. He doesn't believe that the team can effectively secure every device when each system has different applications and different versions of those applications. He would like you to evaluate creating a single image that will work for the entire company.

Need to answer questions specifically to how it relates to the information in this document.

1. Will a single baseline work for the entire company? Why or why not?

2. What applications will be included in the baseline? If you chose to develop several baselines, what applications will be in each baseline?

3. What other security measures will you put in place on the baseline? Are there any other tasks when creating the baseline?

4. What cost saving measures could be used if the company was to move to virtualized client computers (using Zero Clients at desks)?

5. What is the most efficient way of deploying your baseline(s) to the 150 client computers they currently have?

6. Will any policies, procedures, or practices be required to be updated (or created) to support this?

Reference no: EM133440213

Questions Cloud

How important is the role of team captain in your sport : How important is the role of team captain in your sport? Which selection process would you choose for selecting the captain?
Configuring effective firewall rules : What type of threat research is best suited to configuring effective firewall rules?
Examples of software engineering code of ethics : Client and Employer: Software engineers shall act in a manner that is in the best interests of their client and employer, consistent with the public interest.
Discuss common teacher integration strategies for data : Discuss some of the common teacher integration strategies for data, analysis, and assessment activities and the resources that support those strategies.
What applications will be included in baseline : What applications will be included in the baseline? If you chose to develop several baselines, what applications will be in each baseline?
Developed relationships with babies-toddlers at childcare : Each day needs to be about how you (educator) developed relationships with the babies/toddlers at childcare centre? and the other need to be about?
Networking security strategy : You will be presented a network design from Assignment 1 and networking security strategy Assignment
What us laws did aaron swartz break : What US laws did Aaron Swartz break?. Where is Aaron Swartz now? Should MIT and other top universities collaborate in prosecutions with law enforcement agencies
Description of the actus reus of crime-mens rea of the crime : Write brief description of the above documentary. Also, indicate the following: the actus reus of the crime, mens rea of the crime.

Reviews

Write a Review

Computer Network Security Questions & Answers

  Experiences with the social networking sites

Your experiences with the social networking sites like Craig list etc etc and Why do you think social networking sites are so popular? In other words, what is their stickiness?

  Discuss long-term initiatives to encourage positive change

In order to implement a few immediate measures to effect positive changes, what recommendations should cyber security professionals follow -  Critically discuss long-term initiatives to encourage positive change with regards to assessing security ..

  Primary steps to database design

We explored the 2-primary steps to database design - conceptual design and physical design. We discussed importance of having representatives from all key stakeholders in conceptual design to ensure accuracy of the design.

  Develop and ratify borderless cybersecurity policies

Establish international cybersecurity threat operation centers where international partnerships work together under the same roof to thwart cyberspace threats

  Which represents the effort of uk against cyber criminality

Which of following represents the effort of United Kingdom against cyber criminality? Which of following, according to a recent report to Congress, has now surpassed international drug trafficking as a terrorist financing enterprise?

  Provide a windows security implementation model

You are a Security professional hired by NextGard Technologies in Phoenix, AZ to provide a Windows security implementation model for their organization.

  What advice do you have for the project manager

How likely does it seem that Pete will achieve his desired goals of being on time and within budget if nothing is done?

  Discuss cutting-edge networking paradigms

Compare different privacy challenges and assess their impact in real-world applications and Analyse privacy challenges in diverse applications and propose count

  Total cost of ownership return on investment

Total Cost of Ownership Return on Investment. Explain each of these approaches, state your preference, and analyze the advantages and disadvantages of each with a focus on IT investments.

  How icv be used in network communication to detect errors

Briefly explain how an integrity check value (ICV) may be used in network communication to detect errors. When using an ICV, explain why a message might be transmitted correctly but the receiver believes the message contains an error (a false negativ..

  Technical magazine and have legal analysis

Select an article on an emerging technology from a reputable journal or technical magazine and have a legal analysis.

  Briefly define categories of security services

What is the difference between link and end-to-end encryption and List ways in which secret keys can be distributed to two communicating parties

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd