What are two types of data and connections

Assignment Help Computer Engineering
Reference no: EM133244785

Case: Shovels and Shingles is a small construction company consisting of 1 multi-purpose server and 25 networked workstations and laptops. All employees have Internet access and use email. The construction manager and workers use tablet PCs in the field. The following are types of security controls: Administrative controls: Policies approved by management and passed down to staff, such as policies on password length Logical/technical controls: Control access to a computer system or network, such as a usemame and password combination Hardware controls: Equipment that checks and validates IDs, such as a smart card for or security token for multifactor authentication Software controls: Controls embedded in operating system and application software, such as NFS permissions Physical controls: Control entry into buildings, parking lots, and protected areas, such as a lock on an office door.

Answer the following question(s):

Question 1. What are two types of data and connections that Shovels and Shingles should protect?

Question 2. Which types of security controls would protect that data?

Fully address the questions in this discussion; provide valid rationale for your choices, where applicable;

Reference no: EM133244785

Questions Cloud

Share examples of ethnocentrism and cultural relativism : Question 1. Share examples of ethnocentrism and cultural relativism.
Which type of ciso are you - company fit matters : CSCI 4623 University of Notre Dame What are the 19 Traits of Top CIOs and explain and Which type of CISO are you - Company fit matters
Applications that you use on a daily basis : ITNT 1700 Macomb Community College applications that you use on a daily basis, but for which you don't need to install, update, and maintain the software
Review the medicare-medicaid : Access the AHIP web page. Review the Medicare, Medicaid, and Individual coverage links shown above.
What are two types of data and connections : ITM 5600 Webster University What are two types of data and connections that Shovels and Shingles should protect and Which types of security controls
Outline the history and development of law enforcement : Outline the history and development of law enforcement to include hiring and training for law enforcement officers. How has the Supreme Court ruling
Social work practice with groups : Group work offers many benefits that cannot be achieved through individual therapy alone. The most obvious benefit is group member validation. The knowledge tha
How does a football game reflect a symbolic reality : How does a football game reflect a symbolic reality? How is this reality communicated and what are some of the symbols?
What some details from wollstonecraft text that stood out : What are some details and/or ideas from Wollstonecraft's text that stood out to you (please explain briefly why it stood out to you)

Reviews

Write a Review

Computer Engineering Questions & Answers

  Write structured pseudo code describing your preparation

Draw a structured flow chart or write structured pseudo code describing your preparation to go to bed at night. Include at least two decisions and two loops.

  Determine exactly how any hours have passed since previous

Write a program that determines exactly how any hours have passed since a previous historical event happened.

  Discuss the type of breach or cyberattack

Chapter #8 in our text provides information on IT Security Framework approaches. Chapter #9 in our text provides information on User Domain Policies.

  Why are computer networks so tough to secure

define Why are computer networks so tough to secure.

  Test the code for all of the given functionality

Memory management should be done dynamically using the appropriate new operator in the constructor and the delete operator in the destructor.

  What is an information system

What is an information system and why are they important? Can u please give me some examples. I am totally clueless on this subject. Is it possible to use information technology to gain a competitive advantage.

  Write a code segment that prompts the user to enter sentence

Write a code segment that prompts the user to enter a sentence and then displays all of the words in the sentence.

  Discuss the relationship between data and information

Discuss the relationship between data, information, and knowledge. Support your discussion with at least 3 academically reviewed articles.

  Security efforts dealing with cloud infrastructure

Cloud Security Why do the majority of the security efforts dealing with cloud infrastructure focus on securing the operating system

  Desirable to force users to creat an explicit choice

Why is it not desirable to force users to build an explicit choice of a query processing strategy? Are there cases where it is desirable for users to be aware of the costs of competing query-processing strategie.

  What is the name of the scanning application

What is the name of the scanning application that is better for performing a software vulnerability assessment with suggested remediation steps?

  How to design a class and a program

create a class and a program that creates an object of the class and prompts the user to enter the name, type, and age of his or her pet. This data should be stored in the object. Use the object's accessor method to retrieve the pet's name, type, ..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd