What are two types of data and connections

Assignment Help Computer Engineering
Reference no: EM133244785

Case: Shovels and Shingles is a small construction company consisting of 1 multi-purpose server and 25 networked workstations and laptops. All employees have Internet access and use email. The construction manager and workers use tablet PCs in the field. The following are types of security controls: Administrative controls: Policies approved by management and passed down to staff, such as policies on password length Logical/technical controls: Control access to a computer system or network, such as a usemame and password combination Hardware controls: Equipment that checks and validates IDs, such as a smart card for or security token for multifactor authentication Software controls: Controls embedded in operating system and application software, such as NFS permissions Physical controls: Control entry into buildings, parking lots, and protected areas, such as a lock on an office door.

Answer the following question(s):

Question 1. What are two types of data and connections that Shovels and Shingles should protect?

Question 2. Which types of security controls would protect that data?

Fully address the questions in this discussion; provide valid rationale for your choices, where applicable;

Reference no: EM133244785

Questions Cloud

Share examples of ethnocentrism and cultural relativism : Question 1. Share examples of ethnocentrism and cultural relativism.
Which type of ciso are you - company fit matters : CSCI 4623 University of Notre Dame What are the 19 Traits of Top CIOs and explain and Which type of CISO are you - Company fit matters
Applications that you use on a daily basis : ITNT 1700 Macomb Community College applications that you use on a daily basis, but for which you don't need to install, update, and maintain the software
Review the medicare-medicaid : Access the AHIP web page. Review the Medicare, Medicaid, and Individual coverage links shown above.
What are two types of data and connections : ITM 5600 Webster University What are two types of data and connections that Shovels and Shingles should protect and Which types of security controls
Outline the history and development of law enforcement : Outline the history and development of law enforcement to include hiring and training for law enforcement officers. How has the Supreme Court ruling
Social work practice with groups : Group work offers many benefits that cannot be achieved through individual therapy alone. The most obvious benefit is group member validation. The knowledge tha
How does a football game reflect a symbolic reality : How does a football game reflect a symbolic reality? How is this reality communicated and what are some of the symbols?
What some details from wollstonecraft text that stood out : What are some details and/or ideas from Wollstonecraft's text that stood out to you (please explain briefly why it stood out to you)

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd