What is missing, incomplete, inaccurate

Assignment Help Computer Engineering
Reference no: EM1328440

Part 1:
Think about a business you are familiar with, one that uses networks and computers to support business functions. Create a list of ten important, specific items such as computers, disks, equipment, and information such as sales data, client data, and network configuration. Identify the threats these important items are subject to. Devise a security policy to mitigate that threat. Document your analysis process. Note that this information will be useful moving forward, so develop it fully at this time.

Part 2:
Read the following mini security policy. Assess this security policy in four major areas. What is missing, incomplete, inaccurate, or ill advised?

Acme Security Policy
Each document should have a footer or header identifying the level of sensitivity. Suggested sensitivity levels are unrestricted and client sensitive.

Email clients should enable SSL encryption both for POP and SMTP. That way regardless of where we work, our email traffic will not expose any data to network eavesdropping techniques. If client confidential data must be emailed amongst Pixel Inc. consultants, the file should be encrypted, perhaps using a cross-platform product such as PGP Desktop 9.0 or S/MIME, so that data cannot be read from email servers along the way.

File servers with shared folders should have access controls enabled to only members of the authorized group. Shared folders should also be encrypted so that physical theft of the server, its hard drives, or the backups will not compromise data confidentiality.
Periodic backups will be made of server hard drives and stored offsite in a secure location such as a safety deposit box. Access to the backups will be shared.

Only a select few consultants under contract to Pixel Inc. will be given the file server Administrator account password.
Laptop computers will not automatically login the administrator and each account will be password protected. Local folders containing client sensitive data should be encrypted so that theft of the laptop or its hard drive will not compromise data confidentiality.
Portable storage devices such as USB and Firewire disk drives or flash disks and thumb drives may be used to store client sensitive documents if they're stored in encrypted folders or drive images.

Laptop computers will have screen savers enabled with password protection. Users will switch on their screen saver to lock the computer when they walk away from it.

Passwords should be chosen wisely, i.e., common dictionary words would not be used.

Reference no: EM1328440

Questions Cloud

Determining the annual rate : Find out the compound amount if $6,400 is invested for 2 years at 12% compounded monthly. What difference would compounding daily make in this example?
Explain the integrated marketing communication : Explain the Integrated marketing communication and e-business technology and how does it fit into the technology of e-Business
Who manages a supply chain : Who manages a supply chain - How can the members of the chain be convinced to allow the chain to be managed by one organization?
Charismatic and transformational leadership across cultures : Do charismatic and transformational leadership generalize across cultures?
What is missing, incomplete, inaccurate : Email clients have to enable SSL encryption both for POP and SMTP. That way regardless of where we work, our email traffic would not expose any data to network eavesdropping techniques.
Article 2 of the ucc : Article 2 of the UCC does not apply to a sale of:  Ball bearings.  Wheat that has been harvested.
Explain supply chain risk mitigation : Supply Chain Risk Mitigation and What factors (risks) can potentially disrupt a supply chain, and how
The key success factors (ksfs) of apple : the key success factors (KSFs) of Apple addressing the below questions and using 4 or more web references. Please ensure I can pull up these references to read more about them and also incorporate them into my work.
Explain the methods used to treat customers indivdually : Explain the Methods used to treat customers indivdually and Why are they significant to e-commerce

Reviews

Write a Review

Computer Engineering Questions & Answers

  Dbmss have their own language

Explain Do all DBMSs have their own language? Is it similar to a programming language.

  Program in visual basic to calculate area of a triangle

Write down a program in the visual basic which determines the area of a triangle. If three sides a, b and c entered do not make a triangle transmit the message out to the screen that the data entered was invalid.

  What is autonomic relational database management system

In regards to Autonomic RDBMS, is it important to utilize a user-centered design (UCD) approach when designing a database for a small to medium size company. Why or why not.

  The activity undertaken after the arrival of the stimulus

Environment. The stimulus occurs within certain conditions. The system may be in an overload condition or may be running when the stimulus occurs, or some other condition might be true.

  Output of convolution

Convolve sub-image shown below with the 3x3 mean filters. Specify the output of convolution at the center entry of sub-image?

  What is meant by user cantered design

What is meant by ‘user cantered design'

  Write down a user-defined function

Write down a user-defined function

  Generating an array for a particular structure

You should generate a structure student_t in order to store the student name and three exam scores. You will generate an array of this structure in the main function.

  Designing program

Write down a Program that lets the user enter an amount as a float value representing a total in the dollars and cents.

  Program for converting infix expressions into postfix form

Write a program which will transform the infix expressions into the postfix form and then determine the resulting postfix expression.

  Make short story consisting of several of these sentences

Write down an application that uses random-number generation to create sentences. Use four arrays of strings called article, noun, verb and preposition.

  Project management process

Discuss what do you meant by the project management process in detail? Also state and describe the six project steps, its application to the technology projects.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd