What is the it security policy

Assignment Help Computer Engineering
Reference no: EM132112385

Question: New Content for Week 3: System Design

For this week's contribution to the overall capstone project, collaborate and discuss with the team's Security Specialist about the security and privacy of the software and hardware solution for Verbania. Provide best security practices and guidelines to implement and follow, as well as the creation of formal security policies and a security plan. Include the following policies in your IT security policy:

• Disaster recovery

• Password creation and protection

• Remote access

• Routers and switches security

• Wireless communication

• Server security

• Acceptable encryption

• E-mail

Document the team's security plan, security policy and security solution.

Within the template, prepare 5-7 pages of content addressing the team's System Design. Insert content into the template document under Section Three.

Part 3 - Individual Project - Submit to the Unit 3 IP Area

This part of the assignment is FOR GRADING for this week. This assignment is a document addressing security and should be submitted to the week's individual drop box.

Individual Submission

Consider the overall team project solution (hardware and software) relative to security. Create and submit a 3-4-page Word document defining your recommendations concerning security. Be sure to articulate reasons for specific choices. Include in your document an explanation about the relationship between the IT security policy and the chosen security mechanisms for your overall solution. Be prepared to discuss your thoughts with the team's Security Specialist.

Reference no: EM132112385

Questions Cloud

Discuss about the vaults and security lighting : Use of locks, safes, vaults and security lighting. discussion subject of this week is to write an initial post on which one of these you will be utilizing.
Define metrics and measure the current process : Define metrics and measure the current process. Use process improvement techniques to improve the process.
Jewelry firm buys semiprecious stones to make bracelets : A jewelry firm buys semiprecious stones to make bracelets and rings How many orders per year will be placed for semi-precious stones?
Which variables are used in calculating the sgr : How does a firm finance a growth that is higher than its SGR? What is the opportunity cost for a firm that grows at a lower rate than its SGR?
What is the it security policy : Consider the overall team project solution (hardware and software) relative to security. Create and submit a 3-4-page Word document defining your recommendation
Discuss three ways to approach these elements : Discuss three ways to approach these elements, and explain how they have been applied by the management at Southwest Airlines.
Do you agree or disagree with the content : Provide your own assessment of the article. (Did it make sense? Did you learn anything from it? Do you agree or disagree with the content?)
Installing windows server 2016 in a physical : Please explain what the difference is with installing Windows server 2016 in a physical, virtual, or cloud environment?
Disruptive communication that diverted the group : Disruptive communication that diverted the group, and counteractive communication that got the group back on track?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd