What is the it security policy

Assignment Help Computer Engineering
Reference no: EM132112385

Question: New Content for Week 3: System Design

For this week's contribution to the overall capstone project, collaborate and discuss with the team's Security Specialist about the security and privacy of the software and hardware solution for Verbania. Provide best security practices and guidelines to implement and follow, as well as the creation of formal security policies and a security plan. Include the following policies in your IT security policy:

• Disaster recovery

• Password creation and protection

• Remote access

• Routers and switches security

• Wireless communication

• Server security

• Acceptable encryption

• E-mail

Document the team's security plan, security policy and security solution.

Within the template, prepare 5-7 pages of content addressing the team's System Design. Insert content into the template document under Section Three.

Part 3 - Individual Project - Submit to the Unit 3 IP Area

This part of the assignment is FOR GRADING for this week. This assignment is a document addressing security and should be submitted to the week's individual drop box.

Individual Submission

Consider the overall team project solution (hardware and software) relative to security. Create and submit a 3-4-page Word document defining your recommendations concerning security. Be sure to articulate reasons for specific choices. Include in your document an explanation about the relationship between the IT security policy and the chosen security mechanisms for your overall solution. Be prepared to discuss your thoughts with the team's Security Specialist.

Reference no: EM132112385

Questions Cloud

Discuss about the vaults and security lighting : Use of locks, safes, vaults and security lighting. discussion subject of this week is to write an initial post on which one of these you will be utilizing.
Define metrics and measure the current process : Define metrics and measure the current process. Use process improvement techniques to improve the process.
Jewelry firm buys semiprecious stones to make bracelets : A jewelry firm buys semiprecious stones to make bracelets and rings How many orders per year will be placed for semi-precious stones?
Which variables are used in calculating the sgr : How does a firm finance a growth that is higher than its SGR? What is the opportunity cost for a firm that grows at a lower rate than its SGR?
What is the it security policy : Consider the overall team project solution (hardware and software) relative to security. Create and submit a 3-4-page Word document defining your recommendation
Discuss three ways to approach these elements : Discuss three ways to approach these elements, and explain how they have been applied by the management at Southwest Airlines.
Do you agree or disagree with the content : Provide your own assessment of the article. (Did it make sense? Did you learn anything from it? Do you agree or disagree with the content?)
Installing windows server 2016 in a physical : Please explain what the difference is with installing Windows server 2016 in a physical, virtual, or cloud environment?
Disruptive communication that diverted the group : Disruptive communication that diverted the group, and counteractive communication that got the group back on track?

Reviews

Write a Review

Computer Engineering Questions & Answers

  What would capacities and costs be to enable multiple PVCs

To do this, we'll need to run multiple PVCs through Chicago. Can this be done? If so, what would the capacities and costs be to enable this?

  Define what data management considerations

What data management considerations are there with this acquisition strategy

  Give two reasons why caches are useful

Give two reasons why caches are useful. What problems do they solve? What problems do they cause?

  Design a program which asks for the number of tickets sold

a dramatic theater has three seating sections and it changes the following prices for tickets in each section section a

  Write a brief synthesis and summary of the two articles

Research at least two articles on the topic of emerging enterprise network applications. Write a brief synthesis and summary of the two articles.

  What are the relevant issues surrounding firewall deployment

What are the relevant issues surrounding firewall deployments? How does one balance security requirements with usability requirements?

  In what ways such a structure is similar to a list

One of the problems of storing data in a matrix (a two-dimensional Cartesian structure) is that if not all of the elements are used, there might be quite a waste of space. In order to handle this, we can use a construct known as a "sparse matrix".

  What is the expected time to find a key by exhaustive

Given a computer that can test 2^40 keys each second. What is the expected time to find a key by exhaustive search given a key space, say 2^88. How do you go about figuring this out? Is there a formula or standard equation that is used?

  How kbs will be created and applied

This paper is about Knowledge-Based Systems (KBS). Considering university and government research, commercial products, computer technology, and human.

  Write a recursive function count-upper-lower

Write a recursive function count-upper-lower that takes a non-empty string as its argument and returns a tuple containing the counts of how many letters.

  Express about choosing which server-side scripting language

You've been hired by Company X to create a web site which will include a data-driven component. Describe how you would go about choosing which server-side scripting language

  How decide on whether to incorporate multimedia components

When thinking about presentations and how to create them, how would you decide on whether to incorporate multimedia components or not?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd