What measures will implement to protect three states of data

Assignment Help Computer Engineering
Reference no: EM133716317

Homework: Internet/Web Access Management

Learning Objectives and Outcomes

1. Design a remote access solution.

Requirements

Read the following case scenario:

The 9-Iron Country Club, commonly referred to as 9, is located in the suburbs of St. George City (a fictional city). It offers the amenities of a 9-hole golf course, a swimming pool, the clubhouse, and other recreational facilities to more than 1,200 members. 9 employs around 75 staff who cater to private functions such as weddings, meetings, and banquets.

9 is a seasonal club that closes its outdoor operations between November and February. These four months are critical to plan new venues and coordinate member activities for the upcoming season. The management operations and the catering tasks of 9 are normally executed through the local network. Therefore, the management and staff face many problems, especially during the winter. An incident occurred when Rob Domore, 9's food and beverage director and head chef, had to drive to the club in bad weather conditions. Rob stated, "We put in a lot of effort to provide impeccable services to members and maintain a competitive position. I think about how much more efficient we could be if we could work from home in the off-season. If we had remote access, all senior management and executive staff could be reaching out to members, helping them plan upcoming events and preparing for next season without coming into the office."

Mr. Domore also wanted to provide more flexibility in his daily schedule. He stated, "In the season, I can't get all my office work done when we are in full swing because much of my time is spent in the kitchen and with the members. So, I desperately wanted the freedom to catch up at home, rather than stay additional hours on premises."

Using the information provided in the case scenario, you are to design a potential remote access solution for 9. You also must prepare a report describing the remote access solution. The report should include the following considerations:

1. Needs and desires of customers and club members-available services, time availability, and network design.
2. Risk management or assessment-protection of confidential and personally identifiable information (PII).
3. Data classification and security requirements-what measures will be implemented to protect the three states of data.

Reference no: EM133716317

Questions Cloud

Medicare hospice benefit : McNutt and HoeferIn the context of Serenity Care Hospice, a relevant social policy to apply would be the Medicare Hospice Benefit.
Guide for children individualize interventions : Pain Management Guide for Children Individualize interventions based on the amount of pain experienced and the child's characteristics,
Impacted the healthcare system : Explain one factor that has impacted the healthcare system over the past 50 years.
Specific practice skills necessary for engaging the client : Provides a description of a minimum of three specific practice skills necessary for engaging the client/agency
What measures will implement to protect three states of data : Data classification and security requirements-what measures will be implemented to protect the three states of data.
Bulge on the right side of the inguinal area : A 19-year-old college student presents to the office with a bulge on the right side of the inguinal area.
What are your thoughts regarding the disability rights : What are your thoughts regarding the disability rights movement and what are some positive consequences of this movement?
History of hepatitis : A new patient to your practice states that he has been told that he has had a history of hepatitis but is unsure as to what that is.
Patient with symptoms of hypersensitivity and anaphylaxis : How would a nurse respond to a patient in a biphasic response compared to a patient with a symptoms of hypersensitivity and anaphylaxis?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Flowcharts and pseudo-code are two language-independent

flowcharts and pseudo-code are two language-independent ways to capture the programming steps needed to solve a

  What are some potential problems you might encounter

What are some potential problems you might encounter when attempting to install a non-Microsoft operating system into a Hyper-V virtual machine?

  Understand what is expected of you

Create the team structure (depending on the type of capstone assigned) Assign well-defined tasks to each member - Select an IS business problem

  Define two types of machine learning

Define two types of machine learning. How do these concepts benefit health care IT and the overall delivery of quality health care?

  What might be the better measure for central tendency

What might be the better measure for central tendency? (i.e., mean, median, or mode) and why? Report the standard deviation.

  Describe a recent security breach involving a network flaw

Describe a recent security breach involving a network flaw or endpoint control failure that has been reported in the news. How did it impact business

  Consider a system that consists of five processes

Consider a system that consists of five processes. Process 0 generates random integers and send them to process 1.

  Question 1 write a program that gives the following table

question 1 write a program that gives the following table. use single cout statement and

  Create a class specificationexception

Create a class SpecificationException that is thrown whenever your program encounters a specification that does not make sense.

  Provide the george washington school district

What value could the ERP system provide the George Washington School District, and, in general, how do you plan to allocate the grant funds?

  Write a research paper on host intrusion detection system

Write research paper on Host Intrusion Detection System. How can one protect against virus outbreaks in organization? What are the common causes of the problem?

  What additional steps can be taken

The network restrictions surrounding the web authentication service is one layer of defense. What additional steps can be taken?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd