Write new security policies

Assignment Help Computer Network Security
Reference no: EM132489086

You have just been hired as the IT Security Manager of ABC Financial Services (a large-sized financial company employing 1000 people in South Carolina). One of your first task is to write four new security policies.

These policies include: An e-mail policy for employees concentrating on personal use of company resources. . An Internet/WIFI policy . An account and password policy . An antivirus policy There are many resources available on the web so researching these topics and policies should be easy.

The most difficult part of this exercise will be determining how strict or how lenient you want to make these policies for this particular company. Project Plan You are asked to create four separate policies.

Be specific in your terms and conditions of use. Each policy should include the following items (be sure to label them within your documents):

1. Overview

2. Purpose

3. Scope

4. Policy

5. Policy Compliance

6. Related Standards, Policies and Processes

7. Definitions and Terms

Reference no: EM132489086

Questions Cloud

Discuss the legal principles she will rely upon : Discuss the legal principles she will rely upon and the response of the oil company. What would be the likely outcome of Nancy's challenge?
What is the taxable income and what is the income tax : What is their taxable income? What is their income tax? Alfred Wild is 32 years old; his wife Silvia is 34. They file a joint return.
What is a corporation : 1. What is a corporation? 2. What are the six steps to forming a corporation?
Calculating the firms WACC : Refer to the data for the Collins Group. Which of the following is the best estimate for the weight of debt for use in calculating the firm's WACC?
Write new security policies : Determining how strict or how lenient you want to make these policies for this particular company. Project Plan You are asked to create four separate policies
What lake would recognize realized gross profit of : In 2017, What Lake would recognize realized gross profit of? Lake Power Sports sells jet skis and other powered recreational equipment.
Tools and techniques of analysis assignment : Tools and techniques of Analysis Assignment help and solution, Financial Statement Analysis - assessment writing service - How can we use cross-sectional
What reliable would report installment receivables of : What Reliable would report installment receivables of? Reliable Enterprises sells distressed merchandise on extended credit terms.
What amount should the company record the land : Company on behalf of the seller and $1,000 due for the current year after the purchase date. For what amount should the company record the land?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Explain the symmetric and asymmetric cryptography

What is the importance of selecting a proper algorithm and key strength? Provide your response and provide feedback to at least two other students.

  How the network infrastructure is more secure

The CIO asks you to explain why you believe it is important to secure the Windows and Unix/Linux servers from known shortcomings and vulnerabilities. Explain to your CIO what you can do to make sure the network infrastructure is more secure.

  What is ip address and tcp port number used by your client

CPS 470/570- What is the IP address and TCP port number used by your client computer (source) to transfer the file to gaia.cs.umass.edu? What is the IP address and port number used by gaia.cs.umass.edu to receive the file.

  What are some windows security infrastructure components

How do you measure security? One of the ways is to calculate risk by the formula: R = T x V x A/C.  What are some Windows security Infrastructure components

  Prepare a diagram using rationale

Analyse the article/case study from the perspective of at least two different classical ethical theories and present well reasoned arguments for your assessments and recommendations.

  What is the history of DES and why is s-DES studied

What is the history of DES, and why is s-DES studied? How does DES and 3DES work? Provide an example of each

  Design and implement a secure enterprise wireless network

MN603 Wireless Networks and Security-Melbourne Institute of Technology-Australia-Design and implement a secure enterprise wireless network.

  What information security problem does the company address

What information security problem does the company address? What information security products does the company have to solve the problem? is the information security problem that the company is focusing on important?

  Implement client-server application to emulates ping utility

The goal of this assignment is to implement a client-server application which emulates the ping utility. It is also good practice because it implements the client-server architecture.

  Encryption requirements as stated in the law

Identify ONE law, either a US Federal Law or a US state law, that requires the use of encryption to protect either consumer or corporate information from unauthorized disclosure. Write a 150+ word plain English summary in which you address the fol..

  Select a terrorist attack and explain what happened

Select a terrorist attack and study what happened/Explain what happened. Terrorist attack choice: 9/11 attacks

  Identify best practices for fixing vulnerabilities

Identify best practices for fixing vulnerabilities and insecure interactions as introduced by poor coding. Update your table of contents before submission.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd