How a company-wide policy program could help the situation

Assignment Help Computer Network Security
Reference no: EM13649338

Peak View Sound Sources is a public company based in Denver, Colorado and is focused on providing digital media and Web sites to music companies and musicians through the Mountain and West Coast regions. The company has a solid reputation and is starting to get some national and worldwide attention, with new prospective companies wanting to take advantage of the quality services they have see on other existing Web sites.

Your company has been hired to assist Peak View Sound Sources (PVSS) to ascertain the security posture of the company's Information Systems resources and services. You are heading the team of auditors tasked to perform the audit and assessment.

You enter the company offices of PVSS and begin your analysis of the environment and situation.

Initial analysis has allowed you to determine that the company is made up of the following divisions:

• Corporate Management and Support Staff: This organization contains the executive management, human resources, and accounting teams. All company decisions are directed from the management team.

• Information Technology: This team manages the networks, servers, Web sites, and desktop environments for the company. The team has a perception of being difficult to work with, as they are slow to adopt new technology and slow to implement new offerings. The reality is that the team has resources and wants to uptake the newest and greatest technology, but they spend most of their time putting out fires and reacting to issues.

• Media Content and Design: This team is in charge of working with the record companies and musicians to create the Web Sites and implement the product offerings that are sold.

• Sales and Marketing: This team works with the musicians and record companies to offer and sell the services of PVSS.

There is a concern about the security of the infrastructure with respect to the ability to protect the copyrighted material that PVSS is given to host, because a single incident several years ago took place in which an entire new CD was released prematurely via the Internet. Although PVSS was not directly linked to the leak, there are suspicions surrounding PVSS.
Assignment Deliverables

As you continue your analysis, you see that the Information Technology (IT) department has developed several guidelines and procedures about how various systems should be considered and set up, but this is internal only to the IT department. Every time a new machine is set up and deployed, within a month, the configuration is changed.

• Explain why you think the use of these guidelines and procedures is not sufficient and may not solve the problem. Consider how a company-wide policy program could help the situation.

• As you begin to prepare your game plan to conduct an Information Security Audit, talk about why you think this current situation makes it difficult to identify the controls that need to be examined.

• If you were performing this security audit, with which regulations would you want to ensure that PVSS complies? Why?

Reference no: EM13649338

Questions Cloud

Determine velocity as function if time for raindrop of mass : Determine the velocity as a function if time for a raindrop of mass m = 4x10-6 kg that reaches a terminal velocity ofvt = 6m/s, for which the resistive force is given by f = bv where bis the proportionality constant. Evaluate the constant b
Describe what is the position of the image : An object is 7.94 cm from the surface of a reflective spherical Christmas-tree ornament 7.8 cm in diameter. What is the position of the image
What angle does the light leave the water : A diver shines a flashlight upward from beneath the water ata 38.0^\circ angle to the vertical. At what angle does the light leave the water?
What power does the engine develop : An engine moves a boat throughthe water at a constant speed of 15 m/s. What power does the engine develop
How a company-wide policy program could help the situation : Explain why you think the use of these guidelines and procedures is not sufficient and may not solve the problem. Consider how a company-wide policy program could help the situation.
What is the rotational inertia of wheel about rotation axis : A constant horizontal force F of magnitude 20 N is applied to awheel of mass 20 kg and radius 0.5 m. The wheel rolls withoutslipping on the horizontal surface, and the acceleration of its center of mass has magnitude 0.5 m/s^2.
Find what was the initial speed of the bullet : A 12 g bullet moving horizontally strikes and remains in a 3.0 kg block initially at rest on the edge of table. What was the initial speed of the bullet
Determine what is the high speed : A motor has a constant angular acceleration of 5rev/sec2. If the motor goes from low speed of 1200RPM tohigh speed in 5 seconds, what is the high speed
How much kinetic energy is lost in this collision : A 2.0 kg object moving with a velocity of 5.0 m/s in the positive x direction strikes and sticks to a 3.0 kg object moving with a speed of 2.0 m/s in the same direction. How much kinetic energy is lost in this collision

Reviews

Write a Review

Computer Network Security Questions & Answers

  Efficient means of electronic payments

Think about security concerns and limited resources, do you think public sector entities should consider utilizing PayPal to facilitate inexpensive and efficient means of electronic payments?

  Explain security model of class using cnss model

suppose that the security model is required for protection of your class. Using CNSS model, examine each of the cells and write a short statement.

  Denial of service and distributed denial of service attacks

US cryptography export restrictions: past, present, and future and biometrics for authentication: security and privacy implications.

  Cryptography assignment

cryptography assignment:  Consider the following problems: (P1) computing the output p from an input n; (P2) computing the output phi(n) from an input n. Which one of the following statements is true?

  Result is the theft or misuse of confidential information

what is a security incident?a security incident in an organization is a serious event that can occur at any point from

  Using the diffie-hellman key agreement protocol find the

1 using the diffie-hellman key agreement protocol find the common key that can be used by two parties with keys k1 7

  Identify and describe the organizational authentication

Identify and describe the organizational authentication technology and network security issues

  Design item hash table from using hash function

Design the 11-item hash table that results from using hash function h(i) = (i mod 11) to hash the keys 12, 44, 13, 88, 23, 94, 11, 39, 20, 16, and 5, for each of the following assumptions.

  What security features given by running special software

What security features could be given without changing mail delivery infrastructure, i.e., by only running special software at source and destination?

  You have been hired as the system administrator for msp llc

desktop migration proposalyou have been hired as system administrator for msp llc. your first task involves in

  What is expected number of bits raw keys agree

phase 1 communication between Alice and Bob. Suppose the raw keys consist of k bits each. What is the expected number of bits on which Alice's and Bob's raw keys agree? Explain your answer.

  Outline labor costs equipment costs service costs for

network consultation proposal pages.a. recommend one suitable network designb. suggest one network architecture.c.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd