Prepare a security standard document

Assignment Help Computer Network Security
Reference no: EM131210512

Yummy Good Treats has a number of traveling salespeople who cover territories throughout the Midwest. These employees use laptops with wireless Internet connections and mobile phones to communicate with the home office. They use these devices to retrieve confidential price lists and inventory information from headquarters. The salespeople need access to the information while they're on the road. They also prepare customized quotes for each client and forward them to the home office for review prior to e-mailing or hand delivering them to the potential client. The company provides access through a Virtual Private Network (VPN). All employees are required to use the VPN when accessing company systems and data remotely.

You were given the task to help draft an information security standard. The organization is especially concerned about the need for maintaining the confidentiality of their pricing information (both on the price list and in quotes prepared for individual clients). You have been tasked with the responsibility of developing the first draft of a security standard document that governs the use of wireless devices and technology by the traveling salespeople.

Your supervisor has explained to you that she recognizes that organizations usually develop individual wireless device standards and confidentiality standards but stressed the importance of including all of this information in a single document. She also reminded you that the majority of the sales force is not technically proficient and they are not likely to read a document that exceeds three pages in length.

Using the slides and the NIST SP 800-46 as references, prepare a security standard document that meets the requirements of Yummy Good Treats in a clear, concise manner. While writing the document, keep in mind the business needs of the organization and the target audience for your writing.

Remember, the NIST SP is far to lengthy for our purposes, but it has some good information in it. Your standard should include the following sections:

- Statement of Standard
o Scope and applicability
o Definition of technology
o Responsibilities

- Authorized Access and Use of Equipment and Resources
o User access
o Appropriate use of systems and data
o Protection and privacy

- Prohibited Use of Equipment and Resources
o Disruptive use or misuse
o Criminal use
o Offensive or harassing materials
o Copyrighted, licensed, or intellectual property
o Other restrictions

- Systems Management
o Management of stored materials
o Employer monitoring
o Malware protection
o Physical security
o Encryption

- Violation of Policy
o Procedures for reporting violations
o Penalties for violations

Reference no: EM131210512

Questions Cloud

What information is stored in the system catalogs : What role do statistics gathered from the database play in query optimization?
How did satisfying maslow hierarchy of needs impact : Summarize the movie you selected to watch and discuss ways in which the teacher motivated his/her students. Using Chapter 8 of our text, describe the motivational theory employed for each of the strategies you listed.
Why short term goals differ from long term goals : Why can short- term goals sometimes differ from long- term goals? - Why does the Fed now establish long- term economic projections four times a year rather than two times?
Research paper about the internet of things : I need a research paper about the Internet of things. I was given a task to select particular context about internet of things and apply to a company or a school campus
Prepare a security standard document : Prepare a security standard document that meets the requirements of Yummy Good Treats in a clear, concise manner. While writing the document, keep in mind the business needs of the organization and the target audience for your writing.
Information and conclusion about the questions : What exchange rate system did Argentina adopt before 2002? Why? What factors contributed to the Argentina currency crisis? Write more information and conclusion about the questions.
Prepare a presentation that includes information from video : Develop a presentation that includes information from the video on ways to address anxiety-reducing techniques and improve overall presentation delivery.
What is the cost of joining r and s using a hash join : What is the cost of joining R and S using a sort-merge join? What is the minimum number of buffer pages required for this cost to remain unchanged?
Main causes for the deficits : US has experienced continuous current account deficits since the early 1980s. What do you think are the main causes for the deficits? What would be the consequences of continuous U.S current account deficits?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Compare and contrast telnet and ftp and discuss the downfall

Determine whether or not additional components could be added to the IPv4 protocol to enhance its usefulness.

  List and explain key objectives of information security

Information security is used to describe the tasks of protecting information in a digital form. List and explain three key objectives of information security. Also list and explain at least two additional protections (concepts)to present a complete v..

  Why is facebook protected from liability for content

Why is Facebook protected from liability for content posted by third parties. Do you think that Facebook and other social network providers should be protected from liability for what their members post. Why or why not

  Responsibilities of a chief information security officer

What are the responsibilities of a chief information security officer? Where and how does the person occupying this position fit into a large enterprise?

  Discuss a situation where you received security education

You have probably received some form of information security education, either in your workplace, school, or other settings. Discuss a situation where you received security education. How was it delivered?

  Provide a brief description of the model

Provide a brief description of the model - Provide a scenario where the model would be the optimal choice for access control, and why.

  Explain how files on the network may be accessed by lsdg

Explain how files on the network may be accessed by LSDG

  Case study on research genetics

ABC Institute of Research has sensitive information that needs to be protected from its rivals. The Institute has collaborated with XYZ Inc. to research genetics. The information must be kept top secret at any cost.

  Create a three page policy for business continuity

Create a three page policy for business continuity for the White House security staff. Prepare a plan based on the critical nature of information that is presented within the executive department and military strategies that are reviewed for actio..

  Evaluate ability of different cloud computing architectures

Provide an Information Security assessment on your chosen provider using the techniques proposed by Ramgovind etal, and the ASD Cloud Computing Security Considerations as your primary references.

  Cyber terrorism

competitive intelligenc, information safekeeping governance, administration, ISO/IEC 27002, Conceptual Framework

  Difference between an insider attack and an outsider attack

What is the difference between an insider attack and an outsider attack? What is this defense in depth approach to security that we keep hearing about

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd