Pros and cons of singular and consolidated policy format

Assignment Help Computer Network Security
Reference no: EM131404124

Learning Outcome(s):

  • Identity and understand the characteristics of a successful policy
  • Distinguish between a policy, a standard, a baseline, a procedure, a guideline, and a plan.
  • Writing style and technique - using PLAIN language
  • PLAIN language techniques for Policy writing
  • Information security framework

Policy characteristics -

Q1- There are seven successful policy characteristics, list them all and give one example from your experience for only one of these characteristics (NOT from the book).

Singular and consolidate policy -

Q2- a) What are the pros and cons of Singular and Consolidated policy format?

b) Is it necessary to include standards, baselines, guidelines or procedures in this policy document? Explain your answer.

PLAIN language -

Q3- The following table summarize changing password policy rules and related setting used  in Windows Server Active Directory. Write the corresponding policy statement using PLAIN language.

Rule

Setting

Enforce password history

24 password remembered

Maximum password age

42 days

Minimum password age

1 day

Minimum password length

7

Password complexity requirement

Yes

Store password using reversible encryption

No

Understanding CIA -

Q4- a) Define the security term confidentiality. Provide an example of a health situation where confidentiality is required.

b) Define the security term integrity. Provide an example of a financial situation in which a loss of integrity could result in significant harm.

c) Define the security term availability. Provide an example of a business situation in which availability is more important than confidentiality.

Q5- Write the differences with an example between Policies, standers, baselines, procedures and guidelines.

Verified Expert

The first part of this task includes characteristics of security policy and one of my personal experience for ‘Relevant’ Characteristic of policy is also described. The second part of assignment includes Singular and Consolidated policy formats and its pros and cons. Third part summarize Changing Password policy for Windows Server Active Directory using PLAIN Language. At last CIA (Confidentiality, Integrity and Availability) and the difference between procedures, guidelines policies and standards are discussed in this study. APA Referencing style is used for this task.

Reference no: EM131404124

Questions Cloud

What will be the companys expected profit : Given the executives' subjective probabilities for the three possible states of industry growth, what will be the company's expected profit if it chooses not to renovate the plant?
Discuss the cms pay-for-performance program : The Pay-For-Performance initiative was designed to incentivize quality improvement in healthcare. This plan is controversial and there are many mixed opinions about its effectiveness.
Discuss about the financial management : Your rough draft should include a cover page, 8 - 10 pages of writing in the body of the paper, and a reference page. The paper should demonstrate a strong thesis about the managerial processes that must be implemented before opening day.
Necessary for a process to be considered a bernoulli process : When we are sampling without replacement, under what conditions can we assume that the constant assumption has been satisfactorily met?
Pros and cons of singular and consolidated policy format : What are the pros and cons of Singular and Consolidated policy format? Is it necessary to include standards, baselines, guidelines or procedures in this policy document? Explain your answer
What is the value of the swap to the financial institution : Payments are exchanged every year, with one exchange having just taken place. The swap will last two more years. What is the value of the swap to the financial institution? Assume all interest rates are continuously compounded.
Design a swap that will net a bank, acting as intermediary : Design a swap that will net a bank, acting as intermediary, 10 basis points per annum and that will produce a gain of 15 basis points per annum for each of the two companies.
Determine probability that none will receive a movie coupon : For the five servers, determine the probability that none will receive a movie coupon.- two of the five will receive a coupon.
Estimate the two-and three- year libor zero rates : Tow- and three-year swap rates (expressed with annual compounding) are 11% and 12% per annum. Estimate the two-and three- year LIBOR zero rates.

Reviews

inf1404124

3/7/2017 3:52:03 AM

Fabulous paper. Conveyed way before the due date. Unquestionably would ask my mates to prescribe your service.

inf1404124

3/7/2017 3:19:40 AM

Please find the assignment and the book at the below link: 21297956_1Assignment1-IT409.docx 21297956_2Security Policies and Procedures.pdf • This Assignment must be submitted on Blackboard via the allocated folder. • Email submission will not be accepted. • You are advised to make your work clear and well-presented, marks may be reduced for poor presentation. • You MUST show all your work. • Late submission will result in ZERO marks being awarded. • Identical copy from students or other resources will result in ZERO marks for all involved students. • Convert this Assignment to PDF just before submission.

len1404124

2/23/2017 12:20:28 AM

Hello, Please I need your answer from your own word and don't copy from internet or book or any resources. You are advised to make your work clear and well presented marks may be reduced for poor presentation. You MUST show all your work. . Identical copy from students or other resources will result in ZERO marks for all involved students.

Write a Review

Computer Network Security Questions & Answers

  Network security and wan connectivity

The project is to design a network, network security and WAN connectivity for the following situation:

  Explain the purpose of the entity company code

Explain the purpose of the entity ‘Company Code'. How many company codes can an enterprise have and why?

  Difference between a stream cipher and a block cipher

What is your understanding of the difference between a stream cipher and a block cipher?

  Examine the many different types of attacks

There are many different types of infrastructure attacks. These include, but are not limited to, malware, insertion, buffer overflow, etc. Examine the many different types of attacks and select the two that you believe are the easiest for succes..

  Risks of downloading unauthorized copies of music files

What is one of the major risks of downloading unauthorized copies of music files from the Internet.

  Draw network diagram of this network including ip addresses

Draw a network diagram of this network including IP addresses - Describe how the attack may have occurred with sufficient information to explain how a hacker could carry out the attack. Ensure you include references.

  Management of cybersecurity

Submit a list of five cybersecurity breach case studies. For each breach, write a brief statement covering the following points:

  What are the pros and cons of each method

What are the pros and cons of each method? If you are the security officer of your company and want to set up a key distribution mechanism, which one would you choose to use?

  Define security infrastructure and protocols

The SSL protocol uses (X.509) certificates to create a secure session between a server and a client in a web session. Discuss the browser-based trust model assumed in SSL, and compare it with the trust model used in Kerberos.

  Identify the key elements in certificate

Identify the key elements in this certificate, including the owners name and public key, its validity dates, the name of the CA that signed it, and the type and value of signature.

  Identify and evaluate strategies for crisis management

Identify and evaluate strategies for crisis management. Your paper should focus on the information technology perspective in terms of crisis management.

  How security can be configured and provide configuration

Describe how the security can be configured, and provide configuration examples (such as screen-shots and configuration files). Marks are based on demonstrating technical detail and understanding, and choice of examples.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd