Protecting data from destruction and loss

Assignment Help Basic Computer Science
Reference no: EM131011127

Unit 5 Assignment 2: Security Plan

As we begin to rely more and more on our computer systems, including our mobile devices, to store and access data, some of which is highly confidential, the need for a plan to keep our systems and data secure becomes very critical. For this assignment, you will create a simple security plan for yourself. First of all describe the system(s) your security plan will address. (Do you have a smart phone and desktop, or do you have only a laptop?) Be sure to indicate if you are the only regular/authorized user of the system or if there are others. Then, address each of the following areas in your security plan:

1.  Deterring intruders

2.  Protecting data from destruction/loss

3.  Internal security and/or confidentiality of data on multi user systems

Your final security plan should be one page in length and will be scored according to the following rubric:

CATEGORY/ Points

25

20

15

10

Description of System

System(s) thoroughly described and all system users noted.   At least 3 sentences.

System(s) thoroughly described and all system users noted.   At least 2 sentences

System(s) thoroughly described, without system users indicated.   At least 2 sentences

System(s) somewhat described, without system users indicated.   At least 1 sentence.

Amount of Information

All topics are addressed and answered with at least 5 sentences about each.

All topics are addressed and answered with at least 2 sentences about each.

All topics are addressed, and answered with 1 sentence about each.

One or more topics were not addressed.

Quality of Information

Information clearly relates to the main topic. It includes several supporting details, examples or rationale.

Information clearly relates to the main topic. It provides 1-2 supporting details,  examples or rationale.

Information clearly relates to the main topic. No details are given.

Information has little or nothing to do with the main topic.

Mechanics

No grammatical, spelling or punctuation errors.

Almost no grammatical, spelling or punctuation errors

A few grammatical spelling, or punctuation errors.

Many grammatical, spelling, or punctuation errors.

Reference no: EM131011127

Questions Cloud

Problem regarding the expected return on aapl stock : Suppose the risk free interest rate is 4.20 percent, the market risk premium is 6.00 percent and the beta for AAPL stock is 1.30. What is the expected return on AAPL stock?
Sketch a graph of the solid that is produced by revolving : Sketch a graph of the solid that is produced by revolving the region enclosed by the graphs about the x-axis. Set up the integral that will give you the volume of the sold.
Provide a brief overview of the main points of the article : Provide a brief overview of the main points of the article. Describe at least two things you learned from the article.Describe the potential challenges and benefits for families who have one or more children with exceptionalities
Google transition from a proprietorship : This assignment will explore Google's transition from a proprietorship to a publicly traded company. Write a paper regarding the conversion process and the affect of the conversion on the company's financing.
Protecting data from destruction and loss : As we begin to rely more and more on our computer systems, including our mobile devices, to store and access data, some of which is highly confidential, the need for a plan to keep our systems and data secure becomes very critical
Find a formula for the riemann sum : Consider ∫R∫ xy dA, where R is the square 0 ≤ x ≤ 1, 0 ≤ y ≤ 1. Find a formula for the Riemann sum. Evaluate the formula. Check your answer by evaluating the iterated integral,
Problems in a comparative analysis : Assume that two companies that operate walk-in clinics both had the same December year end, but one was based in Aspen, Colorado, a winter resort, while the other operated in Cape Cod, Massachusetts, a summer resort. Would this lead to problems in..
True and the engine cost : What savings in labor per bus could UTC expect if the promise is true and the engine cost is 64,000 per bus and the firm agrees it will purchase back their engines at the end of 6 periods of use for 4,000 each?
How a young childs fine motor skills are developed : Describe in detail how a young child's fine motor skills are developed-making sure to include the theory of motor-skill learning that best fits this situation

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Annotated bibliography

Annotated Bibliography

  What is an html text editor

Windows NotePad is a simple text editor. What is the difference between a text editor and a word processor?" What is an HTML Text Editor? What is it used for and how does it compare to a regular text editor

  Recognize components of system cpu

Recognize the following components of your system: type of central processing unit (CPU), amounts of random access memory (RAM) and read-only memory (ROM), input and output devices, and types of storage.

  How many total bits are required for a direct-mapped cache

How many total bits are required for a direct-mapped cache with 16 KB of data and 4-word blocks, assuming a 32-bit address.

  Prompts the user for an arithmetic operator

Write a code segment that prompts the user for an arithmetic operator and prints the value abstained by applying that operator to x and y.

  Explain hardware to gather the essential information

Write down a 2-3 page paper explaining the hardware and software utilized to support personal, workgroup, and enterprise computing in the present organization.

  In order to create a unique field in a table in a database

1. in order to create a unique field in a table in a database you need to define a .viewprimary keyhost keyjoin2.a in

  Design a program that ask for the price of each item

Design a program that ask for the price of each item, and then displays the subtotal of the sale, the amount of sales tax and the total. Assume the sales tax is 6 percent. Need help with this question.

  Find the solution to each of these recurrence

Find the solution to each of these recurrence relations with the given intial conditions. Use an iterative approach.

  Search the web for steganographic tools

Search the Web for steganographic tools

  How does that procedure aid security

1. The essence of software assurance lies in following good software engineering procedure. Specifically, how does that procedure aid security?

  Create incident response policy covers development-response

Policy to reduce network down-time if future incidents happen. Create incident response policy which covers development of incident response team, disaster recovery process and business continuity planning.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd