Question about security policy

Assignment Help Operating System
Reference no: EM1379465

ABC corporation is a small but growing manufacturing corporation with revenues of approximately $25 million. Until now, the corporation has had a single headquarters and production facility in a Midwestern city, but it is building a separate sales office on the east coast which will open in a few months.

You are the Manager of IT at ABC, and you have been responsible for operating a basic set of computer applications in the Midwest office: order entry and fulfillment, financial and accounting systems, e-mail, and general office automation (word processing, etc.) You have been maintaining a Local Area Network connecting the office desktop computers to each other and to the applications running on the company servers, but there has been no access to these systems from outside the office.

You have been told by senior management that when the new sales office opens, the east coast staff must be able to enter new orders directly into the home office system using their desktop computers. They also need access to customer records and order status information. Furthermore, management wants to implement a new company website for customers to place orders online and to view their ordering history, current order status, and financial statement information without calling customer service.

You realize there are huge security implications implied by these changes. You have been uneasy in the past because the company has lacked a comprehensive computer security policy. Furthermore, most employees have not really understood all the security issues in the old "internal" computing environment. The new configuration with its networked offices and Internet-accessible elements will require more security awareness than ever. You see this as your opportunity, and imperative, to move the company to accept a formal corporate security standard. In the weeks ahead, you will begin to educate both management and system users regarding the components, necessity, and use of security standards for all of the new technologies that will be used, as well as for the current technology they have been using. In the end, you will develop all of this together into a complete corporate security program proposal.

Please help so that I can complete the work:

Before you start this project, you need to sell senior management on investing in a security plan and associated software. You know that evolutionary changes in computing environments have created security concerns for IT managers. How to create/implement adequate computer system security policies and procedures to adapt to these changes has become an urgent task for top corporate IT executives, including you. Use the Library and the Internet to research the history and evolution of computer security. Prepare for a discussion with the CEO and other senior management by summarizing your research, listing the key trends/events and the nature of the challenges they present.

Reference no: EM1379465

Questions Cloud

Consider the numerous economic systems of the world : Consider the numerous economic systems of the world capitalism, socialism and communism and the related free market economies and a command economy. With this in mind debate the following question.
Find probability that the return for common stocks : Describe the effect of an outlier or extreme value on the confidence interval - Find the probability that the return for common stocks
Find a current online business magazine : Go to the World Wide Web on the Internet as well as find a current online business magazine. Select an article on international business.
Internet communications to an overseas location : What would you say to a CEO of an organization that is seeing moving their customer service that is done through telephone as well as Internet communications to an overseas location
Question about security policy : ABC Corporation is a small but growing manufacturing corporation with revenues of approximately $25 million. Until now, the corporation has had a single headquarters and production facility in a Midwestern city,
Mature stage of the product lifecycle : By studying the product lifecycle tell me what you think the differences would be in managing distribution if you compare as well as contrast the introduction stage versus the mature stage
Find a research-based article in a business journal : Prepare a paper which evaluates the use of the scientific method in an actual research project. Find a research-based article in a business journal
Difference between data and information : Describe the difference between data and information and provide an example of each. Also define an operating system.
What are few of the challenges experienced by governments : What are few of the challenges experienced by governments that are associated with globalization

Reviews

Write a Review

Operating System Questions & Answers

  How operating system is clearly superior for any application

Consider the advantages and disadvantages of each major operating system that Amy might use on the Web server. If you don't think that one operating system is clearly superior for this application, describe why.

  Threads

Explain a complication that concurrent processing adds to an operating system.

  Question about network management systems

Discuss and provide examples of the Network Management Systems. In most industries it is very important to know all the issues.

  Advantages and disadvantages of major operating system

Consider the advantages and disadvantages of each major operating system that Amy might use on the Web server. In a one-page memorandum to Amy.

  Designing crow foot e-r diagram

Make an IE Crow's Foot E-R diagram for the entities section and employee and the 1:N relationship between them. Suppose that a section/department does not require to have an employee.

  Program of law of total probability

Think about a system that generates ten million audit records every day. Also suppose that there are on average 10 attacks per day on this system and that each such attack is reflected in twenty records.

  Determining race condition in protocol

What is race condition in this protocol?debitcard machine determine current value of card in dollars which is stored in value x.

  Solving wired versus wireless lan issues

Suppose your local hospital has decided to extend their offices to another department of the building where it is difficult to have cables installed,

  How many page faults are generated using lru replacement

How many page faults are generated by the following arrayinitialization loops, using LRU replacement, and assuming page frame 1 has the process in it, and the other two are initially empty.

  Question about internet use policies

Internet use policies are often utilized in corporations. Conduct independent research on these and construct an Internet use policy for your company or an organization of your choice.

  Automatic or traditional method to open a file

Some systems automatically open a document when it is referenced for the 1st time and close the file when the job terminates.

  Saving the customer user accounts

A local beauty corporation has implemented a website to boost sales and awareness of products they manufacture. The website will contain data about the firm and all products available.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd