Discuss set of policies that can be used to control security

Assignment Help Computer Engineering
Reference no: EM132175184

Question: Collaborate with your team on the components of a policy that will help manage the services provided by a vendor, including cloud services that deliver both applications and data storage.

Discuss a set of policies that can be used to control security provided by outside organizations. Use Ben's graphics business as a focal point of the conversation.

Part 1: Recently, Ben determined that Wi-Fi would help workers at the company so they could move around the design stations and not have to be wired to a specific network connection. He is also interested in using cloud-based technologies to further increase the company's productivity.

Leveraging your Week Five Learning Team collaborative discussion, "Security Control Policies," create 3- to 4-slide media-rich Microsoft® PowerPoint® presentation with speaker notes that outlines the outside service provider policy section of the Information Security Policy. Include considerations for controlling outside service provider risks, including cloud services. Be sure to explain the following:

1. Potential issues related to wireless security

2. The advantages and disadvantages of cloud technologies

3. The risks and ways to reduce them

Part 2: Compile all sections of the Information Security Policy presentation (I compiled them, except the part has you have to add when finished with part 1 of this assignment). This should include all parts of the policy from Weeks Two through Five. Be sure to incorporate feedback received from the instructor, and add one Title slide, one Agenda slide, one Conclusion slide, reference slide(s), and include the appropriate appendices.

The total presentation should be 30 to 35 slides. (I included 26 slides already)

Write a 1- to 2-page executive summary that you could provide as a handout summarizing the key findings of your presentation.

Note: All references need to adhere to APA citation guidelines.

Reference no: EM132175184

Questions Cloud

What is the effective interest rate of loan being offered : A point is 1% fee paid to the bank when the loan is received. What is the 'effective interest rate' of the loan being offered
What is an app idea that you have : What is an app idea that you have that would people would benefit from? Who would use the app (audience)? Is there an app similar to this?
Determine two possible corporate governance challenges : Determine two possible corporate governance challenges that might be faced by Best Buy as a result of its rapid growth.
How can the us and other democracies preserve internet : Are there alternatives to government regulations for combating hate speech, bullying, gaslighting, etc. online while limiting censorship.
Discuss set of policies that can be used to control security : Discuss a set of policies that can be used to control security provided by outside organizations. Use Ben's graphics business as a focal point.
Predict the significant ways in which the best practices : Predict the significant ways in which the best practices policy that you created will contribute towards the long-term sustainability of the company.
Develop a case for or against the financial institutions : Write three separate essays in which you develop a case for or against the following regulations of financial institutions
Determine how an organization was breached : Locate a current article about how an organization was breached/hacked and customer data was stolen. The article can be published within the last 4 years.
Ongoing feedback about the team performance : What processes would you put in place to ensure that your team could provide you and each other with ongoing feedback about the team performance?

Reviews

Write a Review

Computer Engineering Questions & Answers

  Mathematics in computing

Binary search tree, and postorder and preorder traversal Determine the shortest path in Graph

  Ict governance

ICT is defined as the term of Information and communication technologies, it is diverse set of technical tools and resources used by the government agencies to communicate and produce, circulate, store, and manage all information.

  Implementation of memory management

Assignment covers the following eight topics and explore the implementation of memory management, processes and threads.

  Realize business and organizational data storage

Realize business and organizational data storage and fast access times are much more important than they have ever been. Compare and contrast magnetic tapes, magnetic disks, optical discs

  What is the protocol overhead

What are the advantages of using a compiled language over an interpreted one? Under what circumstances would you select to use an interpreted language?

  Implementation of memory management

Paper describes about memory management. How memory is used in executing programs and its critical support for applications.

  Define open and closed loop control systems

Define open and closed loop cotrol systems.Explain difference between time varying and time invariant control system wth suitable example.

  Prepare a proposal to deploy windows server

Prepare a proposal to deploy Windows Server onto an existing network based on the provided scenario.

  Security policy document project

Analyze security requirements and develop a security policy

  Write a procedure that produces independent stack objects

Write a procedure (make-stack) that produces independent stack objects, using a message-passing style, e.g.

  Define a suitable functional unit

Define a suitable functional unit for a comparative study between two different types of paint.

  Calculate yield to maturity and bond prices

Calculate yield to maturity (YTM) and bond prices

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd