Information technology security

Assignment Help Operating System
Reference no: EM1379578

Assume you are an independent consultant who specializes in IT security issues. You have been retained through the Designer Distributions corporation, a mid-sized and growing customer goods distribution company, for an assignment to assess the state of their computing environment security situation. The company's newly hired VP of IT is conducting this project because she does not have a security specialist on her staff and has learned that the company does not have a comprehensive security strategy. In fact, she suspects lack of even basic security knowledge in both the IT staff and the user community.

The company has a headquarters office building, which includes the principal data center, and a separate warehouse linked to the office by an private data network. The warehouse has a small computing facility of its own for order shipment data entry and tracking. This computer is linked to the headquarters order entry systems through the network. Additionally, there are Internet-based data links to several key suppliers used to share reorder, production and shipping schedules and status information. When potential new suppliers compete for contracts with Designer Distributions, their proposals are received and negotiated via Email.

You have been interviewing executives and staff at the company and at key suppliers and are beginning to evaluate what you have learned in preparation for preparing your report to the VP of IT.

Deliverable Length: 4-5 paragraphs
You're working with the IT staff on security communication. Give them your view of the most likely causes for the breakdown of security measures in corporate network environments. Be sure to consider different kinds of possibilities, ranging from technical to procedural to human factors as you consider your choice.

 

Reference no: EM1379578

Questions Cloud

Difference between an exclusive lock and a shared lock : Describe the difference between an exclusive lock and a shared lock. Define deadlock and how can it be avoided? How can it be resolved once it occurs?
Identify various hardware components and network topologies : VaryNet Corporation wishes to create 4-individual offices across the globe. They wish to be able to connect these offices over the internet, and they want to make sure that each network is available to each other,
Analyze concepts of cryptography : You have been asked through the Training Manager to present a lunch and learn seminar on an area within your field of expertise. You select cryptography.
Explanation of it networks : While there are difficult security concerns in any isolated computing environment, addition of a network in geographically distributed facilities.
Information technology security : Assume you are an independent consultant who specializes in IT security issues. You have been retained through the Designer Distributions corporation, a mid-sized and growing customer goods distribution corporation.
Provide security suggestions for laptop users : Andersen & Sons is a huge marketing company with four offices in the Chicago area. Each office has Windows Server 2003, and all servers are in a single domain.
Solving operating system problem : Assume a time sharing operating system allocated time slices of twenty milliseconds and the machine executed an average of 5000 instructions per microsecond.
Program to compute the signature : Assume Fred sees your RSA signaure on m1 and m2, (i.e., he sees (md1 mod n) and (md2 mod n).
Trends in information management : Assume you have been asked to join with many other IT professionals for an hour on the local cable channel, discussing some of the current trends in information management,

Reviews

Write a Review

Operating System Questions & Answers

  Explain deadlock-avoidance system

What is the difference between a safe state and an unsafe state in a deadlock-avoidance system?

  Operating system for a multimedia pc

Do you really think that the selection of Operating System makes a large difference when it comes to a specific purpose?

  Point to point and end to end security models

Argue differences in point to point and end to end security models and security problems they address. Are they redundant?

  Potential security threats to managing information

Suppose that you have been asked to consult for a corporation that has branch offices in four continents. You have implemented a management data system that will enable its managers to exchange information.

  Solving hipaa privacy issues

Suppose if we learned anything from Katrina and Joplin, paper records are susceptible to loss en masse. Can you assume having 50,000 paper records blown for miles across Joplin and trying to recreate those records later

  Identify specific capabilities of computing

The creation and use of calculating technology enables new capabilities. For example, information and decision rules can be captured and copied more easily,

  Programming language machine independence

Discuss and explain the main factors that influence programming language machine independence, and how higher levels of machine independence could be achieved.

  Expansion of network services

Assume you have been hired through your local library to help them setup a LAN to connect their three library sites.

  Determine the rang of usable ip addresses

Determine the rang of usable IP addresses for the following IP subnet also determine the bradcast address for the subnet?

  Describe how to prevent race condition from occurring

Function and wife calls deposit (). Explain how a race condition is possible and what might be done to prevent race condition from occurring.

  Program of law of total probability

Think about a system that generates ten million audit records every day. Also suppose that there are on average 10 attacks per day on this system and that each such attack is reflected in twenty records.

  Question about software and staff training

As was stated before, the corporation X is going to expand its data system. To do this, it is going to choose and buy new hardware and software and retrain workers.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd