Networks and computers to support business functions

Assignment Help Basic Computer Science
Reference no: EM131002763

Part 1:

Think about a business you are familiar with that uses networks and computers to support business functions.

Create a list of ten important, specific items such as computers, disks, equipment, and information such as sales data, client data, and network configuration. Identify the threats these important items are subject to.

Devise a security policy to mitigate that threat. Document your analysis process. Note that this information will be useful moving forward, so develop it fully at this time.

Part 2:

Read the following mini-security policy. Assess this security policy in four major areas. What is missing, incomplete, inaccurate, or ill-advised?

Acme Security Policy

Each document should have a footer or header identifying the level of sensitivity. Suggested sensitivity levels are unrestricted and client sensitive.

Email clients should enable SSL encryption both for POP and SMTP. That way, regardless of where we work, our email traffic will not expose any data to network eavesdropping techniques. If client confidential data must be emailed amongst Pixel Inc. consultants, the file should be encrypted, perhaps using a cross-platform product such as PGP Desktop 9.0 or S/MIME, so that data cannot be read from email servers along the way.

File servers with shared folders should have access controls enabled to only members of the authorized group.

Shared folders should also be encrypted so that physical theft of the server, its hard drives, or the backups will not compromise data confidentiality.

Periodic backups will be made of server hard drives and stored offsite in a secure location such as a safety deposit box. Access to the backups will be shared.

Only a select few consultants under contract to Pixel Inc. will be given the file server Administrator account password. Laptop computers will not automatically login the administrator and each account will be password protected. Local folders containing client sensitive data should be encrypted so that theft of the laptop or its hard drive will not
compromise data confidentiality.

Portable storage devices such as USB and Firewire disk drives or flash disks and thumb drives may be used to store client sensitive documents if they're stored in encrypted folders or drive images.

Laptop computers will have screen savers enabled with password protection. Users will switch on their screen saver to lock the computer when they walk away from it.

Passwords should be chosen wisely, i.e., common dictionary words would not be used.

Assignment Requirements:

Answers contain sufficient information to adequately answer the questions

No spelling errors

No grammar errors

*Two points will be deducted from grade for each occurrence of not meeting these requirements.

For more information and examples of APA formatting, see the resources in Doc sharing or visit the KU Writing Center from the KU Homepage.

Reference no: EM131002763

Questions Cloud

What will be its new speed : A merry-go-round in a park consists of an essentially uniform 200-kg solid disk rotating about a vertical axis. The radius of the disk is 6.0 m. The merry-g0-round is rotating at 0.20 rev/s. If now a 100-kg man quickly sits down on the edge of it,..
The capital budgeting decision techniques : The capital budgeting decision techniques that we've discussed all have strengths and weaknesses, but they do comprise the most popular rules for valuing projects. Valuing entire businesses, on the other hand, requires that some adjustments be made t..
Calculate the moment of inertia of the merry-go-round : The boy then crawls towards the center of the merry-go-round along a radius. What is the angular speed in radians/second of the merry-go-round when the boy is half way between the edge and the center of the merry go round?
Describe friedman''s viewpoint towards csr and his policies : Describe Friedman's viewpoint towards CSR and his policies
Networks and computers to support business functions : Periodic backups will be made of server hard drives and stored offsite in a secure location such as a safety deposit box. Access to the backups will be shared.
Environmental laws : you are very interested in how public opinion and economics play a role in determining how many and what type of environmental laws are passed. The research paper you prepare this week should be directed toward the general public to raise awareness o..
Which measure of central location is meaningful : Which measure of central location is meaningful when the data are categorical
What would the speed of the pellet have to be in order : A 30-g pellet of this metal at 16oC hits a solid wall and comes to a complete stop. What would the speed of the pellet have to be in order for it to melt completely when it hits the wall, assuming that all of its kinetic energy is transformed into..
Sachs brands defined benefit pension plan : Calculate the effect of the change in the assumed discount rate on the PBO at the beginning of 2012 with respect to Davenport.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  Convert this cfg to one with-out the lambda-production then

convert this CFG to one with-out the lambda-Production then.

  Find the error in the pseudocode

Find the error in the pseudocode. Constant Real GRAVITY = 9.81 Display "Rates of acceleration of an object in free fall:

  Explain how do social networking and bookmarking sites

how do social networking and bookmarking sites affect internet users personal interactions with the internet? as a web

  Why technical writing is an important skill to have in it

Why do you think technical writing is an important skill to have in IT

  What is the const keyword in c++ and why would you use

What is the const keyword in C++? Why would you use the const keyword

  Calculate the percentage overhead protocol stack

Calculate the percentage overhead associated with the following protocol stack assuming you need to transmit 19,800 bits of data.

  Create a histogram and a dot plot of the data

Create a random set of data equal to 25 samples with the random number generator. For the X column, use the Normal distribution with a mean of 100 and standard deviation of 20. For the Y column, use the Poisson distribution with a mean of 25. F..

  Data management and business intelligence

(search term business casetemplate) to explain the justification for implementing a database management systemto improve business intelligence within the company.Within your business case, begin by explaining business intelligence. Then explain data ..

  Generate the k-map for this circuit

You can safely assume that the intruder will try to enter the house using only one of the three entrances. If any of the door or window is opened, you need to set the alarm signal to 1. A 0 means the door/window is closed and 1 means open.

  The power of computers to solve big problems

A field in which people use the power of computers to solve big problems.

  Determine if a string is a palindrome

Using the stack and queue class, determine if a string is a palindrome. A palindrome is a string (empty to many sentences) that reads the same forwards and backwards.

  Describe a file system

Theory-long answer question. Describe how a file system could be implemented using a collection of inodes and some variant of a B tree. 500-1000 words. Be sure to consider: unallocated space, bad allocations, lost and found, root directories, s..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd