Os and database security for an organization

Assignment Help Management Information Sys
Reference no: EM13813774

Using the South University Online Library or the Internet, research about the following:

Planning and implementing security for mobile computers and mobile devices

Planning and implementing a secure database

Verification testing for security mechanisms that are in place

Modify the report from W2 Assignment 2 to accommodate suggestions and recommendations from your instructor and your own changes based on the readings and activities for this week. Color code your changes to the report so that they are easy to identify.
Provide recommendations to secure the computers in the Marketing department of this organization. These computers travel outside of the network, so you need to consider how they will connect to the home server, and what should be done to protect them. You should consider the level of access they have to the network and the consequence if they are stolen or used by someone outside of the organization.

Provide recommendations for securing network traffic between the workstations within the building and the server. Identify trust boundaries for the organization and recommend security measures for each trust boundary. Characterize which trust boundaries represent the highest level of trust and those that represent the lowest; what is the distinction between these levels?

Recommend measures to harden the server OS to prevent outsiders from accessing the networked computers. Identify the services for your recommended OS that will aid in the security effort. Explain the policy that should be used for patches and updated on both the server and the workstation OSs. Why is this an important consideration?

Secure the database of the organization and assign the required permissions to the users. You should create a chart of groups and permissions for this portion of the assignment (you do not need to identify specific tables, just information groups).

Describe the implementation process and timeline for your recommendations. Try to give as reasonable a timeline as possible and explain the timeframe you choose.

Expand the section of your report for verifying the implementation of the previously suggested security recommendations from Week 1 and 2. Identify what is being tested for each verification activity and what is proven by each activity. This should include testing activities to make sure the security system is working properly. An example of this would be using an intentionally incorrect password to make sure the system does not allow the login.

Be sure to include your references and citations for the measures and activities you suggest. You should have gathered this from the research in the library or on the Internet.

Reference no: EM13813774

Questions Cloud

Downloading the financial report from the walt disney : Your responsibility will be to do three ratios from the Activity Ratios. The three being: Inventory Turnover, Accounts Receivable Turnover, and Total Asset Turnover. Either by downloading the financial report from the Walt Disney website, or on the N..
Pros and cons of raising the prices at bulls eye : Despite having some market power, Bulls Eye is currently suffering losses. An analyst at Bulls Eye is recommending to the manager to raise prices, so that profitability can be improved. The manager is unsure of this strategy as recent data points ..
Critique the civilan review board : Critique the Civilan review board and answer the following question: Citizen review of police are designed to look over police discretion throughout history in determining the proper discipline. The citizen oversight
What happen when margaret sanger opened birth control clinic : What happened when Margaret Sanger opened the first birth control clinic?
Os and database security for an organization : OS and Database Security for an Organization
Prepare a term paper on current economic topic : For the term paper, you are required to pick a current economic topic.
Describe the virtue of intellectual courage : Describe the virtue of Intellectual Courage. Describe a moment in your life when you showed Intellectual Courage. What belief did you question? Why were you willing to give up that belief?
Round off to the nearest tenths place : Findthe following for an input of 120 VAC(RMS), 60 hertz, given a 17:1 stepdown transformer, and a full-wave bridge rectifier. Rload is 120 ohms. Round off to the nearest tenths place.
Write a paper about gurung girls and women subordination : Write a paper about Gurung girls and women subordination due to traditional roles.

Reviews

Write a Review

Management Information Sys Questions & Answers

  Internet to improve service and communication

Web-Based Technology - How does a Food Bank near you use the Internet to improve service and communication? Any thought on improving what they do?

  Create a graphical representation

Create a graphical representation of your recommended architecture. Identify and describe any potential ethical issues that could arise in connection with the new architecture

  Create a constructor to initialize student''s attributes

Create a constructor to initialize Student's attributes and use setters (you need to encapsulate your attributes).In the constructor, use the setter methods to set the attributes rather than setting them directly

  In the acute health care industry it is imperative that

in the acute health care industry it is imperative that health care organizations have educated and supportive nursing

  Functionality and efficiency of the complaint-push model

Compare and contrast the functionality and efficiency of the complaint-push model and data-pull model within the process of health care service delivery

  Create a comprehensive plan to utilize social networking

You are an e-marketing and e-commerce consultant. Mary and Joe Johnson, the owners of Book Bunker, have hired you to help them create a comprehensive plan to utilize social networking in their marketing and advertising programs.

  Management information system mis practiceswhy would a

management information system mis practiceswhy would a business want to follow sustainable mis practices? what are

  Operating activities during the year

Robinson company reported a net loss of $23,000 during the year. comparing beginning and ending balances, you determine the following: (1) accounts receivable increased by $8,000; and (2) accrued expenses payable increased by $5,000. what was the ..

  Smartphones and the great digital divide

Smartphones and the Great Digital Divide - When accessing the Internet, what can you do on a desktop or laptop computer that you can't do on a smartphone?

  Explain electronic medical record systems

What management, organization, and technology factors are responsible for the difficulties in building electronic medical record systems? Explain your answer.

  It may be more helpful to think of all media in terms of a

it may be more helpful to think of all media in terms of a mix of attributes. what does this mean? how does this

  Converging technologiesnew and converging technologies have

converging technologiesnew and converging technologies have created an information age economy and altered the way

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd