Practices for security policies and procedures

Assignment Help Basic Computer Science
Reference no: EM131368681

Database Administration

Word doc - 4-5 pages

You are the new DBA for the XYZ company, you have been asked to research best practices for security policies and procedures. Specifically, what information can you provide regarding controls related to each of the following?

  • Personnel 
  • Physical access 
  • Maintenance 
  • Data privacy

Provide examples of each type of control.

You have also been asked to write a draft policy and procedure handbook that details the possible areas of data security threats for XYZ company. Specifically, the company would like to be able to understand the mitigation of risks related to each of the following:

  • Accidental loss
  • Theft and fraud
  • Loss of privacy or confidentiality
  • Loss of data integrity
  • Loss of availability

Reference no: EM131368681

Questions Cloud

Improve the user experience : New features in an OS may improve the user's experience. Describe one feature you would add or change to an OS you know. Why did you select this feature? Explain its benefits. What drawbacks could it introduce.
Apply the first low of thermodynamics : Draw the T-s diagram and block diagram of this plant and Thermodynamic properties of a fluid and the fundamental Principles governing the mechanical and thermal fluid characteristics thermodynamic cycle
Describe methods for monitoring and analyzing area of risk : Interpret an existing operation, or identify typical issues you might find in a health care organization, with indications of the potential risk.Describe methods for monitoring and analyzing identified potential areas of risk.Document 5 key strateg..
Security administration and access control : From the e-Activity, summarize the ethical dilemma, and develop a plan in which you would mitigate the vulnerability. Compare and contrast physical access controls and logical access controls. Further explain in what ways both physical and logical a..
Practices for security policies and procedures : You are the new DBA for the XYZ company, you have been asked to research best practices for security policies and procedures. Specifically, what information can you provide regarding controls related to each of the following?
Implement a solution that offers redundancy : Implement a solution that offers redundancy and site resilience or fault tolerance. Implement a backup solution for server data protection. Suggest a backup rotation for protecting your domain controllers.
Describe and provide facts about the ethical dilemma : Describe and provide facts about the following ethical dilemma. Labor issues among Samsung suppliers in china and Korea. Hazardous conditions for all employees (lack of proper equipment).
Exploring website coding practices : From the e-Activity, describe what you learned about the Website that you selected by looking at the source code. Analyze the different components of the Website such as the version of HTML that was used, comment tags, and if the head elements wer..
Version of the operating system that you used : Describe your experience installing the Microsoft Office Suite software. Indicate the version of the software that you installed, and the name and version of the operating system that you used.

Reviews

Write a Review

Basic Computer Science Questions & Answers

  A network administrator deliberately disable

We know the disadvantage of a "black hole" is that packets do not reach their destination and no error messages are sent back to inform the sender.Why would a network administrator deliberately disable ICMP messaging on their network?

  Steps to follow to get evidence in investigating files

Drive that you are investigating comprises several password-protected files and other files with headers which do not match extension. What procedures would you require to follow to retrieve evidence?

  What are reasonable criteria for a comparison

Do the same exercise with C-style strings using only C facilities such as malloc() and strlen(). Compare the two functions. What are reasonable criteria for a comparison?

  The multiplexer and expected simulation report

Write a Verilog testbench for the multiplexer and expected Simulation Report.

  Simulate a telephone customer service center

Design, implement, and test a computer program to simulate a bank. Your simulation should evaluate the average time customers have to wait in line before they are served by a teller

  Write a statement that changes the value of 6 in the array

Write a statement that changes the value of 6 in the array to a 12.

  Policies to keep it under control

No matter how much freedom you give your staff, it's important to retain some control over how technology is used in your business. Because when you have control, you can be confident.

  Create alternative versions of compute freqs ()

Time () to determine if one approach is much faster or slower than the others

  Department of computer science

Write a short essay (roughly 350-400 words) about some topic related to computing and/or communication technology that interests you and has social or ethical implications.

  How to break 4 digit numbers to two parts in java

Help me how to break 4 digit numbers to two parts (2 digits and 2 digits) in java

  Large role in outcome of second world war

Encryption and decryption played a large role in the outcome of the Second World War. After the war and for the next few decades, encryption played little or no role in the life of the average person.

  The company has several branch offices

The company has several branch offices. Each branch is identified by a branch_number. The name, address (street, city, ZIP), and revenue_target of each branch office are maintained. Each branch has a designated branch manager and the branch man..

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd