Prepare a security standard document

Assignment Help Computer Network Security
Reference no: EM131210512

Yummy Good Treats has a number of traveling salespeople who cover territories throughout the Midwest. These employees use laptops with wireless Internet connections and mobile phones to communicate with the home office. They use these devices to retrieve confidential price lists and inventory information from headquarters. The salespeople need access to the information while they're on the road. They also prepare customized quotes for each client and forward them to the home office for review prior to e-mailing or hand delivering them to the potential client. The company provides access through a Virtual Private Network (VPN). All employees are required to use the VPN when accessing company systems and data remotely.

You were given the task to help draft an information security standard. The organization is especially concerned about the need for maintaining the confidentiality of their pricing information (both on the price list and in quotes prepared for individual clients). You have been tasked with the responsibility of developing the first draft of a security standard document that governs the use of wireless devices and technology by the traveling salespeople.

Your supervisor has explained to you that she recognizes that organizations usually develop individual wireless device standards and confidentiality standards but stressed the importance of including all of this information in a single document. She also reminded you that the majority of the sales force is not technically proficient and they are not likely to read a document that exceeds three pages in length.

Using the slides and the NIST SP 800-46 as references, prepare a security standard document that meets the requirements of Yummy Good Treats in a clear, concise manner. While writing the document, keep in mind the business needs of the organization and the target audience for your writing.

Remember, the NIST SP is far to lengthy for our purposes, but it has some good information in it. Your standard should include the following sections:

- Statement of Standard
o Scope and applicability
o Definition of technology
o Responsibilities

- Authorized Access and Use of Equipment and Resources
o User access
o Appropriate use of systems and data
o Protection and privacy

- Prohibited Use of Equipment and Resources
o Disruptive use or misuse
o Criminal use
o Offensive or harassing materials
o Copyrighted, licensed, or intellectual property
o Other restrictions

- Systems Management
o Management of stored materials
o Employer monitoring
o Malware protection
o Physical security
o Encryption

- Violation of Policy
o Procedures for reporting violations
o Penalties for violations

Reference no: EM131210512

Questions Cloud

What information is stored in the system catalogs : What role do statistics gathered from the database play in query optimization?
How did satisfying maslow hierarchy of needs impact : Summarize the movie you selected to watch and discuss ways in which the teacher motivated his/her students. Using Chapter 8 of our text, describe the motivational theory employed for each of the strategies you listed.
Why short term goals differ from long term goals : Why can short- term goals sometimes differ from long- term goals? - Why does the Fed now establish long- term economic projections four times a year rather than two times?
Research paper about the internet of things : I need a research paper about the Internet of things. I was given a task to select particular context about internet of things and apply to a company or a school campus
Prepare a security standard document : Prepare a security standard document that meets the requirements of Yummy Good Treats in a clear, concise manner. While writing the document, keep in mind the business needs of the organization and the target audience for your writing.
Information and conclusion about the questions : What exchange rate system did Argentina adopt before 2002? Why? What factors contributed to the Argentina currency crisis? Write more information and conclusion about the questions.
Prepare a presentation that includes information from video : Develop a presentation that includes information from the video on ways to address anxiety-reducing techniques and improve overall presentation delivery.
What is the cost of joining r and s using a hash join : What is the cost of joining R and S using a sort-merge join? What is the minimum number of buffer pages required for this cost to remain unchanged?
Main causes for the deficits : US has experienced continuous current account deficits since the early 1980s. What do you think are the main causes for the deficits? What would be the consequences of continuous U.S current account deficits?

Reviews

Write a Review

Computer Network Security Questions & Answers

  Management of cybersecurity

Submit a list of five cybersecurity breach case studies. For each breach, write a brief statement covering the following points:

  Network risk assessment

The key to this assignment is to demonstrate your understanding of the topics for the course, not to re-word the text or reference material. Please see Appendix A for the grading rubric on all written assignments.

  Implement a secure network infrastructure

Implement a secure network infrastructure for a commercial LAN or WAN environment - Understand the impact on the social and commercial environment of network security design

  What is the impact of not having diagrams that describe the

What is the impact of not having diagrams that describe the program?

  Project on network security

Can you do project on network security any topic it can be practical/ theoretical / or survey. it has to be 8-12 pages long and follow the IEEE journal standard and also need to show or demo or code or whatever the product is.

  Improve the security of business

What can be done to improve the security of business uses of the Internet? Give several examples of security measures and technologies you would use.

  The performance of a wimax network appears to be lower than

the performance of a wimax network appears to be lower than expected and you suspect interference to be the cause.

  Explain security strategy for a corporate wan

Prescribe a security strategy for a corporate WAN. Be sure to include methods to combat both technical and nontechnical attacks. C

  Mobile devices security

Mobile Devices Security

  What efforts must be made to help overcome these challenges

What do you believe to be the primary challenges that law enforcement agencies must face in investigating cyber exploitation and cyber crime? What efforts must be made to help overcome these challenges?

  How does data leakage occur in an organization

The focus of the research paper is Data Leakage. How does data leakage occur in an organization? What are the common causes of this problem? How would use address this troublesome trend?

  Application of principles of ethics to ict-related issues

Demonstrate factual knowledge, understanding and the application of principles of ethics to ICT-related issues and demonstrate depth of analysis by examining arguments for one ethical issue related to ICT

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd