Question about security policy

Assignment Help Operating System
Reference no: EM1379465

ABC corporation is a small but growing manufacturing corporation with revenues of approximately $25 million. Until now, the corporation has had a single headquarters and production facility in a Midwestern city, but it is building a separate sales office on the east coast which will open in a few months.

You are the Manager of IT at ABC, and you have been responsible for operating a basic set of computer applications in the Midwest office: order entry and fulfillment, financial and accounting systems, e-mail, and general office automation (word processing, etc.) You have been maintaining a Local Area Network connecting the office desktop computers to each other and to the applications running on the company servers, but there has been no access to these systems from outside the office.

You have been told by senior management that when the new sales office opens, the east coast staff must be able to enter new orders directly into the home office system using their desktop computers. They also need access to customer records and order status information. Furthermore, management wants to implement a new company website for customers to place orders online and to view their ordering history, current order status, and financial statement information without calling customer service.

You realize there are huge security implications implied by these changes. You have been uneasy in the past because the company has lacked a comprehensive computer security policy. Furthermore, most employees have not really understood all the security issues in the old "internal" computing environment. The new configuration with its networked offices and Internet-accessible elements will require more security awareness than ever. You see this as your opportunity, and imperative, to move the company to accept a formal corporate security standard. In the weeks ahead, you will begin to educate both management and system users regarding the components, necessity, and use of security standards for all of the new technologies that will be used, as well as for the current technology they have been using. In the end, you will develop all of this together into a complete corporate security program proposal.

Please help so that I can complete the work:

Before you start this project, you need to sell senior management on investing in a security plan and associated software. You know that evolutionary changes in computing environments have created security concerns for IT managers. How to create/implement adequate computer system security policies and procedures to adapt to these changes has become an urgent task for top corporate IT executives, including you. Use the Library and the Internet to research the history and evolution of computer security. Prepare for a discussion with the CEO and other senior management by summarizing your research, listing the key trends/events and the nature of the challenges they present.

Reference no: EM1379465

Questions Cloud

Consider the numerous economic systems of the world : Consider the numerous economic systems of the world capitalism, socialism and communism and the related free market economies and a command economy. With this in mind debate the following question.
Find probability that the return for common stocks : Describe the effect of an outlier or extreme value on the confidence interval - Find the probability that the return for common stocks
Find a current online business magazine : Go to the World Wide Web on the Internet as well as find a current online business magazine. Select an article on international business.
Internet communications to an overseas location : What would you say to a CEO of an organization that is seeing moving their customer service that is done through telephone as well as Internet communications to an overseas location
Question about security policy : ABC Corporation is a small but growing manufacturing corporation with revenues of approximately $25 million. Until now, the corporation has had a single headquarters and production facility in a Midwestern city,
Mature stage of the product lifecycle : By studying the product lifecycle tell me what you think the differences would be in managing distribution if you compare as well as contrast the introduction stage versus the mature stage
Find a research-based article in a business journal : Prepare a paper which evaluates the use of the scientific method in an actual research project. Find a research-based article in a business journal
Difference between data and information : Describe the difference between data and information and provide an example of each. Also define an operating system.
What are few of the challenges experienced by governments : What are few of the challenges experienced by governments that are associated with globalization

Reviews

Write a Review

Operating System Questions & Answers

  Determine the maximum total aggregate throughput

Consider Figure 5.26. Assume that all links are one hundred Mbps. Determine the maximum total aggregate throughput that can be achieved among the nine hosts and two servers in the network?

  Automatic diagnostic system

Sommerville recommended that objects manipulated through users should be drawn from their own domain rather that an computer domain.

  Difference between a formal and an informal system

Explain the main reasons that firms implement intranets and one major obstacle to obtaining these benefits also explain the difference between a formal and an informal system.

  Computing effective memory access time

Assume that 80 percent of the accesses are in the associative memory and that, of the remaining, 10 percent (or 2 percent of the total) cause page faults.What is the effective memory access time?

  Question about network management systems

Discuss and provide examples of the Network Management Systems. In most industries it is very important to know all the issues.

  Challenges os faces-passing parameter among user-kernel mode

Write two challenges an OS faces when passing parameters between user and kernel mode. Describe how an OS can overcome them

  Saving the customer user accounts

A local beauty corporation has implemented a website to boost sales and awareness of products they manufacture. The website will contain data about the firm and all products available.

  Value of semaphore before entering into critical section

Give a solution using Monitor that is starvation-free. What would be value of semaphore before entering into Critical Section and after leaving it.

  Discuss five computer forensics tools

Use Library and internet resources to analyze five computer forensics tools. For each tool, list the vendor and its functions.

  Identifying communication techniques

Explain the techniques that will be used to monitor implementation of the electronic medical record.

  Threads

Explain a complication that concurrent processing adds to an operating system.

  Minimum length of ethernet frames

Discuss how many minimum length Ethernet frames can a ten Mbps switch port forward in one second, assuming no collision?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd