What is missing, incomplete, inaccurate

Assignment Help Computer Engineering
Reference no: EM1328440

Part 1:
Think about a business you are familiar with, one that uses networks and computers to support business functions. Create a list of ten important, specific items such as computers, disks, equipment, and information such as sales data, client data, and network configuration. Identify the threats these important items are subject to. Devise a security policy to mitigate that threat. Document your analysis process. Note that this information will be useful moving forward, so develop it fully at this time.

Part 2:
Read the following mini security policy. Assess this security policy in four major areas. What is missing, incomplete, inaccurate, or ill advised?

Acme Security Policy
Each document should have a footer or header identifying the level of sensitivity. Suggested sensitivity levels are unrestricted and client sensitive.

Email clients should enable SSL encryption both for POP and SMTP. That way regardless of where we work, our email traffic will not expose any data to network eavesdropping techniques. If client confidential data must be emailed amongst Pixel Inc. consultants, the file should be encrypted, perhaps using a cross-platform product such as PGP Desktop 9.0 or S/MIME, so that data cannot be read from email servers along the way.

File servers with shared folders should have access controls enabled to only members of the authorized group. Shared folders should also be encrypted so that physical theft of the server, its hard drives, or the backups will not compromise data confidentiality.
Periodic backups will be made of server hard drives and stored offsite in a secure location such as a safety deposit box. Access to the backups will be shared.

Only a select few consultants under contract to Pixel Inc. will be given the file server Administrator account password.
Laptop computers will not automatically login the administrator and each account will be password protected. Local folders containing client sensitive data should be encrypted so that theft of the laptop or its hard drive will not compromise data confidentiality.
Portable storage devices such as USB and Firewire disk drives or flash disks and thumb drives may be used to store client sensitive documents if they're stored in encrypted folders or drive images.

Laptop computers will have screen savers enabled with password protection. Users will switch on their screen saver to lock the computer when they walk away from it.

Passwords should be chosen wisely, i.e., common dictionary words would not be used.

Reference no: EM1328440

Questions Cloud

Determining the annual rate : Find out the compound amount if $6,400 is invested for 2 years at 12% compounded monthly. What difference would compounding daily make in this example?
Explain the integrated marketing communication : Explain the Integrated marketing communication and e-business technology and how does it fit into the technology of e-Business
Who manages a supply chain : Who manages a supply chain - How can the members of the chain be convinced to allow the chain to be managed by one organization?
Charismatic and transformational leadership across cultures : Do charismatic and transformational leadership generalize across cultures?
What is missing, incomplete, inaccurate : Email clients have to enable SSL encryption both for POP and SMTP. That way regardless of where we work, our email traffic would not expose any data to network eavesdropping techniques.
Article 2 of the ucc : Article 2 of the UCC does not apply to a sale of:  Ball bearings.  Wheat that has been harvested.
Explain supply chain risk mitigation : Supply Chain Risk Mitigation and What factors (risks) can potentially disrupt a supply chain, and how
The key success factors (ksfs) of apple : the key success factors (KSFs) of Apple addressing the below questions and using 4 or more web references. Please ensure I can pull up these references to read more about them and also incorporate them into my work.
Explain the methods used to treat customers indivdually : Explain the Methods used to treat customers indivdually and Why are they significant to e-commerce

Reviews

Write a Review

Computer Engineering Questions & Answers

  Analyze running time of algorithm

Analyze running time of algorithm

  Write down a program to solve linear system

Write down a program to solve linear system

  What is an approximate total channel load

Ten thousand airline reservation stations are competing for the use of the single slotted ALOHA channel. The average station makes 18 requests per hour. A slot is 125 micro-seconds.

  Plan an algorithm that finds k smallest numbers

plan an algorithm that finds k smallest numbers of the whole G sorted in ascending order and has time complexity O(m*lg(m)) and spatial complexity O(m).

  Spreadsheet model of the heat transfer situation

Spreadsheet model of the heat transfer situation

  Explain two methods for categorical data conversion

explain two methods for categorical data conversion. List the advantages and disadvantages of this approach.

  Converting the skip list l into binary search tree t(l)

Any skip list L can be converted into binary search tree T(L)as follows: The root of T(L) is considered as the leftmost node on the highest non-empty level of L the left and right sub-trees.

  Program on bst

Program on BST

  Program to print a sequence of 20 random die tosses

Write down a program which produces a sequence of 20 random die tosses in an array and which prints the die values.

  Changing the web-based email system

Explain an example of an email message which you could transmit to the user of this Web-based email system and that could enable you to read all of that users email.

  Describe different structures and areas within brain

make sure to discuss the location in the brain, their functions, disorders/pathology related to damage to these structures, and other important information in regards to these structures.

  Benefit of web-based computing environment

Web-based applications like e-commerce and e-government exemplify the platform shift from the client/server computing to the Web-based computing so for this essay question.

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd