What type of security policy should be used and why

Assignment Help Computer Network Security
Reference no: EM13946424

A small research company in Pittsburgh is working to develop a new method of mass storage to replace current hard drive technology. Four engineers and an office manager work there. The engineers are highly skilled professionals, and the office manager is a capable computer user. The company has an always-on Internet connection because employees must conduct research frequently. The employees have hopes of making a breakthrough and bringing the company public in the next two years. You have been hired as a security consultant to assess the company's needs. Write up an proposal that includes the following:

-What type of security policy should be used (open, moderately restrictive, or highly restrictive)? Why?

-What security technologies should be put in place? Why?

-What areas should the security policy focus on (physical security, data security, auditing, passwords, etc.)? Why?

-What technologies should be used to secure those areas?

Each question just needs to be answered with 25-50 words.

Reference no: EM13946424

Questions Cloud

Unlawful behavior that causes public inconvenience : Match the Definitions on the left to the correct Terms on the right by entering the correct corresponding alphabetical letter next to the numbers in the first column. Not all terms will be used.
Create frequency table and histogram of numerical variables : Create a frequency table and histogram for each of the numerical variables in this data set. Indicate whether each of these distributions is approximately symmetric or skewed. Which, if any, of these distributions are skewed to the right? Which, i..
Produce a summary of project management actions : Produce a summary of project management actions that could have been taken which may have avoided the problems experienced on the project.
Describe the categories of antimicrobial agents : Write a 2- to 3- page paper that addresses the following: Describe the categories of antimicrobial agents. Describe differences between viral and bacterial infections
What type of security policy should be used and why : What technologies should be used to secure those areas?
What are the conditions for lasing : What does LASER stand for - what are the conditions for lasing and calculate the maximum allowed thickness of the active layer of single transversal mode operation
Relatively high vapor velocities : Consider the situation of Problem 10.67 at relatively high vapor velocities, with a fluid mass flow rate of m = 2.5 kg/s. Determine the heat transfer coefficient and condensation rate per unit length of tube for a mass fraction of vapor of X = 0.2.
Will the au behave as a donor or acceptor : . ED and EAlevels both exist for the Au and both are close to the middle of the Si bandgap. if a small concentration of Au is placed in an N-type material Si crystal, will the Au behave as a donor or acceptor? expain.
Develop some reports and queries for running the business : The database includes fields for record number, store identification number, sales region, item number, item description, unit price, units sold, and the weekly sales period when the sales were made.

Reviews

Write a Review

Computer Network Security Questions & Answers

  What rc4 key value will completely invert s

What RC4 key value will completely invert S after the initial permutation (so that S[0] = 255, S[1] = 254, ..., S[254] = 1, S[255] = 0)?  Show your work. (Explain how you got this.)

  Compute value of shared secret key

You have secretly picked value SA = 17. You begin session by sending Bob your computed value of TA. Bob responds by sending you value TB = 291. What is the value of your shared secret key?

  How to generate the same hash value

A 1,024-bit message is used to generate a 24-bit hash. On the average, how many other messages could be expected to generate the same hash value? What is the probability that two massages that generate the same 24-bit hash?

  Denial of service and distributed denial of service attacks

US cryptography export restrictions: past, present, and future and biometrics for authentication: security and privacy implications.

  Increment value in one cell in excel

Discuss how to increment value in one cell in Excel if another cell is populated. or example, I have cell A that has values such as 1, 2, 3, 4 etc...

  Cybersecurity elements to the water management

1. Applying the cybersecurity elements to the water management systems across the United States, which of the seven elements are most "impactful' as being central to enabling or supporting cyberattacks on this key aspect of our CI? Why

  Case study - personal computer security threats

Computer security is not an issue for organizations alone. Anyone whose personal computer is connected to a network or the Internet faces a potential risk of attack.

  Write a 2- to 3-page paper describing your companys

write a 2- to 3-page paper describing your companys intranet.include how the information is laid out and what security

  Efficient means of electronic payments

Think about security concerns and limited resources, do you think public sector entities should consider utilizing PayPal to facilitate inexpensive and efficient means of electronic payments?

  Question about virtue ethics

Based on virtue ethics, the right action to take in a particular situation is the action that a person with a strong moral character would take.

  Data encryption as a method of protecting data

Which one of the following statements is most correct about data encryption as a method of protecting data

  Where do the spams come from

Do you know what email clients the spammers use to generate their spams?

Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd