Reference no: EM131937469
Assignment: Securing a Personal Computer
You should be pretty familiar with some of the ways we can prepare a computer against attack. Consider the things you've learned about the ways attackers might attempt to compromise a computer.
Requirements:
Create a brief policy document for an organization such as a hospital. This policy document should:
Use a policy and procedure templet
• Select and categorize the ways an attack on a workstation can occur
• specify at least three required steps that a worker should take to secure a personal computer.
• provide at least three other suggestions for worker behaviors that will ensure computer security.
• be-2 pages in length, double-spaced,
• be free of spelling, grammar, and punctuation errors.
We will be discussing attacks, threats, and vulnerabilities. If you work at a job that involves the use of computers, what has your experience been? Have you received "phishing" emails? Have you or a coworker clicked on a link in such an email, exposing your organization to a virus? Has a fellow employee ever lost an ID badge, flash drives, or even a laptop? Have you ever witnessed someone leaving their password on a sticky note on their desk, or verbally sharing it with another employee? Does your organization have a disaster recovery plan? Does your organization utilize sniffer software to detect intrusion? These are just a few examples of ways organizations can be vulnerable, or can protect themselves.
Now is a good time to find a good POLICY AND PROCEDURE TEMPLATE to use throughout the class - and use the same P&P Template throughout the whole class.
Requirements
Policy identifies the selection and categorization of ways an attack on a workstation can occur
Written policy specifies at least three required steps that a worker should take to secure a personal computer.
Provides at least three other suggestions for worker behaviors that will ensure computer security.
Free of spelling, grammar, and punctuation errors.
Attachment:- Template.rar
|
Difference in monthly payments of either mortgages
: What will be the difference in monthly payments of either mortgages?
|
|
What is the value of the rights
: If you can acquire the rights to the project for the next 10 years, what is the value of the rights?
|
|
What was total dollar capital gain and total dollar return
: Assume you purchased 400 shares of stock for $20 a share, sold the stock for $8,392 and received a total of $550 in dividends.
|
|
Capital structure weights on book value basis
: What are the company's capital structure weights on a book value basis?
|
|
Why does your organization have a disaster recovery plan
: Why does your organization have a disaster recovery plan? Does your organization utilize sniffer software to detect intrusion?
|
|
What is the sharpe ratio of the tangency portfolio
: What is the Sharpe ratio of the tangency portfolio formed by creating the optimal risky portfolio from this stock and bond portfolio?
|
|
What forward rate does the investor lock in
: At time 0, Investor A enters into a forward contract, at no cost, to buy, at time 2, $100,000 par of a zero maturing at time 3.
|
|
How large will your initial withdrawal be
: Assume that you saved $750,000 and invested in an account that pays 5.00%. You expect inflation to average 2%, and you want to make end-of-year withdrawals.
|
|
Examine the guidelines from the ahima practice brief
: Examine the guidelines from the AHIMA practice brief, found on the AHIMA Body of Knowledge, Ensuring Data Integrity through a Clean Master Patient Index.
|