This website uses cookies to ensure you have the best experience. Learn more

Beth A Grillo It540 Management Of Information Security Assignment Unit 2

297 words - 2 pages

Unit 2 Assignment: Security Policy Implementation
Beth A. Grillo, MHA, CPC-A
July 19th, 2016
IT540-01: Management of Information Security
Dr. Kenneth Flick
Kaplan University

Table of Contents
Unit Two Assignment: Security Policy Implementation 3
Part 1: Step 29 3
Part 1: Step 36 3
Part 3: Step 33 4
Part 3: Significance of Strict Password Policy 5
Reference 6

Unit Two Assignment: Security Policy Implementation

Part 1: Step 29

Part 1: Step 36

Part 3: ...view middle of the document...

According to a Guest Contributor on TechRepublic (2006), the need for “an effective password policy is to prevent passwords from being guessed or cracked”. According to Coconut Daily (2013), “Weak passwords are extremely vulnerable to cracking techniques such as a brute force attack, in which a cracker uses an automated tool to try every single possible password or key until the correct one is found. Brute force techniques are extremely effective at cracking short passwords or passwords in a limited search space (such as those based off a dictionary word)”. For example, when working in a medical practice the information being protected is patient personal information. The password policy needs to be strict according to the HIPAA laws. The personal information within the patient’s medical record requires strict password protection. If the patient’s medical record is viewed by someone that is not authorized, it is considered a HIPAA violation.

Coconut Daily (May 17, 2013). The importance of a strong password policy. Retrieved from
TechRepublic (June 13, 2006). The importance of an effective password policy. Retrieved from

Other Papers Like Beth A Grillo - It540 Management Of Information Security - Assignment - Unit 2

Unit 2 Assignment Ls311

762 words - 4 pages up and eyes straight in front of you. References: Negligence, required elements. (n.d.) West's Encyclopedia of American Law, edition 2. (2008). Retrieved September 8 2015 from Unit

Cj490 - Unit #2 Assignment

732 words - 3 pages exploration, description, explanation, and application (Maxfield & Babbie, 2006/​2009). Let’s take some time to discuss each. First we have exploration. Exploration research is utilized when you are trying to gather more information about a specific problem. The information that you are gathering could be info that is not known, not known well, or simply more information needed to make a more informed decision about a particular problem. An

Unit 2 Assignment

835 words - 4 pages 1. Define one change you would like to make to your self-perception (how you think about yourself). It might be a behavior, a self-fulfilling prophecy, or anything about yourself you would like to alter related to how you think about the person you are. I would like to be a more positive and confident person. I do strive for that; however I feel improvements can be made in this area. I tend to look at life in terms of Murphy’s Law, which

Nt2580 Unit 1 Assignment 2

554 words - 3 pages Unit 1 Assignment 2 Impact of a Data Classification Standard Internal use only is information that may or may not be confidential. But is shared within a organization and kept away from the public. With that being said it is imperative that we seek the following to be incorporated within the standards in each domain. User Domain refers to the people who have access to the organizations equipment User domains is the worst domain for security

Bu1410 Unit 2 Assignment 1

2804 words - 12 pages BU1410 Management Information Systems Unit 2 Assignment 1 Instructor: Willie Cooper Jr. Chapter 2 1. What are the major functions of a business that are important for understanding the role of information systems? * Define a business and describe the business functions. * According to the book “A business is a formal organization whose aim is to produce products or provide services for a

It500 Unit 2 Assignment 1

1789 words - 8 pages Unit 2: Assignment 1: Global Challenges Associated with E-Commerce December 18, 2012 IT500-01N: Critical Concepts and Competencies for the IT Professional Instructor: Dr. Sheila Fournier-Bonilla Kaplan University Unit 2: Assignment 1: Global Challenges Associated with E-Commerce E-Commerce has changed the ways that companies do business, they are no longer confined to certain areas, regions, or even countries. "E-Commerce and m

Nt2580 Unit 4 Assignment 2

706 words - 3 pages Dallas Page July 17, 2015 Unit 4 Assignment 2 NT2580 Acceptable Use Policy Definition 1. Overview To protect the integrity, confidentiality and accessibility along with the safety of our clientele and employees it is necessary that a precise set of standards must be defined for anyone who utilizes the electronic devices to access information via the internet. Richman Investments is committed to protecting employees, partners and

Unit 2 Assignment 1: Homework

441 words - 2 pages Short Answers Page 71 1. What does a professional programmer usually do first to gain an understanding of a problem? They begin by creating a design of the program. 2. What is pseudocode? Programs used during the design process 3. Computer programs typically perform what three steps? Input process output 4. What does the term “user-friendly” mean? Programs that are easy to use Algorithm Workbench 1. Design an algorithm that

Nt1430 Unit 2 Assignment 1

577 words - 3 pages should have read permissions for the /etc/passwd file. To answer the following questions, use car or less to display /etc/passwd. Look at the fields of information in /etc/passwd for the users on the local system. a. Which character is used to separate fields in /etc/passwd? * You can use the colon : b. How many fields are used to describe each user? * There are 7 fields that are used to describe each other. c. How many users are on the local system? * There are 4 to 5. d. How many different login shells are in use on your system? (Hint: look at the last field.) * There are 2 login shells that are in use in my system.

Unit 2 Assignment 2: Computer Basics Review

614 words - 3 pages Tiffany Ostarly NT1210 Introduction to Networking Unit 2 Assignment 2: Computer Basics Review Chapter Review 1. A,C | 2. B | 3. C,D | 4. C,D | 5. D | 6. D | 7. B | 8. B | 9. A,C,D | 10. B,D | 11. D | 12. A,C | 13. C | 14. A | 15. A,D | 16. C,D | 17. D | 18. C | 19. A | 20. D | Key Terms Computer networking – the gerund form of the term computer network. Computer

Unit 2 Assignment 2: Microsoft Envirnment Analysis

542 words - 3 pages Microsoft Environment Analysis Abstract Windows of Vulnerability is defined as the ability to attack something that is at risk. Hackers search and pride themselves on finding vulnerabilities or creating their own within a system. A few examples of vulnerabilities that will be covered in this paper are CodeRed, Spida, Slammer, Lovesan, and Sasser. The worm named Code Red was observed on the internet on July 13, 2001. Computers running

Related Essays

Foundations In Information Technology Unit 2 Assignment

1464 words - 6 pages ergonomic work environment • Understand ethical choices of individuals in computing Course Outcomes practiced in this unit: IT190-2: Describe the basic components of a computer network Do not forget, whenever you look up information, you need to cite your sources! Please copy and paste the full URL of any website you use in researching your answers to the following questions. If you use your book, please place the page number from

Unit 2 Assignment 2

4236 words - 17 pages Unit 2 assignment 2 Legislation- Human rights act- an act of parliament of the UK- the royal assent for this act was received the 9th of November 1998 with a commencement in 2000. It is an act to give further effect to rights and freedoms guaranteed under the European convention on human rights. Rights: -Right to life -Freedom from torture and inhuman or degrading treatment -Right to liberty and security -Freedom from slavery and forced

Unit 1 Assignment 2

372 words - 2 pages something they previously did not). With the use of the levels of GPO’s described above, the lower level (user account) takes precedence over the higher level. If you want a specific manger or individual user to have privileges to something that the others in that GPO (Local, Site, or Domain) don’t, you have authorize that individual the privilege. It makes the management of privileges and security much easier to track, and not have to worry

Unit 2 Assignment 1

559 words - 3 pages Lab Assessment Questions & Answers 1. Relate how Windows Server 2012 Active Directory and the configuration of access controls achieve C-I-A for departmental LANs, departmental folders, and data. Windows Server 2012 Active Directory achieves C-I-A for departmental LANs, departmental folders and data through the two-way authentication and Global Policy Management for secure networking within domains. 2. Is it a good practice