This website uses cookies to ensure you have the best experience. Learn more

Data Classification Standard Of Richman Investment

526 words - 3 pages

1. Abstract
This is a report that describes the “Internal Use only” data classification standard of Richman investment. This report addresses three Infrastructure domains that are affected by the standard and how they are affected.
2. Contents
Table of Contents
1. Abstract 1
2. Contents 1
Table of Contents 1
Table of Figures 1
3. IT Infrastructure Domains Affected by the “Internal Use Only” Data Classification Standard 2
User Domain 1
Workstation Domain 2
LAN Workstation 2

Table of Figures

3. IT Infrastructure Domains Affected by the “Internal Use Only” Data Classification Standard

1. User Domain: This Domain is where only one user will have access to it. This can be configured to internal use only. By default, the IT department tries to maintain a ...view middle of the document...

Workstation Domain: The Workstation domain is the second layer of the infrastructure that “Internal use only” standard affects. The Workstation Domain is where users first access the systems, applications, and data. This layer requires a login and password authentication before access is allowed to view information because unauthorized access can Infect the workstation with viruses. At Richman Investments, we provide very secure access for the employee workstations with a username and password. A security protocol requires the password to be changed every 30 days. All computers maintain regular updates and continuous antivirus protection for monitoring. Additionally, no personal devices are allowed on the network.

3. LAN Domain: The Local Area Network (LAN) Domain is a group of computers all connected to a single LAN domain. The LAN Domain is a collection of computers connected to one another or to a common medium. All LAN domains include data closets, physical elements of the LAN, as well as logical elements as designated by authorized personnel. It requires strong security and access controls. This domain can access company-wide systems, applications, and data from anywhere within the LAN. The LAN support group is in charge maintaining and securing this domain. The biggest threat to the LAN domain is Un-authorized access to anything (the LAN, the systems, & the data) on the network. One thing we can do is requiring strict security protocols for this domain, such as disabling all external access ports for the workstation. In addition, based on the needs, users will be granted access to their individual department’s LAN and or other applications only if their required job calls for that type of access.
These are the three IT infrastructure domains and their details of how they are affected by the “Internal Use Only” data classification standard of Richman Investment.

Other Papers Like Data Classification Standard of Richman Investment

Unit 4 Assignment 1: Enhance an Existing It Security Policy Framework

698 words - 3 pages confidential data, intellectual property, damage to public image, damage to critical Richman Investment internal systems, etc. 2. Scope This policy applies to all Richman Investment employees, contractors, vendors and agents with a Richman Investment-owned or personally-owned computer or workstation used to connect to the Richman Investment network. This policy applies to remote access connections used to do work on behalf of Richman Investment

Window Of Vulnerability Essay

290 words - 2 pages Richman Investments Richman Investment To: Senior Manager  From: Intern Jermel Corbett My Senior manager asked me to pre-pair a brief report concerning the Internal Use only Data and classification standards of Richman Investments IT infrastructure domain. The information obtained   in the report consists of a study done on all seven layers of the IT infrastructure. At the conclusion of this study I will establish that three of the

Itt It255 Unit 4 Aup

1345 words - 6 pages information or exposure to security threats. 2. Users must report any incidents of possible misuse or violation of this Acceptable Use Policy through the use of documented Misuse Reporting processes associated with the Internet, Intranet, and Email use standards. 3. Users must not attempt to access any data, documents, email correspondence, and programs contained on Richman Investments systems for which they do not have authorization

Nt2580 Unit 4

746 words - 3 pages Unit 4 assignment 1 1.0 Purpose The purpose of this policy is to define standards for connecting to Richman investments's network from any host. These standards are designed to minimize the potential exposure to Richman investments from damages which may result from unauthorized use of Richman investments resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to

Acceptable Use Policy

763 words - 4 pages . Acceptable Use Management Requirements A Standard Operating Procedure (SOP) will be established to support the development and maintenance of this AUP. Richman Investments’ management team is responsible for keeping the AUP up to current standards and ensuring that new and current employees are kept abreast of major changes and that signatures are obtained from each employee following these changes. At a minimum, skills that should be included

Acceptable Use Policy

852 words - 4 pages that is composed, transmitted and/or received by Richman Investment computer systems is considered to belong to Richman Investment and is recognized as part of its official data. It is therefore subject to disclosure for legal reasons or to other appropriate third parties. * The equipment, services and technology used to access the Internet are the property of Richman Investment and the company reserves the right to monitor Internet traffic

None

5555 words - 23 pages preventative actions. Unit 1 Assignment 2: Impact of a Data Classification Standard Learning Objectives and Outcomes * You will learn how to determine the impact of a data classification standard on an organization's IT infrastructure. Assignment Requirements You are a networking intern at Richman Investments, a mid-level financial investment and consulting firm. Your supervisor has asked you to draft a brief report that describes the

Internet And Email Aups

1927 words - 8 pages company computers as participants in any peer-to-peer network, unless approved by management. 5. Individuals may not view, copy, alter, or destroy data, software, documentation, or data communications belonging to Richman Investments or another individual without authorized permission. 6. In the interest of maintaining network performance, users should not send unreasonably large electronic mail attachments or video files not needed for business

Richman Investments

963 words - 4 pages you the end user working here at Richman Investments. This is a vital brief to safeguard and keep all of our client’s information safeguarded from all outside sources. So, let’s begin. First, let me explain to you what “Internal Use Only” data clarification standard means. A standard is a detailed written definition we here at Richman Investments have come up with. It is to help put in place certain security controls that are used throughout

Dns Server

1474 words - 6 pages applications that computers use to connect to the Internet. There is a raging information security war. The goal is to protect national security and business information. Therefore, IT is in great need of proper security controls. Scenario Richman Investments is a mid-level financial investment and consulting firm. The Richman corporate headquarters is located in Phoenix, Arizona. Currently, there are eight branch offices in: * Atlanta, Georgia

Iss Project

1154 words - 5 pages also destroyed in the natural disaster. And finally, Richman Investments has J & J Cabling Company on standby just in case new CAT Cable will have to be run. Richman’s IT Department has an offsite back up with a company called, “Barracuda Networks.” This will let Richman Investments IT Department have a way to have all data backed up offsite so no data can be destroyed. Information about the work of Richman, the governing body and

Related Essays

Richman Investments "Internal Use Only" Data Classification Standard

482 words - 2 pages The "Internal Use Only" data classification standard at Richman Investments will include the most basic IT infrastructure domains to include the User Domain, Workstation Domain, and the LAN Domain. This will encompass all users and their workstations, as well their access to the internet and company server databases and any information in between. The User Domain will enforce an acceptable use policy (AUP) to define what each user can and

Impact Of Data Classification Standard Essay

596 words - 3 pages report will identify the definition of “Internal Use Only” data classification standard of Richman Investments. Internal Use Only includes information that requires protection from unauthorized use, disclosure, modification, and or destruction pertaining to a particular organization. This report will tackle 3 IT infrastructure including workstation domain, LAN-Wan Domain, and Remote Access Domain. Internal Use Only data includes data related to

Impact Of A Data Classification Standard

454 words - 2 pages Following are three important “Internal Use Only” data classification standards of Richman Investments: 1. User Domain – This layer is by far the most vulnerable portion of any IT infrastructure. Without restrictions and education a user would have free rein to expose a network to a myriad of security risks. Richman Investments is not immune to this blight. For this reason, special attention is given to precautions for and education of users

A Classification Of No Sql Databases As Big Data Management Systems

2551 words - 11 pages Availability and Partition tolerance are chosen primarily in those systems. KAI (Key-value),Voldemort (Key-value), Tokyo Cabinet (Key­value), SimpleDB (Document-oriented) are some examples of those systems. 2.2. CLASSIFICATION OF NOSQL DATABASE NoSQL databases are classified in four types [8]: 1- Key-Value Store 2- Document Store 3- Column-family (or Wide-Column) Store 4- Graph Database 2.2.1. Key-Value Store All data is stored as set of