This website uses cookies to ensure you have the best experience. Learn more

It 244 Final Essay

2350 words - 10 pages

Associate Level Material
Appendix B

Information Security Policy

Student Name: Ronald Stride

University of Phoenix

IT/244 Intro to IT Security

Instructor’s Name: Scott Smith

Date: January 27, 2013

Table of Contents

1. Executive Summary 1

2. Introduction 1

3. Disaster Recovery Plan 1

3.1. Key elements of the Disaster Recovery Plan 1

3.2. Disaster Recovery Test Plan 1

4. Physical Security Policy 1

4.1. Security of the facilities 1

4.1.1. Physical entry controls 1

4.1.2. Security offices, rooms and facilities 1

4.1.3. Isolated delivery and loading areas 2

4.2. Security of the information systems 2

...view middle of the document...

Here at Sunica we are ready to keep up with technology and build a better business model through that practice. However without a complete security outline and the enforcement of it we will not achieve this goal. It is highly recommended that this policy be carefully read and followed by all parties involved in this company. A signed copy will be required to be kept on file for all employees and customers will be made fully aware that their security is our top priority.


1 Company overview

Sunica Music and Movies is a small business that is making a move to keep up with technology. The goals of this company are to synchronize the many locations to work together as one and develop a web presence. To accomplish these goals they are going to link the stores with private business data on one side and a user interface for the public on the other. Inventory and accounting will be a large factor in their success but security will be a very important aspect as well. Since transactions are conducted online they will require security from the inside and outside of the system.

2 Security policy overview

As a small company a System-Specific policy will be appropriate. By clearly outlining data handling procedures for the system key factors like protection, detection and response can be maximized and provide an overall better level of security.

3 Security policy goals

1 Confidentiality

This company handles private and financial data so prohibiting misuse of this information is vital. There will be layers of access consisting of manager, asst. manager and cashier level employees.

2 Integrity

Credentials for each employee will be provided by management. Customers will create personal credentials to conduct transactions. Firewalls will keep things contained and immediate encryption will apply to personal financial information.

3 Availability

Back-ups will be required daily and equipment protected to the extent of our ability against disasters natural or otherwise. Equipment will be cleaned, maintained, and up-graded at appropriate intervals to help avoid failure.

Disaster Recovery Plan

1 Risk Assessment

1 Critical business processes

The mission critical business systems for Sunica Music and Movies include the web, accounting and transaction servers in the data center and the in-store devices that connect to them. Employees and customers rely on these systems to operate properly.

2 Internal, external, and environmental risks

Possible threats at Sunica are fire, earthquakes and human related. Fires happen for countless reasons and if either the store locations or the data center were to have one the damage could range from monetary (small and large) to loss of the life of a customer or employee. Earthquakes are also unpredictable and have the...

Other Papers Like It 244 Final

Cottage to Control Panel Essay

1023 words - 5 pages Specs of the paper : The Final Project Paper should demonstrate an understanding of the reading assignments as well as the implications of new knowledge. The eight-page paper should integrate readings and class discussions into work and life experience. It may include explanation and examples from previous experience as well as implications for future application. The purpose of the Final Project is for you to culminate the learning

Physio Report

967 words - 4 pages Physiology 244 Animal practical 1 08/08/2014 Exercise 1 Question 1 The amplitude of the muscle contraction increased as the voltage increased until a threshold was met. Question 2 The smallest voltage that resulted in a contraction would be that of 0.0500V. Only a portion of the muscle fibers contracted at the above mentioned voltage while the other fibers were relaxed. Given the small force produced at this low voltage (0.0370 N) in

Popular Press Nutrition Claim Heart Disease Caused by Saturated Fats Disputed

953 words - 4 pages ). Since this theory came about from this experiment it has just been believed to be true despite the fact that it wasn’t even based off of an experiment involving humans. Such negative results can be understood to be caused by the fact that as herbivores their saturated fat intake is relatively low as they don’t consume other animal protein which contains a fair amount of saturated fat whereas most human as omnivores do. Rather than realize that

Strayer Sci110 Assignment 1

930 words - 4 pages calculation method in which a series of enthalpy changes is used to derive the final value. The lattice formation energy is deduced from the values of enthalpy of formation of each intermediate step (Kotz, Treichel and Townsend, 2012, p. 600). 2. Historically, one of the most important techniques has been the use of parallax to measure distance. Parallax is the apparent angular displacement of a distant object when it is observed from different

39th Game

1340 words - 6 pages weekend ➢ Cities would bid for the right to become a host, not for individual matches ➢ Points earned from the games would count towards the final Premier League table The Premier League The Premier League is an English professional league for men's association football clubs. At the top of the English football league system, it is the country's primary football competition. Contested by 20 clubs, it operates on a system of promotion and

Diet & Nutrition

3967 words - 16 pages BMI Refer to the table for a rating of your BMI. Record the results below and on the final page of this lab. Classification | BMI (kg/m2) | Underweight | <18.5 | Normal | 18.5--24.9 | Overweight | 25.0--29.9 | Obesity (I) | 30.0--34.9 | Obesity (II) | 35.0--39.9 | Extreme obesity (III) | >40.0 | (See complete version of table on p. 184 for additional information.) BMI kg/m2 Classification (from table) Bottom of Form

Homework 1

4582 words - 19 pages &ACQUISITIONS&–&FINAL&PROJECT& ! 8& LEVERAGED(BUYOUT(ANALYSIS([(CONTINUED( ( Exit(Price(Calculations( ( ( ( ( IRR(Calculations( IRR( EBITDA!Multiple! Implied!EV! less!Debt!O/S!(assumes!no!Cash)! Implied!Equity!Value! ! ! ! ( ! ! ! ! ( ! ! ! ! ! FY13E( ! ! ! ! ! ! @6,740! 18%! 202! ! FY14E( ! ! ! ! ! ! 265! ! FY15E( ! ! ! ! ! ! 195! ! FY16E( ! ! ! ! ! ! 244! ! FY17E( ! ! 13.0x! 16,507! @2,683! 13,824! 13,824

Romeo And Juliet A True Aristotelean Tragedy

1161 words - 5 pages presents his tragic elements. But as Lois Kerschen says, “Shakespeare may have altered the classic form of the Greek tragedy, but that does not mean he totally ignored the Greek formula”(261). It is his strong emphasis on certain elements that prove his case. Shakespeare’s contribution of harmatia, catharsis, and anagnorisis to Romeo and Juliet prove the story to be a true Aristotelean tragedy. The final tragic moment in the story serves as an

Anything Relevant

4105 words - 17 pages  only for a one-month period starting from the date their grades for the | |particular subject have been released.  With permission to review the grade, the reviewed grade can either remain unchanged, or be higher or | |lower than the original grade, subject to evaluation of reviewers, and is considered final once it is reviewed. | |Students requesting a change of grade must fill out and submit a petition

You Decide Aero

1229 words - 5 pages American markets successfully. This proposal will discuss and evaluation process, the four suggestions by experts marketers, and give my final analysis of the best action for Aero expanding into North America Partnering-Pros & Cons Strategy Upon familiarizing myself on Buzz marketing, I have found its value and purpose to be very motivation and refreshing in the exchange of information sharing with new customers. We carefully thought of what

Map Hindustan

5865 words - 24 pages the use of physical characteristics such as retinal images to provide identification. Answer: TRUE Diff: 1 Page Ref: 242 AACSB: Reflective Thinking CASE: Comprehension 15) Packet filtering catches most types of network attacks. Answer: FALSE Diff: 2 Page Ref: 244 AACSB: Use of IT CASE: Comprehension 16) NAT conceals the IP addresses of the organization's internal host computers to deter sniffer programs. Answer: TRUE

Related Essays

Epekto Ng Social Networking Sa Ating Ekonomiya: Isang Pag Aaral

485 words - 2 pages | | | | |Large |244 | | |Guillermo |One or two shots of hot espresso, poured over|Medium |179 | | | |slices of lime it can also be served on ice, | | | | | |sometimes

Discover Card Financial Services Essay

4828 words - 20 pages this study and final report. Upon releasing this report, I, Shantel Seppala, would like to personally ensure that this report was prepared with the utmost accuracy and as efficiently and cost effectively as possible. It has been of the highest pleasure to prepare this report for Discover Financial Services. Far Horizons Research has taken a great interest in this topic and would be more than willing to conduct additional research to either

Applying Correlation Essay

1282 words - 6 pages 153 3362 7 3429 44 2671 7 a) For the above data construct a scatter plot using SPSS or Excel (Follow instructions on page 244 of your textbook). What does the scatter plot show? Can you determine a type of relationship? Are there any outliers that you can see? Answer: b) Using the same data conduct a correlation analysis using SPSS or Excel. What is the correlation coefficient? Is it a strong, moderate or weak

Eifjoiefj Essay

2667 words - 11 pages Survey of Chemistry Laboratory 100LFall 2014Wednesday SectionsInstructor: Aaron WatsonEmail: aaronwatson@fullerton.eduOffice: TBDOffice Hours: TBDUNIVERSITY ACADEMIC DISHONESTY POLICYAcademic DishonestyAcademic dishonesty includes such things as cheating, inventing false information or citations, plagiarism, and helping someone else commit an act of academic dishonesty. It usually involves an attempt by a student to show possession of a level of