This website uses cookies to ensure you have the best experience. Learn more

It Security Essay

2097 words - 9 pages

Information Security Policy

University of Phoenix
IT/244 Intro to IT Security
Instructor’s Name: Mark Cherry
Date: 03/11/2012
* Table of Contents
1. Executive Summary 1
2. Introduction 1
3. Disaster Recovery Plan 1
3.1. Key elements of the Disaster Recovery Plan 1
3.2. Disaster Recovery Test Plan 1
4. Physical Security Policy 1
4.1. Security of the facilities 1
4.1.1. Physical entry controls 1
4.1.2. Security offices, rooms and facilities 1
4.1.3. Isolated delivery and loading areas 2
4.2. Security of the information systems 2
4.2.1. Workplace protection 2
4.2.2. Unused ports and cabling 2
4.2.3. Network/server equipment 2
4.2.4. ...view middle of the document...

Because of the locations acting in an individual manner sales are being lost and unnecessary cost is being incurred from the inventory breakdown and the accounting errors for each store as of result of no reliable communication and tracking method being used
Security policy overview
I think Program-Level may be good for this company this method will cause the store to act in concert with one another instead of independently- simply because this method gives a Purpose which clearly states the purpose of the program, a Scope which specifies resources, Responsibility addresses the responsibilities of officials and offices throughout the organization

Security policy goals
Confidentiality
This method will give only those with authorization the ability to access certain information and make certain changes. This allows for tracking of who is accessing information and who is changing information.
Integrity
This method will only allow authorize users to access sensitive information preventing any unauthorized user from making any changes to the sensitive data. Authorize users will also from making improper modifications as indicated by the company’s security policy. The formal method is password protection and employee profile when enter into the system will allow the required access therefore only allowing transactions applicable to that user.
Availability
System back-up will be on an external system that will automatically back-up important files at a specified time every day. This system can be accessed in case of some type of intention attack or disaster by authorized personnel. Access control will be done by placing security level access on each user giving the user access and availability to the information applicable to that user. IT security staff will be accessible24 hours a day to provide quality service and support
Disaster Recovery Plan
Risk Assessment
Critical business processes
Mission1-Keep computers running Mission2-Meet service agreements
Internal, external, and environmental risks
Internal risk could come from employees via misuse of the computers or intentional damage to the security of the computer, internal could also be subject to loss of power. External risk could be nature itself any where from tornadoes to severe electrical storms causing fires lines down and structural damage to the company and its systems.
Disaster Recovery Strategy
A hot site would have the best value because the company can still run independently without any share site headaches and cold sites just too much to set up it’s like throwing a whole company together inside an empty shell alternate site would be my second choice if one need to be made but a hot spot will continue service agreements with minimum problems.
Disaster Recovery Test Plan
Walk-throughs
A walk through is important because you need the key business units to come together to see if anything was omitted or inaccurately included
Simulations
This step is also necessary...

Other Papers Like It Security

It Infrastructure Security Essay

1162 words - 5 pages Unit 4 Assignment 1: Create a VPN Connectivity Troubleshooting Checklist 1. Find out who is affected The first step in troubleshooting any VPN problem is to determine who is affected by it. That information can go a long way toward helping you figure out where to start looking for the problem. For example, if everyone in the company is having problems, you might look for a hardware failure on your VPN server, an incorrect firewall rule

Unit 4 Assignment 1: Enhance an Existing It Security Policy Framework

698 words - 3 pages Quintin Damare’ 1/23/15 Unit 4 Assignment 1: Enhance an Existing IT Security Policy Framework 1. Purpose The purpose of this policy is to define standards for connecting to Richman Investment's network from any host. These standards are designed to minimize the potential exposure to Richman Investment from damages which may result from unauthorized use of Richman’s Investment resources. Damages include the loss of sensitive or company

“the Soviet Union Developed Its Influence in Eastern Europe in the Years 1945-1949 Because It Wanted to Guarantee Its Security in the Future”. How Valid Is This Assessment?

1241 words - 5 pages The standard view in the West during the development of the Cold War was that the Soviet Union conducted an expansionist policy which was seen to threaten peace and collective security. The provocative and expansionist nature of Stalin’s foreign policy after 1945 was singled out as the prime cause of the Cold War and, as the Soviet Union sought to expand world communism, the West was forced into taking action to safeguard the free world. However

Technical Paper Project: Disseminating Organizational It Security and Troubleshooting Best Practices

577 words - 3 pages life or the universe.   They tend to derive morality, ethics, religious law or a preferred lifestyle from their ideas about cosmos and human nature.   Religion is sometimes used interchangeably with faith or belief system, but religion differs from private belief in that it has a public aspect.   Religion is also a specific, fundamental set of beliefs and practices generally agreed upon by a number of persons or sects: the Christian religion

Social Security

675 words - 3 pages In the past decades, Social Security Administration has had annual revenue that excesses the amount it pays to beneficiaries. However, U.S. economy situation has created a long-term effect in many of the public organizations and departments. Social Security Administration is one of many departments that will face some economy issues during U.S. economy recovery. Social security will post nearly $600 billion in deficits over the next decade

Security Breach

1832 words - 8 pages the protection of personal information of the customers and limits the use of it for vague purposes. Additionally, Sony Global Information Security Policy and related rules & standards are also implemented by the firm to ensure the security of data and information at the workplace (Sony Security Module Security Policy, 2009). Principles and security rules help the firm to increase trust of the customers over the firm. Awareness is also

Linux Security

448 words - 2 pages Data Security Standard (PCI DSS), Federal Information Security Management Act of 2002, Control Objectives for Information and Related Technology (COBIT). Many or part of these and more must be taken into consideration while putting this project in play. There are a couple of documents: ISO\IEC 17799 and ISO\IEC 27001. The ISO\IEC 17799 IT security technique is the policy for information security management, guidelines, principles for implementing

Social Security

1260 words - 6 pages unemployment compensation, through old-age pensions and through increased services for the protection of children and the prevention of ill health.” The intent of Social Security was to “lessen the force of possible future depressions. It will act as a protection to future Administrations against the necessity of going deeply into debt to furnish relief to the needy” (Roosevelt, 2010). Since 1935, all employees and employers have been contributing to the

Understand Security

1491 words - 6 pages measures to reduce the probability of an occurrence, however the remit of security management has evolved , to incorporate the safety of critical assets namely ‘employees’. In today’s climate where unemployment is at record highs and crime rates are at potentially the highest levels seen, we can no longer rely on, a drastically reduced local Police force or private guarding companies. Therefore it has become more cost effective for organisations

Information Security

988 words - 4 pages order to make the usage of this technology to be easier. Through the use of shortcuts they end up making information to be vulnerable to insecurity. According to Parsons et.al (2010), most human beings tend to reduce cognitive efforts when dealing with information technology. In a bid to ensure that usability and shortcuts do not affect the level of information security, it essential that there is an increased level of exposure to technology

Human Security

1956 words - 8 pages that directly effect the population rather than the government. The fundamental objective of ‘human security’ is the freedom from fear and want. This paradigm has a number of possibilities and limitations that make it a challenging new concept. STRATEGIES FOR SUPPORT 2. The ‘Human Security’ paradigm provides the possibility to develop complex strategies which will enable timely intervention by the international community in order to provide

Related Essays

“Economics Of It Security Management” Essay

2775 words - 12 pages “Economics of IT Security Management” 1) The article questions the loss estimate obtained from CSI/FBI security surveys since they exclude some categories of costs associated with security breaches. It suggests that cost estimate based on the loss in capital markets as a result of a breach in security may be a proxy to estimate true cost of security breaches. a. What do you think about the quality of this cost estimate? Can you think of

: It Security And Disaster Recovery Management

1012 words - 5 pages Trident University Alfonso Nunez Module 1 Case Assignment ITM527: IT Security and Disaster Recovery Management Dr. Kenneth Phillips August 26, 2013 Introduction The Malcolm Baldrige National Quality has evolved from a means of recognizing and promoting exemplary quality management practices to a comprehensive framework for world class performance, widely used as a model for improvement. As such, its

It Security Essay

650 words - 3 pages . The intent is to continue to upgrade the system via web browser to ensure the technology continues to remain competitive. The intent is to transition away from analog lines and adapt to newer technology. Required Deliverables 1. Asses the security threats, confidentiality threats, and integrity threats of switching to a VoIP system versus the existing phone system. Firewalls defining the security policies. 2. The VoIP Software

Disseminating Organizational It Security And Troubleshooting Best Practices

2912 words - 12 pages Disseminating Organizational IT Security and Troubleshooting Best Practices Patrick Peck CIS329: Administering Desktop Clients Professor Cynthia Orth Strayer University 17 March 2013 Disseminating Organizational IT Security and Troubleshooting Best Practices The organization being analyzed here is a video store that works within a semi-commercial area of a metropolitan city. The video store aims to enhance its overall IT