Project Part 2 Student SSCP® Domain Research Paper
The (ISC)2 SSCP® is frequently viewed as the first step in an information security career path, leading to the Certified Information Systems Security Professional (CISSP®) and other advanced certifications.
Continuing the Richman Investments scenario explained in Part 1 of the project, the offices have a total of
5,000 employees, and the office technology inventory includes desktops, mobile computers, and wireless devices. There is a mix of computers running Windows XP, Windows Vista, Windows 7, and Mac OS X. Most of the managers have BlackBerry devices for instant communication, and all employees are
...view middle of the document...
You are a networking security intern at Richman. You have been asked to submit a proposal to Richman senior management. In the proposal, you must choose to address one of the following and relate it to the appropriate SSCP® domains:
1. Based on the premise that Richman has 5,000 employees throughout the main office and several branch offices, you must research solutions and detail the appropriate access controls including policies, standards, and procedures that define who users are, what they can do, which resources they can access, and which operations they can perform on a system.
2. Based on the premise that most of the managers have BlackBerry devices for instant communications and all employees are provided cell phones, you must research and detail the cryptography methods to protect organizational information using techniques that ensure its integrity, confidentiality, authenticity, and nonrepudiation, and the recovery of encrypted information in its original form.
3. Based on the premise that there is a mix of computers running Windows 2000, Windows XP, Windows Vista, Windows 7, and Mac OS X, you must research and devise a plan to thwart malicious code and activity by implementing countermeasures and prevention techniques for dealing with viruses, worms, logic bombs, Trojan horses, and other related forms of intentionally created deviant code.
4. You must research and formulate a plan to implement monitoring and analysis based on the premise that all employees have Internet access to browse the Web, there is no policy on the use of removable media, and several of the branch offices have encountered issues with...