Preview

Information Systems and Security

Better Essays
Open Document
Open Document
3217 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Information Systems and Security
Portfolio Project
Michael Harker
ITS350-1 Information Systems and Security
Colorado State University Global Campus
Dr. Elliott Lynn
09/01/2013

Summary and Explanation of Proposals
In order for ZXY Inc. to make sure that their entire organization is secure, some proposals have been put into place to protect the company. The company needs to make sure that the network, their employee’s, company devices, and communications are secure from the outside world. The proposals that have been put into place cover such areas as: access control methods, authentication, user’s accounts and passwords, cryptography, remote access, network attack mitigation, malware and device vulnerabilities, and web and e-mail attack mitigation. These proposals when combined together help form an entire security policy for ZXY Inc. to use in order to protect all company assets. Access control methods are a process that determines what services or company resources an employee has access to. These methods will be used to determine what an employee can and cannot access, as well as ways to make sure that all employees are being granted the correct access levels. Authentication is a process of determining whether someone or something is who or what they say they are. Authentication can be a form of determining whether an employee is actually the person that they say they are. Employees can be authenticated by being able to answer personal questions that only they would know or by providing a username and password that only the employee knows. User accounts and passwords provide a level of authentication for employees and is what allows these employees to gain access to a company computer or the ability to log in to a company server or other resource. Each employee should be given a unique username that is different from every other employee, and each employee should create a complex password that is associated with their username. The employee should never give out their password to



References: Testout. (2013). Section 2.4.2. Asymmetric encryption facts. Retrieved from http://labsim.testout.com/Default.aspx?mincachedate=05-15-2013-15-00 Testout. (2013). Section 3.6.2. Remote access facts. Retrieved from http://labsim.testout.com/Default.aspx?mincachedate=08-07-2013-14-30 Testout. (2013). Section 5.2.2. Security zone facts. Retrieved from http://labsim.testout.com/Default.aspx?mincachedate=08-16-2013-15-30 Testout. (2013). Section 6.1.2. Malware Facts. Retrieved from http://labsim.testout.com/Default.aspx?mincachedate=08-20-2013-14-56 Testout. (2013). Section 7.3.2. E-mail security facts. Retrieved from http://labsim.testout.com/Default.aspx?mincachedate=08-20-2013-14-56

You May Also Find These Documents Helpful

  • Better Essays

    User accounts and passwords are implemented to maintain individual accountability for network resource usage. Any user who obtains an account and password for accessing a Corporation Tech provided resource, is required to keep these credentials confidential. Users of these systems may only use the accounts and passwords for which they have been assigned and authorized to use, and are prohibited from using the network to access these systems through any other means. This plan also prohibits the sharing of personal user accounts or passwords for accessing Corporation Tech or…

    • 4134 Words
    • 12 Pages
    Better Essays
  • Satisfactory Essays

    • Your summary should be written in a concise and clear manner that summarizes your policy for readers.…

    • 470 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Nt1330 Unit 1 Assignment

    • 711 Words
    • 3 Pages

    Is the process of determining if an authenticated user has access to the resources they requested. Is finding out if the person, once identified is permitted to manipulate specific resources. This is usually determined by finding out if that person is of a particular role that has access to the resources. Authorization is the function of specifying access rights to resources, which is related to information security and computer security in general and to access control in particular.…

    • 711 Words
    • 3 Pages
    Good Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    We have to train the employees on the protection of their user IDs and login information to the companies system. Show the employees how to create a better password and security questions and not to write there passwords down on sticky notes to help remember. Making them aware of friends, family, or people that ask questions out of the ordinary, because the questions could possibly your security questions or part of your password. The user only has three attempts and they are locked out and will have to see a admin to be unlocked.…

    • 506 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This course covers the managerial and technical considerations related to access controls, authentication, external attacks, and other risk areas facing the enterprise. This course will also survey the techniques to prevent unauthorized computer and facility access as well the concepts for protecting the hardware and software assets of the enterprise.…

    • 2331 Words
    • 10 Pages
    Satisfactory Essays
  • Good Essays

    It244 Access Control

    • 648 Words
    • 3 Pages

    Describe how and why authentication credentials are used to identify and control access to files, screens, and systems. Include a discussion of the principles of authentication such as passwords, multifactor authentication, biometrics, and single-sign-on.…

    • 648 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    You will learn how to match common risks or threats within the seven domains of a typical IT…

    • 1423 Words
    • 6 Pages
    Powerful Essays
  • Powerful Essays

    In other words best-practice security isn 't just good business sense; in some cases, it 's also the law. Legal requirements are vary between specific industries and different jurisdictions. For example, the Health Insurance Portability and Accountability…

    • 2543 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Information Systems

    • 1041 Words
    • 5 Pages

    Analyze the spreadsheet shown in Figure 5-15 and list all of the problems that occur when trying to track the assignment of sheet music using this spreadsheet.…

    • 1041 Words
    • 5 Pages
    Good Essays
  • Good Essays

    Consistent standards for network access and authentication are critical to the company’s information security and are often required by regulations or third-party agreements. Any user accessing the company’s computer systems has the ability to affect the security of all users of the network. An appropriate Network Access and Authentication Policy reduces the risk of a security incident by requiring consistent application of authentication and access standards across the network.…

    • 1461 Words
    • 6 Pages
    Good Essays
  • Powerful Essays

    Information Security

    • 874 Words
    • 4 Pages

    A threat agent is the facilitator of an attack however; a threat is a constant danger to an asset.…

    • 874 Words
    • 4 Pages
    Powerful Essays
  • Good Essays

    Information Security

    • 15937 Words
    • 64 Pages

    Hart (1998) noted that the “literature review as a piece of academic writing must be clear, have a logical structure and show that you have acquired a sufficient range of skills and capabilities at the appropriate level” (p…

    • 15937 Words
    • 64 Pages
    Good Essays
  • Good Essays

    Information Security

    • 1992 Words
    • 8 Pages

    * You can embed a mobile site into an app at a later stage of development…

    • 1992 Words
    • 8 Pages
    Good Essays
  • Good Essays

    Information Security

    • 11954 Words
    • 48 Pages

    References: Cho, A. (2008). University hackers test the right to expose security concerns. 322(5906):p.1322–1323. Science,…

    • 11954 Words
    • 48 Pages
    Good Essays