Preview

It 244 Ap C

Satisfactory Essays
Open Document
Open Document
466 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It 244 Ap C
Associate Level Material
Appendix C

Introduction

Student Name: Enter Your Name Here

University of Phoenix

IT/244 Intro to IT Security

Instructor’s Name: Enter Your Instructor 's Name Here

Date: Enter the date here

Introduction

Due in Week One: Give an overview of the company and the security goals to be achieved.

1 Company overview

As relates to your selected scenario, give a brief 100- to 200-word overview of the company.

Sunica Music and Movies suffers from a lack of a centralized framework for their stores. Each store works as an individual without the knowledge of the other four. This company is in need of a centralized intranet for employees and an internet portal for those customers wishing to shop from home or peruse their services and merchandise.

2 Security policy overview

Of the different types of security policies—program-level, program-framework, Issue-specific, and system-specific—briefly cover which type is appropriate to your selected business scenario and why.

Issue specific security policy would probably be the best for this company. As it is not large nor have very many departs, it is not necessary to set up a degree of sever policies to ensure security. It would be best to teach each group the basics of what they need to know and let them only deal with the systems in which they need to use. The centralized accounting and finical information will probably not be set up for normal employee use at the store locations.

3 Security policy goals

As applies to your selected scenario, explain how the confidentiality, integrity, and availability principles of information security will be addressed by the information security policy.

1 Confidentiality

Briefly explain how the policy will protect information.

Customers lists and their financial records will not be able to be accessed from the store



References: Cite all your references by adding the pertinent information to this section by following this example. American Psychological Association. (2001). Publication manual of the American Psychological Association (5th ed.). Washington, DC: Author.

You May Also Find These Documents Helpful

  • Powerful Essays

    It255 Final Study Guide

    • 843 Words
    • 4 Pages

    17. Which of the following is not a part of an ordinary IT security policy framework?…

    • 843 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    NT2580

    • 331 Words
    • 2 Pages

    Given a list of policy violations and security breaches, select three breaches, and consider the best options for controlling and monitoring each incident. Identify the methods to mitigate risk and minimize exposure to threats or vulnerabilities.…

    • 331 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    INF 325 Week 1: A Case Study

    • 2472 Words
    • 10 Pages

    Olzak, T. & Bunter, B. (2010, May 07). Security basics - components of security policies. Bright…

    • 2472 Words
    • 10 Pages
    Powerful Essays
  • Satisfactory Essays

    IS305

    • 300 Words
    • 2 Pages

    4. You can create different policies to scan different things to see what risks you have in different departments.…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Unit 4 P6

    • 757 Words
    • 4 Pages

    To make sure that information is managed appropriately, a number of policies and procedures have to be put in place, concerning security of information.…

    • 757 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Finance Questions

    • 600 Words
    • 2 Pages

    7. For each of the seven domains of a typical IT infrastructure, what process or procedures would you perform to obtain information about security controls and safeguards?…

    • 600 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    GUISP

    • 7523 Words
    • 39 Pages

    information in all forms. As more information is used and shared by students, faculty and…

    • 7523 Words
    • 39 Pages
    Powerful Essays
  • Satisfactory Essays

    The security controls that I would consider implementing are physical computer security policies such as physical access controls, computer security management and policies, and contingency disaster and recovery plans and tests. For…

    • 609 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Sample Security Plan X

    • 2479 Words
    • 10 Pages

    The following sample security plan was put together by a fictitious company named Adventure Works. Because of the increasing focus on security in the computing world, the company has decided to review security practices and put together a plan to improve those practices. Adventure Works’ needs may differ from your company’s needs, but reading through their plan should give you a good idea of the steps involved in creating a good security plan.…

    • 2479 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Cissp Study Guide

    • 67651 Words
    • 271 Pages

    Which one of the following is an important characteristic of an information security policy? A. Identifies major functional areas of information. B. Quantifies the effect of the loss of the information. C. Requires the identification of information owners. D. Lists applications that support the business function. Answer: A Explanation: Information security policies area high-level plans that describe the goals of the procedures. Policies are not guidelines or standards, nor are they procedures or controls. Policies describe "Pass Any Exam. Any Time." -…

    • 67651 Words
    • 271 Pages
    Powerful Essays
  • Powerful Essays

    Strategy Management of GSK

    • 3048 Words
    • 14 Pages

    In your chosen company, identify the mission; vision; strategic intent; objectives; goal; core competencies; strategic architecture; strategic control; strategic thinking: future direction of the competition; needs of customers; gaining and maintaining competitive advantage; Ansoff’s growth-vector matrix; portfolio analysis…

    • 3048 Words
    • 14 Pages
    Powerful Essays
  • Better Essays

    Computer networks have allowed activity that none dreamed possible hundreds of years ago; however, millions of attempts to compromise the security of computer systems are made on a daily basis. Knowing and using the 12 principles of information security allows security professionals to mitigate most threats to data security. By understanding the different types of security policies, effective policies can be put into place that ensure better information security. What security professionals must find paramount is that 100% secured is impossible to achieve.…

    • 841 Words
    • 4 Pages
    Better Essays
  • Satisfactory Essays

    While preparing the report, we acknowledgement the encouragement and full guidance given by our course instructor Hamidul Islam…

    • 2624 Words
    • 11 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Synopsis: The “Project Report” gives an account of the original research work undertaken by the Management Trainee during the duration of Summer Training/ Internship. It illustrates in an organized and logical manner, the “Research Methodology adopted, research findings, inferences and recommendations”, as well as their meaningful associations, thus fitting in the various disjointed pieces of information, in the form of a big picture.…

    • 524 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Adarsh Guar Gum Udyog

    • 12812 Words
    • 52 Pages

    PROJECT REPORT ON MANUFACTURING PROCESS AND APPLICATIONS OF GUAR GUM CARRIED ON AT ADARSH GUAR GUM UDYOG SUBMITTED IN PARTIAL FULFILLMENT OF BACHELOR OF BUSINESS MANAGEMENT TO INTERNATIONAL COLLEGE FOR GIRLS Supervised by: Submitted by: Dr. Poonam madan Archna agarwal Head of department B.B.M. Sem VI Management studies ICG/2008/8451 CO-SUPERVISED BY : Roll no. 81011…

    • 12812 Words
    • 52 Pages
    Powerful Essays