Preview

Week 1 Case Study

Powerful Essays
Open Document
Open Document
1259 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Week 1 Case Study
1. Look up “the paper that started the study of computer security.” Prepare a summary of the key points. What in this paper specifically addresses security in areas previously unexamined?
The RAND Report R-609-1 was commissioned by the Deputy Director in June 1967 according to www.linuxsecurity.com. The report was to study and recommend solutions that would unsure the protection of classified information while allowing multi-level access along with computer sharing capabilities. The report was broken down into four sections. First, the nature of the problem was identified. This identified security problems from the computer systems to lack of security and potential threats. The second part looked at policy considerations and gave recommendations. This section dealt with systems personnel to information structure and ended with system certification recommendations. The third section detailed technical recommendation while the last section detailed management and administrative controls.
With the increased and wide spread use of computers in the military, a need for procedures we due. These procedure recommendations revolved around technique and security which had not previously existed on such a broad scale. Even with the large scale of operations, there still needed to be some privacy around the system and data that was shared or accessed. Through this study, batch, multiprogramming, and time-shared processing were all recommended for different levels of access and control. Three types of threats to system security were identified. These are accidental access of data, deliberate access of data, and a physical attack on the system. There were recommended safeguards to protect from all three vulnerabilities. This protection had to be identified and secured by the system designer so not gaps were missed. These gaps could be in the software, hardware, communication of information and general lack of organization or the organization itself. There were recommended

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Week 2 Assignment

    • 853 Words
    • 4 Pages

    C:2‑3 Bruce and Bob organize Black LLC on May 10 of the current year. What is the entity’s default tax classification? Are any alternative classification(s) available? If so, (1) how do Bruce and Bob elect the alternative classification(s) and (2) what are the tax consequences of doing so?…

    • 853 Words
    • 4 Pages
    Satisfactory Essays
  • Powerful Essays

    Overview Current Situation Main Security Concerns: As a rapidly growing business that primarily utilizes IT resources for intranet company communications between and among a single home office and three satellite offices; internal network access controls and remote employee user’s access controls seem to be of primary importance. Priority number one should be hardening and the safeguarding of access and data integrity of the Oracle database servers housed as the main office in Reston, VA. And separately at the San Diego satellite office A comprehensive security policy will be developed and approved by management that will detail the specific guidelines administrators must follow when allowed admin access to company IT resources and services, and when and how those permissions should be denied or allowed. Additionally, auditing and logging of critical events should be implemented utilizing a reliable SEIM (Security Information and Event Management) system. Moreover, control of user access from remote sites via the company intranet via VPN’s and remote access via RADIUS should be strengthened and monitored for both qualitative and quantitate analysis and measuring. Cryptographic techniques will be enhanced and login and password requirements will be strengthened. Of significant importance is the company web presence and corporate access to its knowledge base portal within the company intranet. The company web presence is of vital importance to allow customers to access information concerning the company’s products and services. The knowledge portal is vital for company employees to have access to propriety information while protecting their confidentiality, integrity, and availability of the data. We will separate and hardened both the web server and the knowledge portal via…

    • 2606 Words
    • 11 Pages
    Powerful Essays
  • Satisfactory Essays

    Scenario 5: (RBAC) Role Based Access Control. With RBAC in place the security measures would be assigned to each user and monitored by the security administrator(s). Using this Access control method would allow for high-grade security with manageability in mind. Allowing each user a set of permissions dependent on their group, or role, allows the system admin to more easily monitor security by group; which is perfect for a military network.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week One Assignment

    • 1287 Words
    • 6 Pages

    c. Promotional costs to publicize a concert. d. Daily sales of merchandise sold, e. Amounts due from customers,…

    • 1287 Words
    • 6 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week1 Assignment

    • 353 Words
    • 2 Pages

    1. For each of the following, indicate which is a variable and which is a constant:…

    • 353 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    3. When entering the retail apparel market, what would you have to know about your customer?…

    • 435 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    (Management Information Systems, 12/e for DeVry University, 12th Edition. Pearson Learning Solutions p. 301). RE: Security and the Internet…

    • 1177 Words
    • 5 Pages
    Satisfactory Essays
  • Powerful Essays

    Riordan Security Issues

    • 1371 Words
    • 6 Pages

    Whitman, M. E., & Mattord, H. (2004). Principles of Information Security. [University of Phoenix Custom Edition e-Text]. , : Course Technology. Retrieved September 15, 2009, from University of Phoenix, CMGT440.…

    • 1371 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Week 1 Case Study

    • 299 Words
    • 2 Pages

    1. Define the decision problem. : The decision problem is that Hurricane Katrina has struck Louisiana now there is no location to have the conference.…

    • 299 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 3 Case Study

    • 413 Words
    • 2 Pages

    First of all the Dentist was not trained or licensed to work on anyone so there is a mistake right there. He acted in the four d’s of negligence by causing damages to the patient. He is the direct cause of the damages done to each patient. He was not licensed or trained to perform any operation on the patient which falls under the derelictions and the duty of the d’s.…

    • 413 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Cited: Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett Learning.…

    • 299 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Week 1 assignment1

    • 297 Words
    • 2 Pages

    What is meant by the term media convergence with regard to technology, and how has it affected everyday life?…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    week 1 assignment

    • 549 Words
    • 2 Pages

    University of Phoenix Material Effects of Mass Media Worksheet Write brief 250-to 300-word answers to each of the following:…

    • 549 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    week one assignment

    • 538 Words
    • 2 Pages

    The first “safe harbor” available to an individual taxpayer to avoid a penalty for underpayment of estimated tax would be if the payments of estimated tax are at least as large as 90 % of the tax shown on the return or 100% (110% if adjusted gross income for 2002 and later exceeds 150k) of the tax shown on the return of the preceding taxable year (assuming it showed a tax liability and covered a taxable year of 12 months.) The second “safe harbor” would be if the payments of estimated tax are at least as large as an amount equal to 90% of the tax for the taxable year computed by annualizing the taxable income received for the months in the taxable year ending before the month in which the installment is required to be paid.…

    • 538 Words
    • 2 Pages
    Good Essays