Preview

Introduction to the Information Security Policy

Satisfactory Essays
Open Document
Open Document
608 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Introduction to the Information Security Policy
Introduction

Student Name: Rodrick J. Maynard

Axia College

IT/244 Intro to IT Security

Instructor’s Name: Ridwan Bari

Date: May 1, 2011

Introduction

WAN that is short for Wide Area Network this type of connectivity is a critical and key part for businesses especially ones that use voice and video over IP and the centralization of applications. It allows companies to use real-time traffic based applications to e-mail messages and inter-office voice communications, the move towards data-center consolidation has brought WAN connectivity to the center stage.

1 Company overview

Sunica Music and Movies is a local multimedia chain company that has four locations that have been having difficulties coordinating customer sales from one store to another based on inventory each one of these store have been running independently that has lead to numerous problems like poor communication, decentralized accounting, no Internet-based commerce and jumbled inventory furthermore leading to lost revenue and its customer base. The implementation of a WAN connect within this company will help keep track of inventory, help reorder stock based on sales and each location will channel all their financial transactions through a central accounting package, eliminating bookkeeping errors, and centralizing the company finances.

2 Security policy overview

The best security policies would be program-framework and system-specific policies the reason for implementing a program-framework policy is to make sure that a system fits in the overall structure of the business and see if the implemented security program provide the company with an organization-wide direction. The system-specific policy will provide everyone with the purpose, scope, responsibilities, and compliance needed to achieve a secure system.

3 Security policy goals

1 Confidentiality

The policy will help protect the company’s financial

You May Also Find These Documents Helpful

  • Better Essays

    INDP Kudler Fine Food

    • 1189 Words
    • 4 Pages

    1. All three stores networks are built around a 100 base T environment. Install a Wide area networks (WANs), which might take the form of a company’s head office linked to the other two facilities and additional new stores spanning several states,…

    • 1189 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Acme Manufacturing is seeking to implement a Wide Area Network (WAN). By implementing a WAN, the company can interconnect all offices and staff to increase the productivity and minimize the costs. To help with reducing costs, the company also wants to implement a telecommunications system. This will help reduce costs of travel by giving the technology to perform teleconferencing, data sharing, and real time communication between all office locations.…

    • 1121 Words
    • 5 Pages
    Powerful Essays
  • Good Essays

    7.1.1 A WAN is a wide area network that is often used by large businesses or corporations. It is impractical for an organization to own an entirety of a WAN because a WAN is decentralized…

    • 725 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Week 4 INDP NTC 362

    • 821 Words
    • 3 Pages

    A wide area network (WAN) refers to the connection between two or more geographically separated LANS, such as the three locations of Kudler’s Fine Foods in different cities. As Kudler Fine Foods continues to grow the need for connectivity has increased. An enterprise network is required since these are networks that join the computing resources of an organization over LANs, WLANs, and WANs. All of these networks share basic building blocks in order to create the functional networks seen today.…

    • 821 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    Itt 255 IT255 Instructor Lab Manual LABORATORY Instructor Lab Manual IT255 Fundamentals of Information Systems Security Copyright © 2012 Jones & Bartlett Learning, LLC www.jblearning.com All Rights Reserved. Current Version Date: 12/06/2010 -1- IT255 Instructor Lab Manual LABORATORY ISS Curriculum Overview............................................................................................................................. 5 Ethics and Code of Conduct.......................................................................................................................... 6 ISS Mock IT Infrastructure ...........................................................................................................................…

    • 33056 Words
    • 133 Pages
    Satisfactory Essays
  • Good Essays

    Cs150 Unit 3 Assignment

    • 498 Words
    • 2 Pages

    In a Denial-of-Service (DoS) attack, a malicious client (the attacker) performs operations designed to partially or completely prevent legitimate clients from gaining service from a server (the victim). (Brustoloni, N.D.) To defend your system from DoS attacks it typically involves the use of a combination of attack detection software, aiming to block traffic that is identified as illegitimate and allow all traffic that is identified as legitimate. Some traffic classification and response tools are Firewalls, Switches, Routers, Application front end hardware, IPS based prevention, DDS based…

    • 498 Words
    • 2 Pages
    Good Essays
  • Good Essays

    For the recommendations on the tiered architecture I suggest three-tier architecture. This architecture is the most common. It consists of three tiers; a presentation tier, a logic tier, and a data tier…

    • 429 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Apply email server and attachment antivirus/malware and email quadrating for unknown file types. Disable for ping, probing, and port scanning on all exterior IP devices. Denying of outbound traffic using source IP addresses. Apply file transfer monitoring, scanning and alarming for unknown file types. Web Surfing should be monitored by filtering out any unknown IP address with trusted cites. Apply domain-name content filtering at the internet entry/access point as well.…

    • 313 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    2. General access to the Internet for recreational use by immediate household members through the Richman Investment Network on personal computers is permitted for employees that have flat-rate services. The Richman Investment employee is responsible to ensure the family member does not violate any Richman Investment policies, does not perform illegal activities, and does not use the access for outside business interests. The Richman Investment employee bears responsibility for the consequences should the access is…

    • 300 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    LAN – WAN is where the IT infrastructure links to a wide area network and internet.…

    • 360 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    It 244 Appendix B

    • 3468 Words
    • 14 Pages

    Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario.…

    • 3468 Words
    • 14 Pages
    Powerful Essays
  • Good Essays

    unit 2 labs

    • 465 Words
    • 2 Pages

    LAN: local area network. Small group, usually home or workplace. MAN: Metropolitan area network. City. PAN: Personal area network. WAN: Wide area network. State or country.…

    • 465 Words
    • 2 Pages
    Good Essays
  • Better Essays

    In order for ZXY Inc. to make sure that their entire organization is secure, some proposals have been put into place to protect the company. The company needs to make sure that the network, their employee’s, company devices, and communications are secure from the outside world. The proposals that have been put into place cover such areas as: access control methods, authentication, user’s accounts and passwords, cryptography, remote access, network attack mitigation, malware and device vulnerabilities, and web and e-mail attack mitigation. These proposals when combined together help form an entire security policy for ZXY Inc. to use in order to protect all company assets.…

    • 3217 Words
    • 13 Pages
    Better Essays
  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    A security policy defines limitations on individual behavior or system performance and details activities that are permitted, controlled or prohibited within the company. In order for policies to be effectual, senior management must endorse them, they must be communicated to all employees, undergo recurring reviews, and be assessed for usefulness. A security program encompasses all of the required pieces necessary to successfully protect a business. It should include policies, requirements, standards and procedures. Security plans should be operative at all levels of a corporation to be effective. Management should communicate a formal explanation of what is acceptable by all employees. Management should also clearly dictate what the consequences of noncompliance are. Organizations can use the ISO-27002:2005 as an outline to create a security policy.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    It/242 Week 9 FInal

    • 1090 Words
    • 5 Pages

    In this scenario I will be providing information associated with the creation of a WAN for ACME Manufacturing. This business has several locations spread out all over America and requires a WAN to connect their locations in America with their newly build plant in China. With the headquarters and engineering offices in Atlanta, which are right across the street from each other, the plan would make sense to connect all communication here. There are also distribution offices in New York, Chicago, and Phoenix which will have to be connected to this network to attend the weekly company meetings and have access to information stored at headquarters.…

    • 1090 Words
    • 5 Pages
    Good Essays