Preview

Bananas

Good Essays
Open Document
Open Document
344 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Bananas
Instructions:
Based on the following information, assess where and when cryptography is needed within a typical IT infrastructure to be in compliance with policies and laws.

Data and information are important assets of Richman Investments. These assets must be protected from loss of integrity, confidentiality, or availability and must be in compliance with Richman's policies and state and federal laws.

Data classification: Confidential. This refers to highly sensitive data, such as client records; employee ID numbers; and personnel records, intended for limited and specific use by a workgroup, department, or group of individuals with a legitimate need-to-know. This data classification has a high level of sensitivity.

Richman's security policy statements for confidential data are as follows: ▪ When the data is stored on mobile devices and media, protections and encryption mechanisms must be employed. ▪ The data must be stored in a locked drawer, room, or an area where access is controlled by a guard, cipher lock, or a card reader. The area must have sufficient physical access control measures to afford adequate protection and prevent unauthorized access by visitors or other persons without a need-to-know. ▪ The data must be strongly encrypted when transferred electronically to any entity outside of Richman Investments.

1. Cryptography is needed for mobile devices and media, as well as protections and encryption on any company systems and hardware. 2. The data stored in locked drawers, rooms, or areas where access is controlled by a guard, cipher lock, or a card reader is a key area where cryptography is needed as access to these areas must be restricted to any unauthorized personnel. Any secured or guarded restricted area is required to have physical access control measures to allot for protection and to prevent any unauthorized access by anyone not holding the proper credentials to be in the secured area. 3. All data

You May Also Find These Documents Helpful

  • Satisfactory Essays

    within the facility, and training goals on the recognition and prevention of social engineering attacks. Authorization policies will also include access controls for data by specifying which data should be encrypted, they would…

    • 439 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    The following outline presents the fundamental solutions for the safety of data and information that belongs to Richman Investments. As part of the general security plan of the organization the IT department puts together a proposal to provide multi-layered security strategies that can be applied at every level of the IT structure. The plan will lay out the importance of improving and safeguarding the levels of each domain and the process of protecting the information of the organization.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    The purpose of this policy is to define standards for connecting to Richman Investments network from any host. These standards have been designed to minimize the potential exposure to Richman Investments from damages which may result from unauthorized use of Richman Investments resources. Damages include intellectual property, the loss of sensitive or company confidential data, damage to critical Richman Investments internal systems, damage to public image, etc.…

    • 438 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Data Classification Standards help Richman Investments to consistently define how this organization should handle and secure our various types of data. This report will focus on the internal use only data and how each of these domains are affected by these standards. Internal use only data refers to information that may or may not be confidential. It is imperative that our organization keep this information in house and away from the public and realize the Domains that need to be addresses with these rigid standards. The three standards that are at the top of the list for our company that will be directly affected are the User, Work Station, and LAN Domains.…

    • 789 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Data classification and security requirements – what measures will be implemented to protect the three states of data…

    • 449 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Unit 4 Assignment 2

    • 717 Words
    • 3 Pages

    The purpose of this policy is to define standards for connecting to Richman investment’s network from any host. These standards are designed to minimize the potential exposure to Richman investments from damages which may result from unauthorized use of Richman investments resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical Richman investments internal systems, etc.…

    • 717 Words
    • 3 Pages
    Powerful Essays
  • Good Essays

    Unit 3 assignment 1

    • 479 Words
    • 2 Pages

    The purpose of this policy is to define standards for connecting to Richman Investments network from any host. These standards are designed to minimize the potential exposure to Richman Investments from damages which may result from unauthorized use of Richman Investments resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical Richman Investments internal systems, etc.…

    • 479 Words
    • 2 Pages
    Good Essays
  • Good Essays

    BSA/310

    • 674 Words
    • 3 Pages

    In business, an information security is a set of policies to protect the companies and small businesses infrastructure, physical, and information technology assets, and to ensure that information technology users within the domain of the companies and small businesses comply with the rules and guidelines related to the security of the information stored digitally at any network within the boundaries of authority. In short, it can protect data from the outside and even inside threat. The data and information, which the companies and small businesses have, are arguably the most important assets. They should ensure the data confidentiality, integrity, availability, non-repudiation, authentication, and authorization. Most small businesses and companies must have information security to ensure their business and information assets. Information security protects data and controls how it should be distributed within or without the businesses boundaries. This means that information should be encrypted and may have restrictions placed on its distribution to the third party. Information security should protect the data from the outside threats such as:…

    • 674 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Participation in Richman Investments is contingent upon acceptance of this Acceptable Use Policy. This Policy outlines the terms and conditions for use of the Richman Investments Areas covered include who is authorized to use Richman Investments rules for online behaviour, and guidelines for the handling of secure and copyright-protected materials.…

    • 896 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Unit 4 P6

    • 757 Words
    • 4 Pages

    To make sure that information is managed appropriately, a number of policies and procedures have to be put in place, concerning security of information.…

    • 757 Words
    • 4 Pages
    Good Essays
  • Good Essays

    Its important to record, store and share information securely to protect confidentiality and safeguard vulnerable adults.…

    • 948 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    * Locked away in a filing cabinet/cupboard with a key that only someone who is authorised to open it has the key.…

    • 307 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    LEVEL 2 BEAUTY

    • 303 Words
    • 2 Pages

    All confidential data is stored and used that complies with the data protection act, should ensure your clients privacy and confidential information is safe and secure either on a computer or paper filled system.…

    • 303 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    When ensuring the security of information, records should be stored correctly, any confidential calls or meetings should be private and take place where nobody can accidentally overhear the conversation, all records should be returned to the correct storage place. And any lost, stolen or destroyed records should be reported immediately, you should ensure the proper disposal of any information or records that are no longer needed or are damaged.…

    • 532 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Children

    • 7355 Words
    • 30 Pages

    3. What legal instructions do child care workers need to be aware of an able to work with?…

    • 7355 Words
    • 30 Pages
    Good Essays