Preview

IS3350 week 1

Satisfactory Essays
Open Document
Open Document
287 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
IS3350 week 1
IT Asset Description
Seven Domains of Typical IT

Privacy Data Impact
Assessment
Critical-Major-Minor
Microsoft XP 2003

System/Application
NONE
Major
SP2 Workstations (50)

Workstation
Limited
Minor
Laptops (50)

Workstation
Limited
Minor
Desktop Computers (50)

Workstation
Limited
Minor

Linux Server #1
LAN
High
Major

Linux Server #2
WAN
High
Major

Microsoft Server #1

System/Application

Major

Critical

Microsoft Server #2

System /Application

Major

Critical

Microsoft Server #3

System/Application

Major

Critical

Microsoft Server #4

LAN

High

Major

1. The purpose of identifying IT assets and inventory is to evaluate assets and track them.
2. The asset classification is to determine possible critical problems that need an immediate plan of action.
3. I picked HIPPA. Customer privacy elements are insurance information, account numbers, claim numbers and other private health insurance related items.
4. Website classification is minor in contrast to the e-commerce server because the server potentially holds more personal information than the website itself.
5. Customer privacy data and intellectual property assets are critical because they hold personal information that can pose a potential threat if exposed.
6. Security controls for recent compliance law requirements for HIPPA
7. Data Classification Standard helps with asset classification by defining which class it falls into by definition.
8. Minimizing leakage of customer privacy data through the public network would be possible through data encryption, server firewalls.
9. Security controls and security countermeasures to help protect the Master SQL Database that houses customer privacy data and intellectual property assets.
10. The Mock IT infrastructure in combination with the data classification, those that are major should be planned to decrease the possibility.
11. The organization can document the IT Asset

You May Also Find These Documents Helpful

  • Satisfactory Essays

    It240 Week 3

    • 370 Words
    • 2 Pages

    For all three settings given the conditions in which to work with a client server based model is the choice. This choice is made for a few different reasons while considering multiple factors. First off client server includes an option for flexibility. That is growth and, or modification to any existing device, or future additions to the system. The design, implication, material, and budget demands are reasonably accomplishable. A client server offers tighter security through a central database which houses an array of customized permissions which allows an appointed user whatever access is needed. A client server base model is reasonably equipped to accommodate the expanding business to the business with everything…

    • 370 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It321 Week 1

    • 640 Words
    • 3 Pages

    A long distance switch routes traffic through the long distance network. The types of interfaces that terminate on a long distance switch are intermachine trunks (ITMT’s); they can also connect to databases that are used to validate calling card calls.…

    • 640 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    Week 5 Qnt351

    • 1843 Words
    • 8 Pages

    The instrument used to collect data from all 449 employees at DMC except upper management was an employee survey (UOPX Library, para 11). The survey was administered anonymously and at-will to 449 employees, and distributed with employee bimonthly paychecks within a six-week time frame. Only 78 responses out of 449 were returned to HR, which is a 17.3% response rate by the employees.…

    • 1843 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    Bcom275 Week 1

    • 443 Words
    • 2 Pages

    What was the message?The message was the job description for the job I was applying for.…

    • 443 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    ISSC362 Week 2

    • 645 Words
    • 3 Pages

    During the scanning step of the hacking attack process, you identified known software vulnerabilities in a Windows XP Professional Workstation. List the name and number of the critical Microsoft® vulnerabilities identified. What is vulnerability “MS08-067”?…

    • 645 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Database administrators should monitor their SQL databases for unauthorized or abnormal SQL injections and write scripts for alarming as well as Simple Network Management Protocol (SNMP) alerts. Additional safeguards can be placed that include encrypting the data elements that reside in long-term storage of the SQL…

    • 575 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    MGT330 Week 2 Dis 1

    • 487 Words
    • 2 Pages

    Is another form of structural configuration better suited to multiproduct, multiservice companies? I do not believe so. As stated on our textbook, “Organizations exist for a purpose.” Further, their design considerations “seek to create organizations that are both efficient and effective” (Baack, Minnick, & Reilly, 2014)With multiproduct, multiservice companies there are many more moving parts, meaning more room for error. All the moving parts must work together, as parts of an engine. A design flaw in one division could affect other divisions, and eventually the entire company. Organizational design must be carefully thought out and planned before executed. Even then, things should be carefully monitored to work out any kinks.…

    • 487 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Is4231 Week 5

    • 3436 Words
    • 14 Pages

    Evaluate the internal and external factors that influence the activities and organization of an information security program List and describe the typical job titles and functions performed…

    • 3436 Words
    • 14 Pages
    Powerful Essays
  • Powerful Essays

    Nt1310 Unit 1 Assignment 1

    • 1434 Words
    • 6 Pages

    Information has become the most valuable asset of any organization. And keeping that information secure is a major factor in the design and development of any computer system. Security is defined by Merriam-Webster as “the state of being protected or safe from harm”. It is up to every organization to insure that their data is protected, and that nothing that is harmful to the company or its clients is compromised.…

    • 1434 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    POS355 Week 1 Individual

    • 574 Words
    • 2 Pages

    Memory is essential to the operation of any computer system. Memory is comprised of a large collection of bytes, each with its own address. What is memory management? It is the method for controlling and coordinating the computer’s memory, assigns blocks to numerous programs that are running in order to enhance the systems overall performance. Memory management is located in the hardware, in the operating system, within programs and applications.…

    • 574 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    For the Patton-Fuller hospital to become the best hospital in the area, key issues must be addressed. Securing the network from all possible electronic threats is one of the main issues that must be addressed. Referring back to HIPPA, this states that the facility must, “protect the privacy of individually identifiable health information (HIPPA).” Circumventing potential issues, and aiding with the tools necessary for the hospital to continue providing exceptional patient care and continuing to operate sound. If the facility does this, then we can expect much success from Patton-Fuller.…

    • 560 Words
    • 3 Pages
    Good Essays
  • Satisfactory Essays

    SOC413 Week 2

    • 695 Words
    • 3 Pages

    There are several agents of socialization; three of them are family, religion, and the workplace. Family is the most important of the social agents. A persons coming into society can be a negative one or a positive one and it begins with the relationships that person has at home. A person who is loved and nurtured at home is more than likely to grow into a loving and nurturing person and a productive person in society. A person who is neglected and not cared for at home has a greater chance of being a negative part of society. (Brinkerhoff, White, Ortega, and Weitz, 2011) A traditional family consists of a mother, father, and one or more children. More families are raised by a single parent, and in some of those homes the single parent is a male. The effects of a child growing up in a single parent home are low…

    • 695 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Psy3045 Week 1

    • 467 Words
    • 2 Pages

    They have special training program with strong schedule. They have specific book or program. Their teacher have special training for each student. They know, time is very valuable and try to use them efficiently. Although gifted students learn faster than usual, they should exercise several hours each day and let their brain rest. Gifted students spend a lot of their time educating, and not a lot of time playing and having fun. Special students put a lot of time and effort, but they still try to have fun and participate in different…

    • 467 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Microsoft Solutions Framework

    • 11484 Words
    • 46 Pages

    Microsoft® Solutions Framework (MSF) is a deliberate and disciplined approach to technology projects based on a defined set of principles, models, disciplines, concepts, guidelines, and proven practices from Microsoft. This white paper introduces MSF and provides an overview of its foundational principles, core models, and essential disciplines, focusing on how their application contributes to the…

    • 11484 Words
    • 46 Pages
    Powerful Essays
  • Satisfactory Essays

    11. A data classification standard is usually apart of which policy definition? A. Asset protection policy.…

    • 307 Words
    • 2 Pages
    Satisfactory Essays