Preview

It 244 Ap C

Satisfactory Essays
Open Document
Open Document
466 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It 244 Ap C
Associate Level Material
Appendix C

Introduction

Student Name: Enter Your Name Here

University of Phoenix

IT/244 Intro to IT Security

Instructor’s Name: Enter Your Instructor 's Name Here

Date: Enter the date here

Introduction

Due in Week One: Give an overview of the company and the security goals to be achieved.

1 Company overview

As relates to your selected scenario, give a brief 100- to 200-word overview of the company.

Sunica Music and Movies suffers from a lack of a centralized framework for their stores. Each store works as an individual without the knowledge of the other four. This company is in need of a centralized intranet for employees and an internet portal for those customers wishing to shop from home or peruse their services and merchandise.

2 Security policy overview

Of the different types of security policies—program-level, program-framework, Issue-specific, and system-specific—briefly cover which type is appropriate to your selected business scenario and why.

Issue specific security policy would probably be the best for this company. As it is not large nor have very many departs, it is not necessary to set up a degree of sever policies to ensure security. It would be best to teach each group the basics of what they need to know and let them only deal with the systems in which they need to use. The centralized accounting and finical information will probably not be set up for normal employee use at the store locations.

3 Security policy goals

As applies to your selected scenario, explain how the confidentiality, integrity, and availability principles of information security will be addressed by the information security policy.

1 Confidentiality

Briefly explain how the policy will protect information.

Customers lists and their financial records will not be able to be accessed from the store



References: Cite all your references by adding the pertinent information to this section by following this example. American Psychological Association. (2001). Publication manual of the American Psychological Association (5th ed.). Washington, DC: Author.

You May Also Find These Documents Helpful

  • Good Essays

    Unit 4 P6

    • 757 Words
    • 4 Pages

    To make sure that information is managed appropriately, a number of policies and procedures have to be put in place, concerning security of information.…

    • 757 Words
    • 4 Pages
    Good Essays
  • Satisfactory Essays

    Discussion 1

    • 396 Words
    • 2 Pages

    A security policy defines limitations on individual behavior or system performance and details activities that are permitted, controlled or prohibited within the company. In order for policies to be effectual, senior management must endorse them, they must be communicated to all employees, undergo recurring reviews, and be assessed for usefulness. A security program encompasses all of the required pieces necessary to successfully protect a business. It should include policies, requirements, standards and procedures. Security plans should be operative at all levels of a corporation to be effective. Management should communicate a formal explanation of what is acceptable by all employees. Management should also clearly dictate what the consequences of noncompliance are. Organizations can use the ISO-27002:2005 as an outline to create a security policy.…

    • 396 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Finance Questions

    • 600 Words
    • 2 Pages

    7. For each of the seven domains of a typical IT infrastructure, what process or procedures would you perform to obtain information about security controls and safeguards?…

    • 600 Words
    • 2 Pages
    Good Essays
  • Powerful Essays

    Sample Security Plan X

    • 2479 Words
    • 10 Pages

    The following sample security plan was put together by a fictitious company named Adventure Works. Because of the increasing focus on security in the computing world, the company has decided to review security practices and put together a plan to improve those practices. Adventure Works’ needs may differ from your company’s needs, but reading through their plan should give you a good idea of the steps involved in creating a good security plan.…

    • 2479 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    Cissp Study Guide

    • 67651 Words
    • 271 Pages

    A security policy would include all of the following EXCEPT A. Background B. Scope statement C. Audit requirements D. Enforcement Answer: B…

    • 67651 Words
    • 271 Pages
    Powerful Essays
  • Satisfactory Essays

    The security controls that I would consider implementing are physical computer security policies such as physical access controls, computer security management and policies, and contingency disaster and recovery plans and tests. For…

    • 609 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Strategy Management of GSK

    • 3048 Words
    • 14 Pages

    Before starting your assignment, you should ensure that the company you are researching provides you with information you need.…

    • 3048 Words
    • 14 Pages
    Powerful Essays
  • Satisfactory Essays

    While preparing the report, we acknowledgement the encouragement and full guidance given by our course instructor Hamidul Islam…

    • 2624 Words
    • 11 Pages
    Satisfactory Essays
  • Powerful Essays

    It255 Final Study Guide

    • 843 Words
    • 4 Pages

    17. Which of the following is not a part of an ordinary IT security policy framework?…

    • 843 Words
    • 4 Pages
    Powerful Essays
  • Satisfactory Essays

    Synopsis: The “Project Report” gives an account of the original research work undertaken by the Management Trainee during the duration of Summer Training/ Internship. It illustrates in an organized and logical manner, the “Research Methodology adopted, research findings, inferences and recommendations”, as well as their meaningful associations, thus fitting in the various disjointed pieces of information, in the form of a big picture.…

    • 524 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    GUISP

    • 7523 Words
    • 39 Pages

    information in all forms. As more information is used and shared by students, faculty and…

    • 7523 Words
    • 39 Pages
    Powerful Essays
  • Powerful Essays

    Adarsh Guar Gum Udyog

    • 12812 Words
    • 52 Pages

    PROJECT REPORT ON MANUFACTURING PROCESS AND APPLICATIONS OF GUAR GUM CARRIED ON AT ADARSH GUAR GUM UDYOG SUBMITTED IN PARTIAL FULFILLMENT OF BACHELOR OF BUSINESS MANAGEMENT TO INTERNATIONAL COLLEGE FOR GIRLS Supervised by: Submitted by: Dr. Poonam madan Archna agarwal Head of department B.B.M. Sem VI Management studies ICG/2008/8451 CO-SUPERVISED BY : Roll no. 81011…

    • 12812 Words
    • 52 Pages
    Powerful Essays
  • Better Essays

    Computer networks have allowed activity that none dreamed possible hundreds of years ago; however, millions of attempts to compromise the security of computer systems are made on a daily basis. Knowing and using the 12 principles of information security allows security professionals to mitigate most threats to data security. By understanding the different types of security policies, effective policies can be put into place that ensure better information security. What security professionals must find paramount is that 100% secured is impossible to achieve.…

    • 841 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Access Control Policy

    • 833 Words
    • 3 Pages

    Due in Week Seven: Outline the Access Control Policy. Describe how access control methodologies work to secure information systems…

    • 833 Words
    • 3 Pages
    Powerful Essays