Preview

Project Part 2 Student SSCP Domain Research

Powerful Essays
Open Document
Open Document
1444 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Project Part 2 Student SSCP Domain Research
NT 2580
Introduction To Information Security
Teacher : Mr. Timothy Tacker
Project Part 2 Student SSCP Domain Research
May 30, 2015

Continuing of Richman Investments has expanded with more offices, locations and clients, which the needs of protection for assets are greater. I have decided to implement the following policy for removable media: Richman Investments staff may only use Richman Investments’ removable media in their work computers. Richman Investments removable media may not be connected to or used in computers that are not owned or leased by the Richman Investments without explicit permission of the Richman Investments IT manager. Sensitive information should be stored on removable media only when required in the performance of your assigned duties or when providing information required by other state or federal agencies. When sensitive information is stored on removable media, it must be encrypted in accordance with the Richman Investments’ Acceptable Encryption Policy. Security assurance and user-friendly sites are required if Richman Investments is to be successful at attracting customers to their Internet sites. It is therefore important to be able to understand the business requirements and be able to translate these into a public network presence with security in mind. The Digital revolution of the 21st Century has not been achieved without its consequences. Real time business requirements and economic drivers have forced rapid changes to the methods used to conduct business-to-business and business to client communication. The Internet has now become a convenient and economic deployment medium for global business. For Richman Investments Computer User’s Policy, although employees are given PCs so they can deliver the task that they are assigned, it must be understood that these PCs are property of Richman Investments and must not be abused for personal use. Computer resources are expensive and so offensive material must not be

You May Also Find These Documents Helpful

  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Satisfactory Essays

    lab 4

    • 451 Words
    • 2 Pages

    Create a simple Internet OR e-mail use policy for Richman Investments that defines the acceptable and unacceptable use of Internet and e-mail access at Richman. Go to the SANS website at http://www.sans.org/security-resources/policies/ to view sample policies.…

    • 451 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Mutandum Corporation Case

    • 963 Words
    • 4 Pages

    There are numerous reasons to retire our computer technology. Some systems become obsolete due to current technological advances. Some are replaced because they become infected with viruses or otherwise no longer function properly. And others simply just don’t meet the requirements of our business. In order to retire these systems in an efficient, safe and economical manner, we must take into consideration numerous factors that would otherwise but our business at risk. The following policy includes the implementation of recommendations that will keep sensitive information secure while ensuring that we remain in compliance with federal regulations all the while keeping to our business model centering on efficiency.…

    • 963 Words
    • 4 Pages
    Powerful Essays
  • Better Essays

    This multi-layered security plan for Richman Investments will provide a short overview of the security tactics that will be applied at each level of the IT infrastructure.…

    • 1234 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    IT255 Project 1

    • 663 Words
    • 2 Pages

    The following outline presents the fundamental solutions for the safety of data and information that belongs to Richman Investments. As part of the general security plan of the organization the IT department puts together a proposal to provide multi-layered security strategies that can be applied at every level of the IT structure. The plan will lay out the importance of improving and safeguarding the levels of each domain and the process of protecting the information of the organization.…

    • 663 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Data Classification Standards help Richman Investments to consistently define how this organization should handle and secure our various types of data. This report will focus on the internal use only data and how each of these domains are affected by these standards. Internal use only data refers to information that may or may not be confidential. It is imperative that our organization keep this information in house and away from the public and realize the Domains that need to be addresses with these rigid standards. The three standards that are at the top of the list for our company that will be directly affected are the User, Work Station, and LAN Domains.…

    • 789 Words
    • 4 Pages
    Satisfactory Essays
  • Satisfactory Essays

    * There may not be enough information about the service therefore the individual is not able to make an informed choice because all the facts are not available.…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Unit 4 Assignment 2

    • 717 Words
    • 3 Pages

    The purpose of this policy is to define standards for connecting to Richman investment’s network from any host. These standards are designed to minimize the potential exposure to Richman investments from damages which may result from unauthorized use of Richman investments resources. Damages include the loss of sensitive or company confidential data, intellectual property, damage to public image, damage to critical Richman investments internal systems, etc.…

    • 717 Words
    • 3 Pages
    Powerful Essays
  • Satisfactory Essays

    Without providing the service of safeguarding for children and young people who are not developed enough to do it for themselves, their future could be negatively affected. If they were to be affected by an event such as abuse, and there is no safeguarding in place, this could carry on and seriously affect their physical and emotional development. This could mean they fall behind with developmental milestones. Children need to be provided with a safe and happy environment to grow up in so they are happy to develop at a normal rate and sequence. This will help them achieve their full potential, through into adulthood.…

    • 263 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Avi) A PDP is a personal development plan and is done between you and your manager. They will record all information about your learning and development needs in work. Things like targets, agreed objectives and activities to meet them and standards that are required. These all build your own appraisal.…

    • 503 Words
    • 3 Pages
    Satisfactory Essays
  • Better Essays

    This document is designed to provide definition of the standards for connecting remotely to Richman Investments’ network outside of the company’s direct network connection. The standards defined here are designed to mitigate exposure to potential damage to Richman Investments’ network, resulting from the use of unauthorized use of network resources.…

    • 1109 Words
    • 4 Pages
    Better Essays
  • Better Essays

    itt security final paper

    • 1085 Words
    • 5 Pages

    Richman Investing is one of the top leading investing firms in the United States. In order to stay on top of the competition a few things have to be implemented. Accessing Richman’s intranet and extranet is one of many nice features about the company. Securing these ways to access the network is more than just saying which sites users can and cannot access. It is encrypting data, setting passwords, physically locking doors, and many other very important security measures that need to be thought of. Being 100 percent safe and secure is not achievable but if we follow these steps Richman Investing will be more secure and will remain number one in the United States when it comes to investing.…

    • 1085 Words
    • 5 Pages
    Better Essays
  • Good Essays

    The search for solutions for wicked problems never ends whereas ordinary problems can be solved in a certain way (Camillus 2008). The digital economy raises such concerns as consumers’ security and privacy (OECD ). Therefore, companies have to find solutions to solve these problems. For example, companies can make effort to secure environment for transaction. However, how to provide such a secure environment will be a permanent issue to them, which demonstrates that digital revolution is a wicked problem.…

    • 699 Words
    • 3 Pages
    Good Essays
  • Good Essays

    If media that contains confidential or sensitive information is to be transferred to an off-site location, the data on the media should be encrypted, and the encryption and decryption keys are to be protected with the same care as the data.…

    • 871 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    tttttttttttttttt

    • 900 Words
    • 3 Pages

    Using information technology, businesses have the ability to view changes in the global markets far faster than they usually do. With so many transactions done online and so much information available online, it’s important to keep all of that safe. Information technology makes it possible for your online data to stay secure until accessed by the proper channels.…

    • 900 Words
    • 3 Pages
    Powerful Essays