Preview

Week 1 Case Study

Powerful Essays
Open Document
Open Document
1259 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Week 1 Case Study
1. Look up “the paper that started the study of computer security.” Prepare a summary of the key points. What in this paper specifically addresses security in areas previously unexamined?
The RAND Report R-609-1 was commissioned by the Deputy Director in June 1967 according to www.linuxsecurity.com. The report was to study and recommend solutions that would unsure the protection of classified information while allowing multi-level access along with computer sharing capabilities. The report was broken down into four sections. First, the nature of the problem was identified. This identified security problems from the computer systems to lack of security and potential threats. The second part looked at policy considerations and gave recommendations. This section dealt with systems personnel to information structure and ended with system certification recommendations. The third section detailed technical recommendation while the last section detailed management and administrative controls.
With the increased and wide spread use of computers in the military, a need for procedures we due. These procedure recommendations revolved around technique and security which had not previously existed on such a broad scale. Even with the large scale of operations, there still needed to be some privacy around the system and data that was shared or accessed. Through this study, batch, multiprogramming, and time-shared processing were all recommended for different levels of access and control. Three types of threats to system security were identified. These are accidental access of data, deliberate access of data, and a physical attack on the system. There were recommended safeguards to protect from all three vulnerabilities. This protection had to be identified and secured by the system designer so not gaps were missed. These gaps could be in the software, hardware, communication of information and general lack of organization or the organization itself. There were recommended

You May Also Find These Documents Helpful

  • Better Essays

    Case Study 4

    • 1050 Words
    • 5 Pages

    -Do you find yourself worrying constantly about a variety of different things at one time?…

    • 1050 Words
    • 5 Pages
    Better Essays
  • Better Essays

    To properly secure an information system means protecting its files and other confidential information from misuse. The current speed of technological growth requires ever evolving security measures to follow these developments. As the members of Team “A” set out to address this need, it was necessary to discuss the requirements. The foundation of all concrete security plans require a detailed knowledge of all current systems, the tools needed to accomplish security needs and employee training. The implementation of these requirements will be outlined within a final Security Presentation.…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Powerful Essays

    Main Security Concerns: As a rapidly growing business that primarily utilizes IT resources for intranet company communications between and among a single home office and three satellite offices; internal network access controls and remote employee user’s access controls seem to be of primary importance. Priority number one should be hardening and the safeguarding of access and data integrity of the Oracle database servers housed as the main office in Reston, VA. And separately at the San Diego satellite office A comprehensive security policy will be developed and approved by management that will detail the specific guidelines administrators must follow when allowed admin access to company IT resources and services, and when and how those permissions should be denied or allowed. Additionally, auditing and logging of critical events should be implemented utilizing a reliable SEIM (Security Information and Event Management) system. Moreover, control of user access from remote sites via the company intranet via VPN’s and remote access via RADIUS should be strengthened and monitored for both qualitative and quantitate analysis and measuring. Cryptographic techniques will be enhanced and login and password requirements will be strengthened. Of significant importance is the company web presence and corporate access to its knowledge base portal within the company intranet. The company web presence is of vital importance to allow customers to access information concerning the company’s products and services. The knowledge portal is vital for company employees to have access to propriety information while protecting their confidentiality, integrity, and availability of the data. We will separate and hardened both the web server and the knowledge portal via…

    • 2606 Words
    • 11 Pages
    Powerful Essays
  • Good Essays

    Case Study 21-2 Week 5

    • 605 Words
    • 3 Pages

    We discussed if mentoring had influenced her in any way in her organization. I wanted to know if mentoring me has changed any views she has, or procedures. We discussed different information and tactics. She explained what her inspirations and motivations were to keep going and fighting for her business. My mentor is a courageous woman, not a lot of people have the mental capacity or ability to create what she has. I am in awe of her and I expressed to her what a privilege it was to have her as my mentor. She has asked me to keep going with her and she will show me everything she has learned over the years. We have agreed to meet every three weeks.…

    • 605 Words
    • 3 Pages
    Good Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Riordan Security Issues

    • 1371 Words
    • 6 Pages

    Whitman, M. E., & Mattord, H. (2004). Principles of Information Security. [University of Phoenix Custom Edition e-Text]. , : Course Technology. Retrieved September 15, 2009, from University of Phoenix, CMGT440.…

    • 1371 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    Scenario 5: (RBAC) Role Based Access Control. With RBAC in place the security measures would be assigned to each user and monitored by the security administrator(s). Using this Access control method would allow for high-grade security with manageability in mind. Allowing each user a set of permissions dependent on their group, or role, allows the system admin to more easily monitor security by group; which is perfect for a military network.…

    • 286 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week One Assignment

    • 1287 Words
    • 6 Pages

    The following items appeared in the accounting records of Triguero 's, a retail music store that also sponsors concerts. Classify each of the items as an asset, liability, revenue, or expense from the company 's viewpoint. Also indicate the normal account balance of each item.…

    • 1287 Words
    • 6 Pages
    Satisfactory Essays
  • Good Essays

    week one assignment

    • 538 Words
    • 2 Pages

    The first “safe harbor” available to an individual taxpayer to avoid a penalty for underpayment of estimated tax would be if the payments of estimated tax are at least as large as 90 % of the tax shown on the return or 100% (110% if adjusted gross income for 2002 and later exceeds 150k) of the tax shown on the return of the preceding taxable year (assuming it showed a tax liability and covered a taxable year of 12 months.) The second “safe harbor” would be if the payments of estimated tax are at least as large as an amount equal to 90% of the tax for the taxable year computed by annualizing the taxable income received for the months in the taxable year ending before the month in which the installment is required to be paid.…

    • 538 Words
    • 2 Pages
    Good Essays
  • Good Essays

    Cited: Kim, D., & Solomon, M. G. Part 1: The Need for Information Security. In Fundamentals of Information Systems Security. Jones & Bartlett Learning.…

    • 299 Words
    • 2 Pages
    Good Essays
  • Satisfactory Essays

    Week1 Assignment

    • 353 Words
    • 2 Pages

    1. For each of the following, indicate which is a variable and which is a constant:…

    • 353 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Class I worked with a community college network a few years ago and it was almost fun to watch. No matter how much bandwidth they purchased, the students would use it all. They could not get educational traffic to work because there was too much competition from students gaming and streaming audio and video. Ultimately they purchased some expensive bandwidth management equipment to give priority to certain traffic. The problem was not really security, but rather, controlling usage.…

    • 1177 Words
    • 5 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Week 1 assignment1

    • 297 Words
    • 2 Pages

    What is meant by the term media convergence with regard to technology, and how has it affected everyday life?…

    • 297 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    week 1 assignment

    • 549 Words
    • 2 Pages

    What were the major developments in the evolution of mass media during the 20th century?…

    • 549 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Case Study 1 1

    • 359 Words
    • 2 Pages

    4/ yes, I faced a lot of difficult situations and discrimination because of the "Hijab" during my traineeship this summer; I had to work much harder than my colleagues and do a lot of stuff that they've never been asked to do it and unfortunately all this did happen in an Arabic Muslim country where religion must be…

    • 359 Words
    • 2 Pages
    Satisfactory Essays