Preview

Company Policy

Powerful Essays
Open Document
Open Document
3843 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Company Policy
Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario.

Sunica Music and Movies will be implementing the best and affordable security measure and disaster recovery plan that is available. Our company will install the best firewall and security that will ensure that our customers and our company data are protected. We seek to maintain and recruit customers. We will always maintain confidentiality, availability, intertgity. By doing so, we shall and will keep the best computer systems and security that is available. Our goals are to expand our locations to other cities and states. By doing so we searching and researching all information security topics and learning that is available to the world. Our company will use routers will bastion hosts to protect our data and customers. We will use antivirus software and malware software to protect or computer systems. We stay informed on technology changes. This will keep our systems up and running properly. We use all forms of security controls to protect or data.

Introduction

Due in Week One: Give an overview of the company and the security goals to be achieved.

1 Company overview

As relates to your selected scenario, give a brief 100- to 200-word overview of the company.

Sunica Music and Movies is a local multimedia chain with four locations. Each store has been acting independently of one another and has difficulty-coordinating customer sales from one store to another based on inventory. Because of poor communications, revenue and customer base have been lost due to jumbled inventory from store to store, decentralized accounting, and no Internet-based commerce. With the successful implementation of a WAN solution, all stores will have the ability to access a centralized database for inventory and dynamically reorder



References: Cite all your references by adding the pertinent information to this section by following this example. American Psychological Association. (2001). Publication manual of the American Psychological Association (5th ed.). Washington, DC: Author.

You May Also Find These Documents Helpful

  • Better Essays

    This IT security report will go over the top security IT threats, security considerations, security policies, and awareness training. The security report will help the design team protect the new system from the threats that have been identified during the design phase of the new system. At the end of this report there will be provisions suggested that will help Kudler Fine Foods internal staff to help validate security measures once the new program is up and running so they can keep the system safe from hackers, attacks or any…

    • 2101 Words
    • 8 Pages
    Better Essays
  • Better Essays

    This MLS Plan will describe how the IT department will improve the security of each domain and how to protect the company’s information. The IT department will update all firewalls on the infrastructure and make sure to secure all ports that are open. This will help stop incoming traffic that is malicious. Another protection utilized will be anti-virus software,…

    • 1234 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    Appendix D IT244

    • 827 Words
    • 4 Pages

    American Psychological Association. (2001). Publication manual of the American Psychological Association (5th ed.). Washington, DC: Author.…

    • 827 Words
    • 4 Pages
    Satisfactory Essays
  • Good Essays

    It244 R Appendix E

    • 650 Words
    • 3 Pages

    References: Cite all your references by adding the pertinent information to this section by following this example.…

    • 650 Words
    • 3 Pages
    Good Essays
  • Good Essays

    This report gives a brief description the general security solutions planned for the safety of data and information that belongs to the organization. The outline will provide elements of a multi-layered security plan, and will indicate a general security solution for each of the seven domains of a typical IT infrastructure. Also I will describe a layer of security for each of the seven domains.…

    • 801 Words
    • 4 Pages
    Good Essays
  • Better Essays

    It244 Appendix.D

    • 929 Words
    • 4 Pages

    American Psychological Association. (2001). Publication manual of the American Psychological Association (5th ed.). Washington, DC: Author.…

    • 929 Words
    • 4 Pages
    Better Essays
  • Powerful Essays

    Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario.…

    • 4827 Words
    • 20 Pages
    Powerful Essays
  • Good Essays

    NT2580 Project part 1

    • 606 Words
    • 3 Pages

    Safety of data and information is a real important aspect of a company. Before we can create an outline for general security solutions we must first define what is needed. I recommend that we use a multi-layered security plan. There are a total of seven domains of an IT infrastructure including user domain, workstation domain, LAN domain, LAN-to-WAN domain, WAN domain, remote access domain, and system/application domain.…

    • 606 Words
    • 3 Pages
    Good Essays
  • Powerful Essays

    It 244 Final

    • 2332 Words
    • 10 Pages

    American Psychological Association. (2001). Publication manual of the American Psychological Association (5th ed.). Washington, DC: Author.…

    • 2332 Words
    • 10 Pages
    Powerful Essays
  • Powerful Essays

    The Firm is a security services provider. Our clients included organizations of various sizes, but most clients are state and federal government agencies that must demonstrate compliance with specific security-related regulations. Our firm was founded 2002, as a small corporation with only four employees. At that time, the firm’s focus was to provide database performance tuning and security services, including assessments, penetration tests, policy creation, and regulatory compliance assistance. The firm’s current annual gross sales are currently million in U.S. dollars.…

    • 1810 Words
    • 8 Pages
    Powerful Essays
  • Satisfactory Essays

    Is 411 Study Guide

    • 305 Words
    • 2 Pages

    Information Security Business Challenges and Policies the mitigate risk within the 7 domains. – p 77 - 83…

    • 305 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    This MLS plan will give a brief overview of the security strategies that will be implemented at each level of the IT infrastructure.…

    • 506 Words
    • 3 Pages
    Satisfactory Essays
  • Good Essays

    Week 5 you decide

    • 928 Words
    • 4 Pages

    Security is an ever moving target that must be continually managed and refined to ensure appropriate confidentiality, integrity, and availability of services and systems that are critical to business, as well as the valuable data.…

    • 928 Words
    • 4 Pages
    Good Essays
  • Powerful Essays

    Access Control Policy

    • 833 Words
    • 3 Pages

    References: Cite all your references by adding the pertinent information to this section by following this example.…

    • 833 Words
    • 3 Pages
    Powerful Essays
  • Better Essays

    References: American Psychological Association. (2010). Publication manual of the American Psychological Association (6th ed.). Washington, DC: American Psychological Association.…

    • 1741 Words
    • 7 Pages
    Better Essays