Preview

Is3230 Unit 2 Assignment 2 Information Security

Good Essays
Open Document
Open Document
515 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
Is3230 Unit 2 Assignment 2 Information Security
IS3230 Unit 2 Assignment 2
Chris Wiginton
ITT Technical Institute, Tampa FL
Instructor: David Marquez
30 March, 2014

Global Limited is a global provider of infrastructure information systems, whose services cater to a wide range of industry sectors. One of Global Limited’s business objectives is information security for their clients. In order to provide their clients with information security, Global Limited has utilized a risk management approach to protect their client’s information.
From a security standpoint the step taken by Global Limited are sound and will maximize the security of their client’s information. The main weakness as such will remain at the user level. If the end users both internal and external are not security conscious and vigilant in their security awareness then there
…show more content…
Although there is no real way to have complete security against all threats, Global Limited has provided their clients with a secure solution without being so intrusive that the end users cannot do their jobs.
If a company or organization’s data and systems are not secure, be it from lack of proper controls or improper physical security, then they would be out of compliance with industry standards. According to the SOX act a company is supposed to have internal controls in place to prevent and detect unauthorized access of financial data.
Global’s risk management approach was a key factor in the success of their efforts to protecting their client’s information assets. By utilizing risk management strategies Global was able to detect vulnerabilities where there were the most likelihood of threat and implement controls to detect and/or prevent breaches of the security controls. The risk management process ensured Global addressed security measures at all levels of the

You May Also Find These Documents Helpful

  • Satisfactory Essays

    Jennifer’s full time position as Sales would need Sales access for her primary position. She should only have By Position access to Accounts Payable when she is working that position. She would need Read Only for Shipping and Receiving in order provide customers with information on inventory availability. Neither of her positions should have required her to have full access to Shipping and Receiving.…

    • 252 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    What is the significance of compliance and financial reporting from an insecure system. Its purpose is to give investors more confidence in the financial reporting. Ignorance of a vulnerable system is no longer a defense because top, SOX has driven significant spending on IT and IT security. An insecure systems is the life line of a Company. Without it no assets are safe.…

    • 406 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is3350 Unit 1 Assignment

    • 2098 Words
    • 9 Pages

    If a change in accounting policy is caused by the initial application of an international standard or…

    • 2098 Words
    • 9 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Given the speeds of today’s Ethernet and the progression of the speeds, 10 to 100Gigs over 8 years and 100Gig to 1Tb since, transmission rate will double again in about 8 years. Although this seems true, I read that Ethernet fabric will rival fiber optic transmission capabilities. We must keep in might that a network is only as fast as its slowest component. This means computers will have to continue to get faster at processing requests and switches and routers will have to analyze and forward data packets at a higher speed to keep up with the evolution of Ethernet.…

    • 304 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    We are looking for the item Brake Set, Luffing Mechanism, GUL. Please kindly quote for the following item.…

    • 67 Words
    • 1 Page
    Satisfactory Essays
  • Powerful Essays

    Security implementation responsibilities focus on implementing the access controls and account management processes outlined in this Plan. The following positions are responsible for security implementation:…

    • 1211 Words
    • 5 Pages
    Powerful Essays
  • Powerful Essays

    Is3350 Unit 1 Assignment 1

    • 2290 Words
    • 10 Pages

    By agreement with the mother by joint registration at birth or by court order under section 4(1) (a) and 4(1A).…

    • 2290 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Is3350 Unit 1 Assignment

    • 1325 Words
    • 6 Pages

    In all, Figure 4 shows a calculation of 64% accuracy rate for correct answers given in his small reading group. I could tell that Michael felt like he was on a roll, and he made a surprising request that none of his peers groaned about. “Can we finish by ourselves?” The teacher gave consent for the class to finish independently, and they did. As an added bonus, the reading specialist shared an entire sheet of heart stickers made by her husband to celebrate Valentine’s Day early. Michael happily received his reward while trying to estimate the total stickers on the sheet (see Figure 5). When he saw the red heart, he stated, “I don’t want the heart to camouflage on my red sweater.” Therefore, Michael placed the heart on his white collar (see Figure 6).…

    • 1325 Words
    • 6 Pages
    Good Essays
  • Satisfactory Essays

    The data classification policy is intended to provide a framework for classifying a company’s data based on its level of sensitivity. Data classification entails analyzing the data an organization retains, determining its importance and value, and then assigning it to a category. Data is classified to help determine baselines for security controls in that will be implemented to protect the data.…

    • 288 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Is3350 Unit 1 Assignment

    • 653 Words
    • 3 Pages

    1. Once I have completed my current courses I will apply for TPP mathematics level C or enrol in an Accounting degree.…

    • 653 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Johnson Company provides networking components and services. Today we are using the yellow pages for advertising, which is still useful but outdated. In most businesses today use other methods such as In person by using sale representatives. Mostly all the businesses today use the internet to reach out to customers, either by having a website, social media, sending emails or even newsletters. There are some that use a totally different approach, some of which include video conferencing and text messages. Other companies even push it further by utilizing social media sources such as Facebook, twitter, LinkedIn, Instagram and so many more to promote their company.…

    • 811 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT104 Assignment Unit 5

    • 307 Words
    • 2 Pages

    1) What does a professional programmer usually do first to gain an understanding of a problem?…

    • 307 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Is3350 Unit 2 Assignment

    • 1380 Words
    • 6 Pages

    Introductions: All three of my subjects are females that I have known for at least 5 years. Two of the subjects (1 and 2) are mother and daughter. The mother and daughter were asked in a group setting with 11 questions I had a lot of questions because I wasn’t sure of what my younger subject would be able to answer. Everybody was asked the same questions. Since I knew my subjects I just called and seen whether they would be willing to answer some questions. They all agree so I did the mother and daughter on September 15 on a Tuesday, and my third subject was September 16 on a Wednesday. I drove to their house and I spent about 3 hours with subject 1 and 2, and I spent 2 hours with subject 3. Subject 1 and 2 was questioned in subject 1 bedroom…

    • 1380 Words
    • 6 Pages
    Powerful Essays
  • Satisfactory Essays

    2. A Certification Authority (CA) is an organization whose function is to issue certificates. Its role is to confirm the identity of the party who is the subject of the certificate and attest that the public key in the generated certificate is the public key of the identified party.…

    • 647 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    Globalization and Technology have been help to (ADT) a secure company, Technology is a very significant change of the importance of security. Benefit from globalization by being able to access cheaper labor and materials in the modern era this lead to (ADT) to be a reliable company related to technology to secure our home and business.(ADT) use computers, servers, websites and personal digital products to develop competitive advantages in the economic market place. To serve Small business and largest business owners should consider implementing technology in their business. This allows owners to create secure operations using the best technology available from (ADT)…

    • 864 Words
    • 4 Pages
    Good Essays