Preview

It 244 Appendix B

Powerful Essays
Open Document
Open Document
3468 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
It 244 Appendix B
Associate Level Material
Appendix B

Information Security Policy Student Name: Dennis H Jarvis Jr.
University of Phoenix
IT/244 Intro to IT Security
Instructor’s Name: Scott Sabo
Date: 12/21/2012 * Table of Contents 1. Executive Summary 1 2. Introduction 1 3. Disaster Recovery Plan 1 3.1. Key elements of the Disaster Recovery Plan 1 3.2. Disaster Recovery Test Plan 1 4. Physical Security Policy 1 4.1. Security of the facilities 1 4.1.1. Physical entry controls 1 4.1.2. Security offices, rooms and facilities 1 4.1.3. Isolated delivery and loading areas 2 4.2. Security of the information systems 2 4.2.1. Workplace protection 2 4.2.2. Unused ports and cabling 2 4.2.3. Network/server equipment 2 4.2.4. Equipment maintenance 2 4.2.5. Security of laptops/roaming equipment 2 5. Access Control Policy 2 6. Network Security Policy 3 7. References 3

Executive Summary
Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario. This disaster plan was put together to try and protect valuable information should it be attacked by hackers or threatened by a natural disaster. As this company grows, so will the value of the network and the information it retains. We want to ensure to the customer and the employee that this information is safe and not vulnerable to an attack. This plan was devised to help protect against failures such as the complexity of the system, accidental failure or a breech by hostile intent. Awareness of these kinds of attacks is the key and to be prepared on the part of management and the user. They must be made aware of the consequences of their actions while using the network and accessing the data. The users of the network and system need to be prepared in case of an attack and have knowledge of



References: Cite all your references by adding the pertinent information to this section by following this example. http://www.garykessler.net/library/firewall.html Wack, J. (1995) Screened Host Firewall. http://www.vtcif.telstra.com.au/pub/docs/security/800-10/node57.html. Las accessed March 11, 2012. Wack, J. (1995) Screened subnet Firewall. http://www.vtcif.telstra.com.au/pub/docs/security/800-10/node58.html

You May Also Find These Documents Helpful

  • Better Essays

    This multi-layered security plan for Richman Investments will provide a short overview of the security tactics that will be applied at each level of the IT infrastructure.…

    • 1234 Words
    • 5 Pages
    Better Essays
  • Satisfactory Essays

    IT210 R5 appendix b

    • 191 Words
    • 2 Pages

    The following example explains how to write a program that calculates the cost of painting a room. If the user provides the price of a gallon of paint; the number of square feet one gallon of paint covers; and the length, height, and width of the room, you can calculate the total cost of painting the room.…

    • 191 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    It 210 Appendix I

    • 623 Words
    • 3 Pages

    Axia College Material Appendix I Currency Conversion Development Assignment—Flowcharts Complete the flowcharts for the assignment above by typing into the textboxes below. Control Flow Diagram—Main Control [pic] Control Flow Diagram—Display Menu | | |[pic] | Control Flow Diagram—Get_Int_Value | | |[pic] | Control Flow Diagram—Convert Currency | | |[pic] | Control Flow Diagram—Display_Results |[pic] | PSEUDOCODE Main Module Declare Selection as an integer Declare CurrencyType as string Declare USDollar as real Declare ConvertedAmount as real Call Display/Selection Module Call Canadian Module Call Mexican Module Call English Module Call Japanese Module Call French Module Call Quit Module Call Output Module End Program…

    • 623 Words
    • 3 Pages
    Powerful Essays
  • Powerful Essays

    Due in Week Nine: Write 3 to 4 paragraphs giving a bottom-line summary of the specific measureable goals and objectives of the security plan, which can be implemented to define optimal security architecture for the selected business scenario.…

    • 4827 Words
    • 20 Pages
    Powerful Essays
  • Satisfactory Essays

    it238 r6 appendix c

    • 243 Words
    • 2 Pages

    window.alert("The file " + errURL + " generated the following error: " + errMessage + " on line " + errLineNum + ", and the caller is "+arguments.caller.toString());…

    • 243 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It210 Appendix F

    • 372 Words
    • 3 Pages

    3. The main user screen should have a short description saying how to use the program.…

    • 372 Words
    • 3 Pages
    Satisfactory Essays
  • Satisfactory Essays

    IT-241 Appendix G

    • 369 Words
    • 2 Pages

    Stands for Wired Equivalency Privacy. Uses 64 bit or 128 bit encryption. (including 24-bit IV)…

    • 369 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    It 240 Appendix F

    • 260 Words
    • 2 Pages

    This mode is available for Windows users with limited access. These users do not have access to hardware and can only access their own address space in the Windows environment. Since the User mode operates in Ring 3 of the Intel 386 microprocessor protection model, they should not have access, or alter, programs running in Ring 0 (Kernel mode) on the computer. (Regan, 2006)…

    • 260 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Com/220 Appendix F

    • 353 Words
    • 2 Pages

    |persuasive essay? |explain why it’s important to use legal drugs for what they’re intended. |…

    • 353 Words
    • 2 Pages
    Satisfactory Essays
  • Powerful Essays

    Appendix E

    • 426 Words
    • 2 Pages

    | This source points out different ways to maintain a healthy life. It also shows what kinds of things a person can do to eat healthier.…

    • 426 Words
    • 2 Pages
    Powerful Essays
  • Satisfactory Essays

    Disaster Recovery Plan 09

    • 619 Words
    • 3 Pages

    References: Cite all your references by adding the pertinent information to this section by following this example.…

    • 619 Words
    • 3 Pages
    Satisfactory Essays
  • Powerful Essays

    Firewall

    • 4988 Words
    • 20 Pages

    This is to certify that Mr. Malav Shah bearing Roll No. 07BIT042 has satisfactorily completed his seminar in the Topic Firewall technology as part of the 5th semester curriculum for the subject Seminar.…

    • 4988 Words
    • 20 Pages
    Powerful Essays
  • Powerful Essays

    Today the threat to the information on the network has grown to the greatest extent. Information is the most vital aspect of every organization. Access to the internet can open the world to communicating with customers and vendors, and is an immense source of information. But the same opportunities can open your Local Area Network to possible attacks by thieves and vandals. These attackers and hackers try to harm a system and disrupt information exploiting vulnerabilities by using various techniques, methods, and tools. Many analysts say very bluntly, if you are on the Internet, you need a firewall.…

    • 2383 Words
    • 10 Pages
    Powerful Essays
  • Good Essays

    Reading

    • 11453 Words
    • 40 Pages

    Security basics: • The security objective is a neverending process. • Security needs change over time. Contributions from psychology: • Adler: Humans are, above all else, social. • Maslow and the hierarchy of needs: Security is a fundamental human need. Defining security: • stability • predictability Useful terms: • threat • risk: 1. probability 2. criticality • vulnerability Essential tools: • threat assessment • vulnerability assessment • security survey (security audit) • risk assessment • risk analysis…

    • 11453 Words
    • 40 Pages
    Good Essays
  • Good Essays

    The vulnerability of information systems is increasing as we move to a world of networked and especially wireless computing. Theoretically, there are hundreds of points in a corporate information system that can be subject to some threats. These threats can be classified as:…

    • 2074 Words
    • 8 Pages
    Good Essays